Alert button
Picture for Fan Wu

Fan Wu

Alert button

Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms

Add code
Bookmark button
Alert button
May 31, 2023
Mst Shapna Akter, Md Jobair Hossain Faruk, Nafisa Anjum, Mohammad Masum, Hossain Shahriar, Akond Rahman, Fan Wu, Alfredo Cuzzocrea

Figure 1 for Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms
Figure 2 for Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms
Figure 3 for Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms
Figure 4 for Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms
Viaarxiv icon

DC-CCL: Device-Cloud Collaborative Controlled Learning for Large Vision Models

Add code
Bookmark button
Alert button
Mar 18, 2023
Yucheng Ding, Chaoyue Niu, Fan Wu, Shaojie Tang, Chengfei Lyu, Guihai Chen

Figure 1 for DC-CCL: Device-Cloud Collaborative Controlled Learning for Large Vision Models
Figure 2 for DC-CCL: Device-Cloud Collaborative Controlled Learning for Large Vision Models
Figure 3 for DC-CCL: Device-Cloud Collaborative Controlled Learning for Large Vision Models
Figure 4 for DC-CCL: Device-Cloud Collaborative Controlled Learning for Large Vision Models
Viaarxiv icon

Traffic State Estimation with Anisotropic Gaussian Processes from Vehicle Trajectories

Add code
Bookmark button
Alert button
Mar 04, 2023
Fan Wu, Zhanhong Cheng, Huiyu Chen, Tony Z. Qiu, Lijun Sun

Figure 1 for Traffic State Estimation with Anisotropic Gaussian Processes from Vehicle Trajectories
Figure 2 for Traffic State Estimation with Anisotropic Gaussian Processes from Vehicle Trajectories
Figure 3 for Traffic State Estimation with Anisotropic Gaussian Processes from Vehicle Trajectories
Figure 4 for Traffic State Estimation with Anisotropic Gaussian Processes from Vehicle Trajectories
Viaarxiv icon

BSA -- Bi-Stiffness Actuation for optimally exploiting intrinsic compliance and inertial coupling effects in elastic joint robots

Add code
Bookmark button
Alert button
Dec 30, 2022
Dennis Ossadnik, Mehmet C. Yildirim, Fan Wu, Abdalla Swikir, Hugo T. M. Kussaba, Saeed Abdolshah, Sami Haddadin

Figure 1 for BSA -- Bi-Stiffness Actuation for optimally exploiting intrinsic compliance and inertial coupling effects in elastic joint robots
Figure 2 for BSA -- Bi-Stiffness Actuation for optimally exploiting intrinsic compliance and inertial coupling effects in elastic joint robots
Figure 3 for BSA -- Bi-Stiffness Actuation for optimally exploiting intrinsic compliance and inertial coupling effects in elastic joint robots
Figure 4 for BSA -- Bi-Stiffness Actuation for optimally exploiting intrinsic compliance and inertial coupling effects in elastic joint robots
Viaarxiv icon

evoML Yellow Paper: Evolutionary AI and Optimisation Studio

Add code
Bookmark button
Alert button
Dec 20, 2022
Lingbo Li, Leslie Kanthan, Michail Basios, Fan Wu, Manal Adham, Vitali Avagyan, Alexis Butler, Paul Brookes, Rafail Giavrimis, Buhong Liu, Chrystalla Pavlou, Matthew Truscott, Vardan Voskanyan

Figure 1 for evoML Yellow Paper: Evolutionary AI and Optimisation Studio
Figure 2 for evoML Yellow Paper: Evolutionary AI and Optimisation Studio
Figure 3 for evoML Yellow Paper: Evolutionary AI and Optimisation Studio
Figure 4 for evoML Yellow Paper: Evolutionary AI and Optimisation Studio
Viaarxiv icon

Understanding the Impact of Adversarial Robustness on Accuracy Disparity

Add code
Bookmark button
Alert button
Nov 28, 2022
Yuzheng Hu, Fan Wu, Hongyang Zhang, Han Zhao

Figure 1 for Understanding the Impact of Adversarial Robustness on Accuracy Disparity
Figure 2 for Understanding the Impact of Adversarial Robustness on Accuracy Disparity
Figure 3 for Understanding the Impact of Adversarial Robustness on Accuracy Disparity
Figure 4 for Understanding the Impact of Adversarial Robustness on Accuracy Disparity
Viaarxiv icon

One-Time Model Adaptation to Heterogeneous Clients: An Intra-Client and Inter-Image Attention Design

Add code
Bookmark button
Alert button
Nov 11, 2022
Yikai Yan, Chaoyue Niu, Fan Wu, Qinya Li, Shaojie Tang, Chengfei Lyu, Guihai Chen

Figure 1 for One-Time Model Adaptation to Heterogeneous Clients: An Intra-Client and Inter-Image Attention Design
Figure 2 for One-Time Model Adaptation to Heterogeneous Clients: An Intra-Client and Inter-Image Attention Design
Figure 3 for One-Time Model Adaptation to Heterogeneous Clients: An Intra-Client and Inter-Image Attention Design
Figure 4 for One-Time Model Adaptation to Heterogeneous Clients: An Intra-Client and Inter-Image Attention Design
Viaarxiv icon

Mining Causality from Continuous-time Dynamics Models: An Application to Tsunami Forecasting

Add code
Bookmark button
Alert button
Oct 10, 2022
Fan Wu, Sanghyun Hong, Dobsub Rim, Noseong Park, Kookjin Lee

Figure 1 for Mining Causality from Continuous-time Dynamics Models: An Application to Tsunami Forecasting
Figure 2 for Mining Causality from Continuous-time Dynamics Models: An Application to Tsunami Forecasting
Figure 3 for Mining Causality from Continuous-time Dynamics Models: An Application to Tsunami Forecasting
Figure 4 for Mining Causality from Continuous-time Dynamics Models: An Application to Tsunami Forecasting
Viaarxiv icon

SecretGen: Privacy Recovery on Pre-Trained Models via Distribution Discrimination

Add code
Bookmark button
Alert button
Jul 25, 2022
Zhuowen Yuan, Fan Wu, Yunhui Long, Chaowei Xiao, Bo Li

Figure 1 for SecretGen: Privacy Recovery on Pre-Trained Models via Distribution Discrimination
Figure 2 for SecretGen: Privacy Recovery on Pre-Trained Models via Distribution Discrimination
Figure 3 for SecretGen: Privacy Recovery on Pre-Trained Models via Distribution Discrimination
Figure 4 for SecretGen: Privacy Recovery on Pre-Trained Models via Distribution Discrimination
Viaarxiv icon

Malware Detection and Prevention using Artificial Intelligence Techniques

Add code
Bookmark button
Alert button
Jun 26, 2022
Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Farhat Lamia Barsha, Shahriar Sobhan, Md Abdullah Khan, Michael Whitman, Alfredo Cuzzocreak, Dan Lo, Akond Rahman, Fan Wu

Figure 1 for Malware Detection and Prevention using Artificial Intelligence Techniques
Figure 2 for Malware Detection and Prevention using Artificial Intelligence Techniques
Figure 3 for Malware Detection and Prevention using Artificial Intelligence Techniques
Figure 4 for Malware Detection and Prevention using Artificial Intelligence Techniques
Viaarxiv icon