Picture for Jiayun Zhang

Jiayun Zhang

Learn from Failure: Fine-Tuning LLMs with Trial-and-Error Data for Intuitionistic Propositional Logic Proving

Add code
Apr 10, 2024
Figure 1 for Learn from Failure: Fine-Tuning LLMs with Trial-and-Error Data for Intuitionistic Propositional Logic Proving
Figure 2 for Learn from Failure: Fine-Tuning LLMs with Trial-and-Error Data for Intuitionistic Propositional Logic Proving
Figure 3 for Learn from Failure: Fine-Tuning LLMs with Trial-and-Error Data for Intuitionistic Propositional Logic Proving
Figure 4 for Learn from Failure: Fine-Tuning LLMs with Trial-and-Error Data for Intuitionistic Propositional Logic Proving
Viaarxiv icon

Physics-Informed Data Denoising for Real-Life Sensing Systems

Add code
Nov 12, 2023
Figure 1 for Physics-Informed Data Denoising for Real-Life Sensing Systems
Figure 2 for Physics-Informed Data Denoising for Real-Life Sensing Systems
Figure 3 for Physics-Informed Data Denoising for Real-Life Sensing Systems
Figure 4 for Physics-Informed Data Denoising for Real-Life Sensing Systems
Viaarxiv icon

Federated Learning with Client-Exclusive Classes

Add code
Jan 01, 2023
Figure 1 for Federated Learning with Client-Exclusive Classes
Figure 2 for Federated Learning with Client-Exclusive Classes
Figure 3 for Federated Learning with Client-Exclusive Classes
Figure 4 for Federated Learning with Client-Exclusive Classes
Viaarxiv icon

Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks

Add code
Jun 24, 2020
Figure 1 for Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks
Figure 2 for Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks
Figure 3 for Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks
Figure 4 for Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks
Viaarxiv icon

Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models

Add code
Feb 19, 2020
Figure 1 for Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models
Figure 2 for Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models
Figure 3 for Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models
Figure 4 for Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models
Viaarxiv icon

A System-Level Solution for Low-Power Object Detection

Add code
Oct 19, 2019
Figure 1 for A System-Level Solution for Low-Power Object Detection
Figure 2 for A System-Level Solution for Low-Power Object Detection
Figure 3 for A System-Level Solution for Low-Power Object Detection
Figure 4 for A System-Level Solution for Low-Power Object Detection
Viaarxiv icon