Alert button
Picture for Ke Tang

Ke Tang

Alert button

Enabling surrogate-assisted evolutionary reinforcement learning via policy embedding

Add code
Bookmark button
Alert button
Jan 31, 2023
Lan Tang, Xiaxi Li, Jinyuan Zhang, Guiying Li, Peng Yang, Ke Tang

Figure 1 for Enabling surrogate-assisted evolutionary reinforcement learning via policy embedding
Figure 2 for Enabling surrogate-assisted evolutionary reinforcement learning via policy embedding
Figure 3 for Enabling surrogate-assisted evolutionary reinforcement learning via policy embedding
Figure 4 for Enabling surrogate-assisted evolutionary reinforcement learning via policy embedding
Viaarxiv icon

Reliable Robustness Evaluation via Automatically Constructed Attack Ensembles

Add code
Bookmark button
Alert button
Nov 23, 2022
Shengcai Liu, Fu Peng, Ke Tang

Figure 1 for Reliable Robustness Evaluation via Automatically Constructed Attack Ensembles
Figure 2 for Reliable Robustness Evaluation via Automatically Constructed Attack Ensembles
Figure 3 for Reliable Robustness Evaluation via Automatically Constructed Attack Ensembles
Figure 4 for Reliable Robustness Evaluation via Automatically Constructed Attack Ensembles
Viaarxiv icon

Causality-driven Hierarchical Structure Discovery for Reinforcement Learning

Add code
Bookmark button
Alert button
Oct 13, 2022
Shaohui Peng, Xing Hu, Rui Zhang, Ke Tang, Jiaming Guo, Qi Yi, Ruizhi Chen, Xishan Zhang, Zidong Du, Ling Li, Qi Guo, Yunji Chen

Figure 1 for Causality-driven Hierarchical Structure Discovery for Reinforcement Learning
Figure 2 for Causality-driven Hierarchical Structure Discovery for Reinforcement Learning
Figure 3 for Causality-driven Hierarchical Structure Discovery for Reinforcement Learning
Figure 4 for Causality-driven Hierarchical Structure Discovery for Reinforcement Learning
Viaarxiv icon

How Good Is Neural Combinatorial Optimization?

Add code
Bookmark button
Alert button
Sep 22, 2022
Shengcai Liu, Yu Zhang, Ke Tang, Xin Yao

Figure 1 for How Good Is Neural Combinatorial Optimization?
Figure 2 for How Good Is Neural Combinatorial Optimization?
Figure 3 for How Good Is Neural Combinatorial Optimization?
Figure 4 for How Good Is Neural Combinatorial Optimization?
Viaarxiv icon

Disentangled Contrastive Learning for Social Recommendation

Add code
Bookmark button
Alert button
Aug 18, 2022
Jiahao Wu, Wenqi Fan, Jingfan Chen, Shengcai Liu, Qing Li, Ke Tang

Figure 1 for Disentangled Contrastive Learning for Social Recommendation
Figure 2 for Disentangled Contrastive Learning for Social Recommendation
Figure 3 for Disentangled Contrastive Learning for Social Recommendation
Figure 4 for Disentangled Contrastive Learning for Social Recommendation
Viaarxiv icon

GANDSE: Generative Adversarial Network based Design Space Exploration for Neural Network Accelerator Design

Add code
Bookmark button
Alert button
Aug 01, 2022
Lang Feng, Wenjian Liu, Chuliang Guo, Ke Tang, Cheng Zhuo, Zhongfeng Wang

Figure 1 for GANDSE: Generative Adversarial Network based Design Space Exploration for Neural Network Accelerator Design
Figure 2 for GANDSE: Generative Adversarial Network based Design Space Exploration for Neural Network Accelerator Design
Figure 3 for GANDSE: Generative Adversarial Network based Design Space Exploration for Neural Network Accelerator Design
Figure 4 for GANDSE: Generative Adversarial Network based Design Space Exploration for Neural Network Accelerator Design
Viaarxiv icon

Defending Adversarial Examples by Negative Correlation Ensemble

Add code
Bookmark button
Alert button
Jun 11, 2022
Wenjian Luo, Hongwei Zhang, Linghao Kong, Zhijian Chen, Ke Tang

Figure 1 for Defending Adversarial Examples by Negative Correlation Ensemble
Figure 2 for Defending Adversarial Examples by Negative Correlation Ensemble
Figure 3 for Defending Adversarial Examples by Negative Correlation Ensemble
Figure 4 for Defending Adversarial Examples by Negative Correlation Ensemble
Viaarxiv icon

Saliency Attack: Towards Imperceptible Black-box Adversarial Attack

Add code
Bookmark button
Alert button
Jun 04, 2022
Zeyu Dai, Shengcai Liu, Ke Tang, Qing Li

Figure 1 for Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
Figure 2 for Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
Figure 3 for Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
Figure 4 for Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
Viaarxiv icon

Near-Optimal Trajectory Design and Restoration Areas Allocation for UAV-Enabled Grassland Restoration

Add code
Bookmark button
Alert button
Apr 10, 2022
Dongbin Jiaoa, Lingyu Wanga, Peng Yang, Weibo Yang, Yu Peng, Zhanhuan Shang, Ke Tang, Fengyuan Ren

Figure 1 for Near-Optimal Trajectory Design and Restoration Areas Allocation for UAV-Enabled Grassland Restoration
Figure 2 for Near-Optimal Trajectory Design and Restoration Areas Allocation for UAV-Enabled Grassland Restoration
Figure 3 for Near-Optimal Trajectory Design and Restoration Areas Allocation for UAV-Enabled Grassland Restoration
Figure 4 for Near-Optimal Trajectory Design and Restoration Areas Allocation for UAV-Enabled Grassland Restoration
Viaarxiv icon

Training Quantized Deep Neural Networks via Cooperative Coevolution

Add code
Bookmark button
Alert button
Dec 23, 2021
Fu Peng, Shengcai Liu, Ke Tang

Figure 1 for Training Quantized Deep Neural Networks via Cooperative Coevolution
Figure 2 for Training Quantized Deep Neural Networks via Cooperative Coevolution
Figure 3 for Training Quantized Deep Neural Networks via Cooperative Coevolution
Figure 4 for Training Quantized Deep Neural Networks via Cooperative Coevolution
Viaarxiv icon