Picture for Tengfei Ma

Tengfei Ma

College of Computer Science and Electronic Engineering, Hunan University

FCOS: A Two-Stage Recoverable Model Pruning Framework for Automatic Modulation Recognition

Add code
May 27, 2025
Viaarxiv icon

AdaptMol: Adaptive Fusion from Sequence String to Topological Structure for Few-shot Drug Discovery

Add code
May 17, 2025
Viaarxiv icon

Blend the Separated: Mixture of Synergistic Experts for Data-Scarcity Drug-Target Interaction Prediction

Add code
Mar 20, 2025
Viaarxiv icon

MM-Retinal V2: Transfer an Elite Knowledge Spark into Fundus Vision-Language Pretraining

Add code
Jan 27, 2025
Figure 1 for MM-Retinal V2: Transfer an Elite Knowledge Spark into Fundus Vision-Language Pretraining
Figure 2 for MM-Retinal V2: Transfer an Elite Knowledge Spark into Fundus Vision-Language Pretraining
Figure 3 for MM-Retinal V2: Transfer an Elite Knowledge Spark into Fundus Vision-Language Pretraining
Figure 4 for MM-Retinal V2: Transfer an Elite Knowledge Spark into Fundus Vision-Language Pretraining
Viaarxiv icon

S$^2$DN: Learning to Denoise Unconvincing Knowledge for Inductive Knowledge Graph Completion

Add code
Dec 20, 2024
Viaarxiv icon

Abstracted Shapes as Tokens -- A Generalizable and Interpretable Model for Time-series Classification

Add code
Nov 01, 2024
Figure 1 for Abstracted Shapes as Tokens -- A Generalizable and Interpretable Model for Time-series Classification
Figure 2 for Abstracted Shapes as Tokens -- A Generalizable and Interpretable Model for Time-series Classification
Figure 3 for Abstracted Shapes as Tokens -- A Generalizable and Interpretable Model for Time-series Classification
Figure 4 for Abstracted Shapes as Tokens -- A Generalizable and Interpretable Model for Time-series Classification
Viaarxiv icon

Y-Mol: A Multiscale Biomedical Knowledge-Guided Large Language Model for Drug Development

Add code
Oct 15, 2024
Viaarxiv icon

TrojVLM: Backdoor Attack Against Vision Language Models

Add code
Sep 28, 2024
Figure 1 for TrojVLM: Backdoor Attack Against Vision Language Models
Figure 2 for TrojVLM: Backdoor Attack Against Vision Language Models
Figure 3 for TrojVLM: Backdoor Attack Against Vision Language Models
Figure 4 for TrojVLM: Backdoor Attack Against Vision Language Models
Viaarxiv icon

Iterative or Innovative? A Problem-Oriented Perspective for Code Optimization

Add code
Jun 17, 2024
Figure 1 for Iterative or Innovative? A Problem-Oriented Perspective for Code Optimization
Figure 2 for Iterative or Innovative? A Problem-Oriented Perspective for Code Optimization
Figure 3 for Iterative or Innovative? A Problem-Oriented Perspective for Code Optimization
Figure 4 for Iterative or Innovative? A Problem-Oriented Perspective for Code Optimization
Viaarxiv icon

What Improves the Generalization of Graph Transformers? A Theoretical Dive into the Self-attention and Positional Encoding

Add code
Jun 04, 2024
Figure 1 for What Improves the Generalization of Graph Transformers? A Theoretical Dive into the Self-attention and Positional Encoding
Figure 2 for What Improves the Generalization of Graph Transformers? A Theoretical Dive into the Self-attention and Positional Encoding
Figure 3 for What Improves the Generalization of Graph Transformers? A Theoretical Dive into the Self-attention and Positional Encoding
Figure 4 for What Improves the Generalization of Graph Transformers? A Theoretical Dive into the Self-attention and Positional Encoding
Viaarxiv icon