Picture for Shangqing Zhao

Shangqing Zhao

Pancreatic Tumor Segmentation as Anomaly Detection in CT Images Using Denoising Diffusion Models

Jun 04, 2024
Viaarxiv icon

Temporal Knowledge Graph Completion with Time-sensitive Relations in Hypercomplex Space

Add code
Mar 02, 2024
Figure 1 for Temporal Knowledge Graph Completion with Time-sensitive Relations in Hypercomplex Space
Figure 2 for Temporal Knowledge Graph Completion with Time-sensitive Relations in Hypercomplex Space
Figure 3 for Temporal Knowledge Graph Completion with Time-sensitive Relations in Hypercomplex Space
Figure 4 for Temporal Knowledge Graph Completion with Time-sensitive Relations in Hypercomplex Space
Viaarxiv icon

BIBench: Benchmarking Data Analysis Knowledge of Large Language Models

Add code
Jan 01, 2024
Figure 1 for BIBench: Benchmarking Data Analysis Knowledge of Large Language Models
Figure 2 for BIBench: Benchmarking Data Analysis Knowledge of Large Language Models
Figure 3 for BIBench: Benchmarking Data Analysis Knowledge of Large Language Models
Figure 4 for BIBench: Benchmarking Data Analysis Knowledge of Large Language Models
Viaarxiv icon

Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security

Jun 09, 2023
Figure 1 for Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security
Figure 2 for Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security
Figure 3 for Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security
Figure 4 for Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security
Viaarxiv icon

Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception

Jul 26, 2022
Figure 1 for Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception
Figure 2 for Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception
Figure 3 for Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception
Figure 4 for Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception
Viaarxiv icon

LoMar: A Local Defense Against Poisoning Attack on Federated Learning

Jan 08, 2022
Figure 1 for LoMar: A Local Defense Against Poisoning Attack on Federated Learning
Figure 2 for LoMar: A Local Defense Against Poisoning Attack on Federated Learning
Figure 3 for LoMar: A Local Defense Against Poisoning Attack on Federated Learning
Figure 4 for LoMar: A Local Defense Against Poisoning Attack on Federated Learning
Viaarxiv icon

Adversarial Machine Learning based Partial-model Attack in IoT

Jul 10, 2020
Figure 1 for Adversarial Machine Learning based Partial-model Attack in IoT
Figure 2 for Adversarial Machine Learning based Partial-model Attack in IoT
Figure 3 for Adversarial Machine Learning based Partial-model Attack in IoT
Figure 4 for Adversarial Machine Learning based Partial-model Attack in IoT
Viaarxiv icon

When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing

May 04, 2019
Figure 1 for When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing
Figure 2 for When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing
Figure 3 for When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing
Figure 4 for When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing
Viaarxiv icon