Picture for Shangqing Zhao

Shangqing Zhao

Pancreatic Tumor Segmentation as Anomaly Detection in CT Images Using Denoising Diffusion Models

Add code
Jun 04, 2024
Viaarxiv icon

Temporal Knowledge Graph Completion with Time-sensitive Relations in Hypercomplex Space

Add code
Mar 02, 2024
Figure 1 for Temporal Knowledge Graph Completion with Time-sensitive Relations in Hypercomplex Space
Figure 2 for Temporal Knowledge Graph Completion with Time-sensitive Relations in Hypercomplex Space
Figure 3 for Temporal Knowledge Graph Completion with Time-sensitive Relations in Hypercomplex Space
Figure 4 for Temporal Knowledge Graph Completion with Time-sensitive Relations in Hypercomplex Space
Viaarxiv icon

BIBench: Benchmarking Data Analysis Knowledge of Large Language Models

Add code
Jan 01, 2024
Figure 1 for BIBench: Benchmarking Data Analysis Knowledge of Large Language Models
Figure 2 for BIBench: Benchmarking Data Analysis Knowledge of Large Language Models
Figure 3 for BIBench: Benchmarking Data Analysis Knowledge of Large Language Models
Figure 4 for BIBench: Benchmarking Data Analysis Knowledge of Large Language Models
Viaarxiv icon

Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security

Add code
Jun 09, 2023
Figure 1 for Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security
Figure 2 for Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security
Figure 3 for Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security
Figure 4 for Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security
Viaarxiv icon

Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception

Add code
Jul 26, 2022
Figure 1 for Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception
Figure 2 for Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception
Figure 3 for Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception
Figure 4 for Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception
Viaarxiv icon

LoMar: A Local Defense Against Poisoning Attack on Federated Learning

Add code
Jan 08, 2022
Figure 1 for LoMar: A Local Defense Against Poisoning Attack on Federated Learning
Figure 2 for LoMar: A Local Defense Against Poisoning Attack on Federated Learning
Figure 3 for LoMar: A Local Defense Against Poisoning Attack on Federated Learning
Figure 4 for LoMar: A Local Defense Against Poisoning Attack on Federated Learning
Viaarxiv icon

Adversarial Machine Learning based Partial-model Attack in IoT

Add code
Jul 10, 2020
Figure 1 for Adversarial Machine Learning based Partial-model Attack in IoT
Figure 2 for Adversarial Machine Learning based Partial-model Attack in IoT
Figure 3 for Adversarial Machine Learning based Partial-model Attack in IoT
Figure 4 for Adversarial Machine Learning based Partial-model Attack in IoT
Viaarxiv icon

When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing

Add code
May 04, 2019
Figure 1 for When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing
Figure 2 for When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing
Figure 3 for When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing
Figure 4 for When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing
Viaarxiv icon