Picture for Kejiang Ye

Kejiang Ye

Communication Efficient Robotic Mixed Reality with Gaussian Splatting Cross-Layer Optimization

Add code
Aug 12, 2025
Viaarxiv icon

BucketServe: Bucket-Based Dynamic Batching for Smart and Efficient LLM Inference Serving

Add code
Jul 23, 2025
Viaarxiv icon

Mixture of Weight-shared Heterogeneous Group Attention Experts for Dynamic Token-wise KV Optimization

Add code
Jun 16, 2025
Viaarxiv icon

Green Robotic Mixed Reality with Gaussian Splatting

Add code
Apr 18, 2025
Viaarxiv icon

Clutter Resilient Occlusion Avoidance for Tightly-Coupled Motion-Assisted Detection

Add code
Dec 24, 2024
Figure 1 for Clutter Resilient Occlusion Avoidance for Tightly-Coupled Motion-Assisted Detection
Figure 2 for Clutter Resilient Occlusion Avoidance for Tightly-Coupled Motion-Assisted Detection
Figure 3 for Clutter Resilient Occlusion Avoidance for Tightly-Coupled Motion-Assisted Detection
Figure 4 for Clutter Resilient Occlusion Avoidance for Tightly-Coupled Motion-Assisted Detection
Viaarxiv icon

MPCOM: Robotic Data Gathering with Radio Mapping and Model Predictive Communication

Add code
Apr 16, 2024
Viaarxiv icon

APBench: A Unified Benchmark for Availability Poisoning Attacks and Defenses

Add code
Aug 07, 2023
Figure 1 for APBench: A Unified Benchmark for Availability Poisoning Attacks and Defenses
Figure 2 for APBench: A Unified Benchmark for Availability Poisoning Attacks and Defenses
Figure 3 for APBench: A Unified Benchmark for Availability Poisoning Attacks and Defenses
Figure 4 for APBench: A Unified Benchmark for Availability Poisoning Attacks and Defenses
Viaarxiv icon

Learning the Unlearnable: Adversarial Augmentations Suppress Unlearnable Example Attacks

Add code
Mar 27, 2023
Figure 1 for Learning the Unlearnable: Adversarial Augmentations Suppress Unlearnable Example Attacks
Figure 2 for Learning the Unlearnable: Adversarial Augmentations Suppress Unlearnable Example Attacks
Figure 3 for Learning the Unlearnable: Adversarial Augmentations Suppress Unlearnable Example Attacks
Figure 4 for Learning the Unlearnable: Adversarial Augmentations Suppress Unlearnable Example Attacks
Viaarxiv icon

Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach

Add code
Jan 24, 2023
Viaarxiv icon

Flareon: Stealthy any2any Backdoor Injection via Poisoned Augmentation

Add code
Dec 20, 2022
Viaarxiv icon