Picture for Hongyuan Zha

Hongyuan Zha

Information Bargaining: Bilateral Commitment in Bayesian Persuasion

Add code
Jun 09, 2025
Viaarxiv icon

Bayesian Persuasion as a Bargaining Game

Add code
Jun 06, 2025
Viaarxiv icon

TextAtari: 100K Frames Game Playing with Language Agents

Add code
Jun 04, 2025
Viaarxiv icon

Balancing Two Classifiers via A Simplex ETF Structure for Model Calibration

Add code
Apr 14, 2025
Viaarxiv icon

Class-Conditional Neural Polarizer: A Lightweight and Effective Backdoor Defense by Purifying Poisoned Features

Add code
Feb 23, 2025
Viaarxiv icon

Fast T2T: Optimization Consistency Speeds Up Diffusion-Based Training-to-Testing Solving for Combinatorial Optimization

Add code
Feb 05, 2025
Figure 1 for Fast T2T: Optimization Consistency Speeds Up Diffusion-Based Training-to-Testing Solving for Combinatorial Optimization
Figure 2 for Fast T2T: Optimization Consistency Speeds Up Diffusion-Based Training-to-Testing Solving for Combinatorial Optimization
Figure 3 for Fast T2T: Optimization Consistency Speeds Up Diffusion-Based Training-to-Testing Solving for Combinatorial Optimization
Figure 4 for Fast T2T: Optimization Consistency Speeds Up Diffusion-Based Training-to-Testing Solving for Combinatorial Optimization
Viaarxiv icon

Verbalized Bayesian Persuasion

Add code
Feb 03, 2025
Viaarxiv icon

Carbon Market Simulation with Adaptive Mechanism Design

Add code
Jun 12, 2024
Figure 1 for Carbon Market Simulation with Adaptive Mechanism Design
Figure 2 for Carbon Market Simulation with Adaptive Mechanism Design
Figure 3 for Carbon Market Simulation with Adaptive Mechanism Design
Figure 4 for Carbon Market Simulation with Adaptive Mechanism Design
Viaarxiv icon

Transfer Learning for Diffusion Models

Add code
May 28, 2024
Figure 1 for Transfer Learning for Diffusion Models
Figure 2 for Transfer Learning for Diffusion Models
Figure 3 for Transfer Learning for Diffusion Models
Figure 4 for Transfer Learning for Diffusion Models
Viaarxiv icon

Mitigating Backdoor Attack by Injecting Proactive Defensive Backdoor

Add code
May 25, 2024
Figure 1 for Mitigating Backdoor Attack by Injecting Proactive Defensive Backdoor
Figure 2 for Mitigating Backdoor Attack by Injecting Proactive Defensive Backdoor
Figure 3 for Mitigating Backdoor Attack by Injecting Proactive Defensive Backdoor
Figure 4 for Mitigating Backdoor Attack by Injecting Proactive Defensive Backdoor
Viaarxiv icon