Alert button
Picture for Jiayun Zhang

Jiayun Zhang

Alert button

Learn from Failure: Fine-Tuning LLMs with Trial-and-Error Data for Intuitionistic Propositional Logic Proving

Add code
Bookmark button
Alert button
Apr 10, 2024
Chenyang An, Zhibo Chen, Qihao Ye, Emily First, Letian Peng, Jiayun Zhang, Zihan Wang, Sorin Lerner, Jingbo Shang

Viaarxiv icon

Physics-Informed Data Denoising for Real-Life Sensing Systems

Add code
Bookmark button
Alert button
Nov 12, 2023
Xiyuan Zhang, Xiaohan Fu, Diyan Teng, Chengyu Dong, Keerthivasan Vijayakumar, Jiayun Zhang, Ranak Roy Chowdhury, Junsheng Han, Dezhi Hong, Rashmi Kulkarni, Jingbo Shang, Rajesh Gupta

Figure 1 for Physics-Informed Data Denoising for Real-Life Sensing Systems
Figure 2 for Physics-Informed Data Denoising for Real-Life Sensing Systems
Figure 3 for Physics-Informed Data Denoising for Real-Life Sensing Systems
Figure 4 for Physics-Informed Data Denoising for Real-Life Sensing Systems
Viaarxiv icon

Federated Learning with Client-Exclusive Classes

Add code
Bookmark button
Alert button
Jan 01, 2023
Jiayun Zhang, Xiyuan Zhang, Xinyang Zhang, Dezhi Hong, Rajesh K. Gupta, Jingbo Shang

Figure 1 for Federated Learning with Client-Exclusive Classes
Figure 2 for Federated Learning with Client-Exclusive Classes
Figure 3 for Federated Learning with Client-Exclusive Classes
Figure 4 for Federated Learning with Client-Exclusive Classes
Viaarxiv icon

Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks

Add code
Bookmark button
Alert button
Jun 24, 2020
Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao

Figure 1 for Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks
Figure 2 for Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks
Figure 3 for Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks
Figure 4 for Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks
Viaarxiv icon

Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models

Add code
Bookmark button
Alert button
Feb 19, 2020
Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao

Figure 1 for Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models
Figure 2 for Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models
Figure 3 for Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models
Figure 4 for Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models
Viaarxiv icon

A System-Level Solution for Low-Power Object Detection

Add code
Bookmark button
Alert button
Oct 19, 2019
Fanrong Li, Zitao Mo, Peisong Wang, Zejian Liu, Jiayun Zhang, Gang Li, Qinghao Hu, Xiangyu He, Cong Leng, Yang Zhang, Jian Cheng

Figure 1 for A System-Level Solution for Low-Power Object Detection
Figure 2 for A System-Level Solution for Low-Power Object Detection
Figure 3 for A System-Level Solution for Low-Power Object Detection
Figure 4 for A System-Level Solution for Low-Power Object Detection
Viaarxiv icon