Picture for Rui Wang

Rui Wang

Jack

Rechargeable UAV Trajectory Optimization for Real-Time Persistent Data Collection of Large-Scale Sensor Networks

Add code
Apr 24, 2024
Figure 1 for Rechargeable UAV Trajectory Optimization for Real-Time Persistent Data Collection of Large-Scale Sensor Networks
Figure 2 for Rechargeable UAV Trajectory Optimization for Real-Time Persistent Data Collection of Large-Scale Sensor Networks
Figure 3 for Rechargeable UAV Trajectory Optimization for Real-Time Persistent Data Collection of Large-Scale Sensor Networks
Figure 4 for Rechargeable UAV Trajectory Optimization for Real-Time Persistent Data Collection of Large-Scale Sensor Networks
Viaarxiv icon

Nyonic Technical Report

Add code
Apr 24, 2024
Figure 1 for Nyonic Technical Report
Figure 2 for Nyonic Technical Report
Figure 3 for Nyonic Technical Report
Figure 4 for Nyonic Technical Report
Viaarxiv icon

SNR Maximization and Localization for UAV-IRS-Assisted Near-Field Systems

Add code
Apr 24, 2024
Viaarxiv icon

Beyond Chain-of-Thought: A Survey of Chain-of-X Paradigms for LLMs

Add code
Apr 24, 2024
Viaarxiv icon

A Spatiotemporal Hand-Eye Calibration for Trajectory Alignment in Visual(-Inertial) Odometry Evaluation

Add code
Apr 23, 2024
Figure 1 for A Spatiotemporal Hand-Eye Calibration for Trajectory Alignment in Visual(-Inertial) Odometry Evaluation
Figure 2 for A Spatiotemporal Hand-Eye Calibration for Trajectory Alignment in Visual(-Inertial) Odometry Evaluation
Figure 3 for A Spatiotemporal Hand-Eye Calibration for Trajectory Alignment in Visual(-Inertial) Odometry Evaluation
Figure 4 for A Spatiotemporal Hand-Eye Calibration for Trajectory Alignment in Visual(-Inertial) Odometry Evaluation
Viaarxiv icon

AED-PADA:Improving Generalizability of Adversarial Example Detection via Principal Adversarial Domain Adaptation

Add code
Apr 19, 2024
Viaarxiv icon

The Victim and The Beneficiary: Exploiting a Poisoned Model to Train a Clean Model on Poisoned Data

Add code
Apr 17, 2024
Figure 1 for The Victim and The Beneficiary: Exploiting a Poisoned Model to Train a Clean Model on Poisoned Data
Figure 2 for The Victim and The Beneficiary: Exploiting a Poisoned Model to Train a Clean Model on Poisoned Data
Figure 3 for The Victim and The Beneficiary: Exploiting a Poisoned Model to Train a Clean Model on Poisoned Data
Figure 4 for The Victim and The Beneficiary: Exploiting a Poisoned Model to Train a Clean Model on Poisoned Data
Viaarxiv icon

Learn When to Trust Language Models: A Privacy-Centric Adaptive Model-Aware Approach

Add code
Apr 04, 2024
Viaarxiv icon

Cross-Modality Gait Recognition: Bridging LiDAR and Camera Modalities for Human Identification

Add code
Apr 04, 2024
Figure 1 for Cross-Modality Gait Recognition: Bridging LiDAR and Camera Modalities for Human Identification
Figure 2 for Cross-Modality Gait Recognition: Bridging LiDAR and Camera Modalities for Human Identification
Figure 3 for Cross-Modality Gait Recognition: Bridging LiDAR and Camera Modalities for Human Identification
Figure 4 for Cross-Modality Gait Recognition: Bridging LiDAR and Camera Modalities for Human Identification
Viaarxiv icon

Transformer-Lite: High-efficiency Deployment of Large Language Models on Mobile Phone GPUs

Add code
Mar 29, 2024
Viaarxiv icon