Picture for Junjie Wang

Junjie Wang

Department of Radiation Oncology, Peking University Third Hospital, Beijing, China

Fast and Accurate Power Load Data Completion via Regularization-optimized Low-Rank Factorization

Add code
May 25, 2025
Viaarxiv icon

DASH: Input-Aware Dynamic Layer Skipping for Efficient LLM Inference with Markov Decision Policies

Add code
May 23, 2025
Figure 1 for DASH: Input-Aware Dynamic Layer Skipping for Efficient LLM Inference with Markov Decision Policies
Figure 2 for DASH: Input-Aware Dynamic Layer Skipping for Efficient LLM Inference with Markov Decision Policies
Figure 3 for DASH: Input-Aware Dynamic Layer Skipping for Efficient LLM Inference with Markov Decision Policies
Figure 4 for DASH: Input-Aware Dynamic Layer Skipping for Efficient LLM Inference with Markov Decision Policies
Viaarxiv icon

Shape-Adaptive Planning and Control for a Deformable Quadrotor

Add code
May 21, 2025
Viaarxiv icon

One Shot Dominance: Knowledge Poisoning Attack on Retrieval-Augmented Generation Systems

Add code
May 15, 2025
Viaarxiv icon

DeCLIP: Decoupled Learning for Open-Vocabulary Dense Perception

Add code
May 07, 2025
Viaarxiv icon

PIV-FlowDiffuser:Transfer-learning-based denoising diffusion models for PIV

Add code
Apr 21, 2025
Viaarxiv icon

YuE: Scaling Open Foundation Models for Long-Form Music Generation

Add code
Mar 11, 2025
Viaarxiv icon

Vulnerability of Text-to-Image Models to Prompt Template Stealing: A Differential Evolution Approach

Add code
Feb 20, 2025
Viaarxiv icon

Explore-Construct-Filter: An Automated Framework for Rich and Reliable API Knowledge Graph Construction

Add code
Feb 19, 2025
Viaarxiv icon

Mimicking the Familiar: Dynamic Command Generation for Information Theft Attacks in LLM Tool-Learning System

Add code
Feb 17, 2025
Figure 1 for Mimicking the Familiar: Dynamic Command Generation for Information Theft Attacks in LLM Tool-Learning System
Figure 2 for Mimicking the Familiar: Dynamic Command Generation for Information Theft Attacks in LLM Tool-Learning System
Figure 3 for Mimicking the Familiar: Dynamic Command Generation for Information Theft Attacks in LLM Tool-Learning System
Figure 4 for Mimicking the Familiar: Dynamic Command Generation for Information Theft Attacks in LLM Tool-Learning System
Viaarxiv icon