Alert button
Picture for Wei Chen

Wei Chen

Alert button

Remixing Functionally Graded Structures: Data-Driven Topology Optimization with Multiclass Shape Blending

Add code
Bookmark button
Alert button
Dec 01, 2021
Yu-Chin Chan, Daicong Da, Liwei Wang, Wei Chen

Figure 1 for Remixing Functionally Graded Structures: Data-Driven Topology Optimization with Multiclass Shape Blending
Figure 2 for Remixing Functionally Graded Structures: Data-Driven Topology Optimization with Multiclass Shape Blending
Figure 3 for Remixing Functionally Graded Structures: Data-Driven Topology Optimization with Multiclass Shape Blending
Figure 4 for Remixing Functionally Graded Structures: Data-Driven Topology Optimization with Multiclass Shape Blending
Viaarxiv icon

Bounding Queue Length Violation Probability of Joint Channel and Buffer Aware Transmission

Add code
Bookmark button
Alert button
Nov 23, 2021
Lintao Li, Wei Chen, Khaled B. Letaief

Figure 1 for Bounding Queue Length Violation Probability of Joint Channel and Buffer Aware Transmission
Figure 2 for Bounding Queue Length Violation Probability of Joint Channel and Buffer Aware Transmission
Figure 3 for Bounding Queue Length Violation Probability of Joint Channel and Buffer Aware Transmission
Viaarxiv icon

CCSL: A Causal Structure Learning Method from Multiple Unknown Environments

Add code
Bookmark button
Alert button
Nov 18, 2021
Wei Chen, Yunjin Wu, Ruichu Cai, Yueguo Chen, Zhifeng Hao

Figure 1 for CCSL: A Causal Structure Learning Method from Multiple Unknown Environments
Figure 2 for CCSL: A Causal Structure Learning Method from Multiple Unknown Environments
Figure 3 for CCSL: A Causal Structure Learning Method from Multiple Unknown Environments
Figure 4 for CCSL: A Causal Structure Learning Method from Multiple Unknown Environments
Viaarxiv icon

Queue Length Violation Probability of Joint Channel and Buffer Aware Transmission

Add code
Bookmark button
Alert button
Nov 12, 2021
Lintao Li, Wei Chen, Khaled B. Letaief

Figure 1 for Queue Length Violation Probability of Joint Channel and Buffer Aware Transmission
Figure 2 for Queue Length Violation Probability of Joint Channel and Buffer Aware Transmission
Figure 3 for Queue Length Violation Probability of Joint Channel and Buffer Aware Transmission
Viaarxiv icon

The Hardness Analysis of Thompson Sampling for Combinatorial Semi-bandits with Greedy Oracle

Add code
Bookmark button
Alert button
Nov 08, 2021
Fang Kong, Yueran Yang, Wei Chen, Shuai Li

Figure 1 for The Hardness Analysis of Thompson Sampling for Combinatorial Semi-bandits with Greedy Oracle
Figure 2 for The Hardness Analysis of Thompson Sampling for Combinatorial Semi-bandits with Greedy Oracle
Viaarxiv icon

Mean-Field Approximation based Scheduling for Broadcast Channels with Massive Receivers

Add code
Bookmark button
Alert button
Nov 05, 2021
Changkun Li, Wei Chen, Khaled B. Letaief

Figure 1 for Mean-Field Approximation based Scheduling for Broadcast Channels with Massive Receivers
Figure 2 for Mean-Field Approximation based Scheduling for Broadcast Channels with Massive Receivers
Figure 3 for Mean-Field Approximation based Scheduling for Broadcast Channels with Massive Receivers
Figure 4 for Mean-Field Approximation based Scheduling for Broadcast Channels with Massive Receivers
Viaarxiv icon

Optimizing Information-theoretical Generalization Bounds via Anisotropic Noise in SGLD

Add code
Bookmark button
Alert button
Nov 03, 2021
Bohan Wang, Huishuai Zhang, Jieyu Zhang, Qi Meng, Wei Chen, Tie-Yan Liu

Figure 1 for Optimizing Information-theoretical Generalization Bounds via Anisotropic Noise in SGLD
Figure 2 for Optimizing Information-theoretical Generalization Bounds via Anisotropic Noise in SGLD
Figure 3 for Optimizing Information-theoretical Generalization Bounds via Anisotropic Noise in SGLD
Viaarxiv icon

Indiscriminate Poisoning Attacks Are Shortcuts

Add code
Bookmark button
Alert button
Nov 01, 2021
Da Yu, Huishuai Zhang, Wei Chen, Jian Yin, Tie-Yan Liu

Figure 1 for Indiscriminate Poisoning Attacks Are Shortcuts
Figure 2 for Indiscriminate Poisoning Attacks Are Shortcuts
Figure 3 for Indiscriminate Poisoning Attacks Are Shortcuts
Figure 4 for Indiscriminate Poisoning Attacks Are Shortcuts
Viaarxiv icon

Collaborative Pure Exploration in Kernel Bandit

Add code
Bookmark button
Alert button
Oct 29, 2021
Yihan Du, Wei Chen, Yuko Yuroki, Longbo Huang

Figure 1 for Collaborative Pure Exploration in Kernel Bandit
Figure 2 for Collaborative Pure Exploration in Kernel Bandit
Viaarxiv icon