Picture for Pengfei He

Pengfei He

SITP: A High-Reliability Semantic Information Transport Protocol Without Retransmission for Semantic Communication

Add code
Dec 10, 2025
Viaarxiv icon

NOC4SC: A Bandwidth-Efficient Multi-User Semantic Communication Framework for Interference-Resilient Transmission

Add code
Dec 10, 2025
Viaarxiv icon

TRAJECT-Bench:A Trajectory-Aware Benchmark for Evaluating Agentic Tool Use

Add code
Oct 06, 2025
Figure 1 for TRAJECT-Bench:A Trajectory-Aware Benchmark for Evaluating Agentic Tool Use
Figure 2 for TRAJECT-Bench:A Trajectory-Aware Benchmark for Evaluating Agentic Tool Use
Figure 3 for TRAJECT-Bench:A Trajectory-Aware Benchmark for Evaluating Agentic Tool Use
Figure 4 for TRAJECT-Bench:A Trajectory-Aware Benchmark for Evaluating Agentic Tool Use
Viaarxiv icon

A transformer-BiGRU-based framework with data augmentation and confident learning for network intrusion detection

Add code
Sep 05, 2025
Figure 1 for A transformer-BiGRU-based framework with data augmentation and confident learning for network intrusion detection
Figure 2 for A transformer-BiGRU-based framework with data augmentation and confident learning for network intrusion detection
Figure 3 for A transformer-BiGRU-based framework with data augmentation and confident learning for network intrusion detection
Figure 4 for A transformer-BiGRU-based framework with data augmentation and confident learning for network intrusion detection
Viaarxiv icon

How Memory Management Impacts LLM Agents: An Empirical Study of Experience-Following Behavior

Add code
May 21, 2025
Figure 1 for How Memory Management Impacts LLM Agents: An Empirical Study of Experience-Following Behavior
Figure 2 for How Memory Management Impacts LLM Agents: An Empirical Study of Experience-Following Behavior
Figure 3 for How Memory Management Impacts LLM Agents: An Empirical Study of Experience-Following Behavior
Figure 4 for How Memory Management Impacts LLM Agents: An Empirical Study of Experience-Following Behavior
Viaarxiv icon

A Practical Memory Injection Attack against LLM Agents

Add code
Mar 05, 2025
Figure 1 for A Practical Memory Injection Attack against LLM Agents
Figure 2 for A Practical Memory Injection Attack against LLM Agents
Figure 3 for A Practical Memory Injection Attack against LLM Agents
Figure 4 for A Practical Memory Injection Attack against LLM Agents
Viaarxiv icon

Towards Context-Robust LLMs: A Gated Representation Fine-tuning Approach

Add code
Feb 22, 2025
Viaarxiv icon

Multi-Faceted Studies on Data Poisoning can Advance LLM Development

Add code
Feb 20, 2025
Figure 1 for Multi-Faceted Studies on Data Poisoning can Advance LLM Development
Figure 2 for Multi-Faceted Studies on Data Poisoning can Advance LLM Development
Figure 3 for Multi-Faceted Studies on Data Poisoning can Advance LLM Development
Viaarxiv icon

Stepwise Perplexity-Guided Refinement for Efficient Chain-of-Thought Reasoning in Large Language Models

Add code
Feb 18, 2025
Viaarxiv icon

Unveiling Privacy Risks in LLM Agent Memory

Add code
Feb 17, 2025
Figure 1 for Unveiling Privacy Risks in LLM Agent Memory
Figure 2 for Unveiling Privacy Risks in LLM Agent Memory
Figure 3 for Unveiling Privacy Risks in LLM Agent Memory
Figure 4 for Unveiling Privacy Risks in LLM Agent Memory
Viaarxiv icon