Picture for Peng Li

Peng Li

DJI Innovations Inc

DetailFusion: A Dual-branch Framework with Detail Enhancement for Composed Image Retrieval

Add code
May 23, 2025
Viaarxiv icon

LiloDriver: A Lifelong Learning Framework for Closed-loop Motion Planning in Long-tail Autonomous Driving Scenarios

Add code
May 22, 2025
Viaarxiv icon

Khan-GCL: Kolmogorov-Arnold Network Based Graph Contrastive Learning with Hard Negatives

Add code
May 21, 2025
Viaarxiv icon

SenseFlow: A Physics-Informed and Self-Ensembling Iterative Framework for Power Flow Estimation

Add code
May 18, 2025
Viaarxiv icon

Bishop: Sparsified Bundling Spiking Transformers on Heterogeneous Cores with Error-Constrained Pruning

Add code
May 18, 2025
Figure 1 for Bishop: Sparsified Bundling Spiking Transformers on Heterogeneous Cores with Error-Constrained Pruning
Figure 2 for Bishop: Sparsified Bundling Spiking Transformers on Heterogeneous Cores with Error-Constrained Pruning
Figure 3 for Bishop: Sparsified Bundling Spiking Transformers on Heterogeneous Cores with Error-Constrained Pruning
Figure 4 for Bishop: Sparsified Bundling Spiking Transformers on Heterogeneous Cores with Error-Constrained Pruning
Viaarxiv icon

SpikeX: Exploring Accelerator Architecture and Network-Hardware Co-Optimization for Sparse Spiking Neural Networks

Add code
May 18, 2025
Viaarxiv icon

Internet of Agents: Fundamentals, Applications, and Challenges

Add code
May 12, 2025
Figure 1 for Internet of Agents: Fundamentals, Applications, and Challenges
Figure 2 for Internet of Agents: Fundamentals, Applications, and Challenges
Figure 3 for Internet of Agents: Fundamentals, Applications, and Challenges
Figure 4 for Internet of Agents: Fundamentals, Applications, and Challenges
Viaarxiv icon

CMD: Controllable Multiview Diffusion for 3D Editing and Progressive Generation

Add code
May 11, 2025
Viaarxiv icon

Amplified Vulnerabilities: Structured Jailbreak Attacks on LLM-based Multi-Agent Debate

Add code
Apr 23, 2025
Figure 1 for Amplified Vulnerabilities: Structured Jailbreak Attacks on LLM-based Multi-Agent Debate
Figure 2 for Amplified Vulnerabilities: Structured Jailbreak Attacks on LLM-based Multi-Agent Debate
Figure 3 for Amplified Vulnerabilities: Structured Jailbreak Attacks on LLM-based Multi-Agent Debate
Figure 4 for Amplified Vulnerabilities: Structured Jailbreak Attacks on LLM-based Multi-Agent Debate
Viaarxiv icon

Inference-Time Scaling for Generalist Reward Modeling

Add code
Apr 03, 2025
Viaarxiv icon