Alert button
Picture for Nan Jiang

Nan Jiang

Alert button

How Effective Are Neural Networks for Fixing Security Vulnerabilities

Add code
Bookmark button
Alert button
May 29, 2023
Yi Wu, Nan Jiang, Hung Viet Pham, Thibaud Lutellier, Jordan Davis, Lin Tan, Petr Babkin, Sameena Shah

Figure 1 for How Effective Are Neural Networks for Fixing Security Vulnerabilities
Figure 2 for How Effective Are Neural Networks for Fixing Security Vulnerabilities
Figure 3 for How Effective Are Neural Networks for Fixing Security Vulnerabilities
Figure 4 for How Effective Are Neural Networks for Fixing Security Vulnerabilities
Viaarxiv icon

LM-Switch: Lightweight Language Model Conditioning in Word Embedding Space

Add code
Bookmark button
Alert button
May 22, 2023
Chi Han, Jialiang Xu, Manling Li, Yi Fung, Chenkai Sun, Nan Jiang, Tarek Abdelzaher, Heng Ji

Figure 1 for LM-Switch: Lightweight Language Model Conditioning in Word Embedding Space
Figure 2 for LM-Switch: Lightweight Language Model Conditioning in Word Embedding Space
Figure 3 for LM-Switch: Lightweight Language Model Conditioning in Word Embedding Space
Figure 4 for LM-Switch: Lightweight Language Model Conditioning in Word Embedding Space
Viaarxiv icon

Explaining RL Decisions with Trajectories

Add code
Bookmark button
Alert button
May 06, 2023
Shripad Vilasrao Deshmukh, Arpan Dasgupta, Balaji Krishnamurthy, Nan Jiang, Chirag Agarwal, Georgios Theocharous, Jayakumar Subramanian

Figure 1 for Explaining RL Decisions with Trajectories
Figure 2 for Explaining RL Decisions with Trajectories
Figure 3 for Explaining RL Decisions with Trajectories
Figure 4 for Explaining RL Decisions with Trajectories
Viaarxiv icon

Adversarial Model for Offline Reinforcement Learning

Add code
Bookmark button
Alert button
Feb 21, 2023
Mohak Bhardwaj, Tengyang Xie, Byron Boots, Nan Jiang, Ching-An Cheng

Figure 1 for Adversarial Model for Offline Reinforcement Learning
Figure 2 for Adversarial Model for Offline Reinforcement Learning
Figure 3 for Adversarial Model for Offline Reinforcement Learning
Figure 4 for Adversarial Model for Offline Reinforcement Learning
Viaarxiv icon

Offline Learning in Markov Games with General Function Approximation

Add code
Bookmark button
Alert button
Feb 06, 2023
Yuheng Zhang, Yu Bai, Nan Jiang

Figure 1 for Offline Learning in Markov Games with General Function Approximation
Viaarxiv icon

Reinforcement Learning in Low-Rank MDPs with Density Features

Add code
Bookmark button
Alert button
Feb 04, 2023
Audrey Huang, Jinglin Chen, Nan Jiang

Figure 1 for Reinforcement Learning in Low-Rank MDPs with Density Features
Viaarxiv icon

KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program Repair

Add code
Bookmark button
Alert button
Feb 03, 2023
Nan Jiang, Thibaud Lutellier, Yiling Lou, Lin Tan, Dan Goldwasser, Xiangyu Zhang

Figure 1 for KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program Repair
Figure 2 for KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program Repair
Figure 3 for KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program Repair
Figure 4 for KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program Repair
Viaarxiv icon

CHAIRS: Towards Full-Body Articulated Human-Object Interaction

Add code
Bookmark button
Alert button
Dec 20, 2022
Nan Jiang, Tengyu Liu, Zhexuan Cao, Jieming Cui, Yixin Chen, He Wang, Yixin Zhu, Siyuan Huang

Figure 1 for CHAIRS: Towards Full-Body Articulated Human-Object Interaction
Figure 2 for CHAIRS: Towards Full-Body Articulated Human-Object Interaction
Figure 3 for CHAIRS: Towards Full-Body Articulated Human-Object Interaction
Figure 4 for CHAIRS: Towards Full-Body Articulated Human-Object Interaction
Viaarxiv icon

Semantics-Aware Remote Estimation via Information Bottleneck-Inspired Type Based Multiple Access

Add code
Bookmark button
Alert button
Dec 19, 2022
Meiyi Zhu, Chunyan Feng, Caili Guo, Zhe Liu, Nan Jiang, Osvaldo Simeone

Figure 1 for Semantics-Aware Remote Estimation via Information Bottleneck-Inspired Type Based Multiple Access
Figure 2 for Semantics-Aware Remote Estimation via Information Bottleneck-Inspired Type Based Multiple Access
Figure 3 for Semantics-Aware Remote Estimation via Information Bottleneck-Inspired Type Based Multiple Access
Viaarxiv icon

Toward Multi-Service Edge-Intelligence Paradigm: Temporal-Adaptive Prediction for Time-Critical Control over Wireless

Add code
Bookmark button
Alert button
Dec 12, 2022
Adnan Aijaz, Nan Jiang, Aftab Khan

Figure 1 for Toward Multi-Service Edge-Intelligence Paradigm: Temporal-Adaptive Prediction for Time-Critical Control over Wireless
Figure 2 for Toward Multi-Service Edge-Intelligence Paradigm: Temporal-Adaptive Prediction for Time-Critical Control over Wireless
Figure 3 for Toward Multi-Service Edge-Intelligence Paradigm: Temporal-Adaptive Prediction for Time-Critical Control over Wireless
Figure 4 for Toward Multi-Service Edge-Intelligence Paradigm: Temporal-Adaptive Prediction for Time-Critical Control over Wireless
Viaarxiv icon