Alert button
Picture for Weidong Shi

Weidong Shi

Alert button

University Of Houston

LookALike: Human Mimicry based collaborative decision making

Add code
Bookmark button
Alert button
Mar 16, 2024
Rabimba Karanjai, Weidong Shi

Figure 1 for LookALike: Human Mimicry based collaborative decision making
Figure 2 for LookALike: Human Mimicry based collaborative decision making
Figure 3 for LookALike: Human Mimicry based collaborative decision making
Viaarxiv icon

Teaching Machines to Code: Smart Contract Translation with LLMs

Add code
Bookmark button
Alert button
Mar 13, 2024
Rabimba Karanjai, Lei Xu, Weidong Shi

Figure 1 for Teaching Machines to Code: Smart Contract Translation with LLMs
Figure 2 for Teaching Machines to Code: Smart Contract Translation with LLMs
Figure 3 for Teaching Machines to Code: Smart Contract Translation with LLMs
Figure 4 for Teaching Machines to Code: Smart Contract Translation with LLMs
Viaarxiv icon

An Empirical Study of AI-based Smart Contract Creation

Add code
Bookmark button
Alert button
Aug 19, 2023
Rabimba Karanjai, Edward Li, Lei Xu, Weidong Shi

Viaarxiv icon

Who is Smarter? An Empirical Study of AI-based Smart Contract Creation

Add code
Bookmark button
Alert button
Aug 05, 2023
Rabimba Karanjai, Edward Li, Lei Xu, Weidong Shi

Viaarxiv icon

Detecting Conspiracy Theory Against COVID-19 Vaccines

Add code
Bookmark button
Alert button
Nov 20, 2022
Md Hasibul Amin, Harika Madanu, Sahithi Lavu, Hadi Mansourifar, Dana Alsagheer, Weidong Shi

Figure 1 for Detecting Conspiracy Theory Against COVID-19 Vaccines
Figure 2 for Detecting Conspiracy Theory Against COVID-19 Vaccines
Figure 3 for Detecting Conspiracy Theory Against COVID-19 Vaccines
Figure 4 for Detecting Conspiracy Theory Against COVID-19 Vaccines
Viaarxiv icon

Audit and Improve Robustness of Private Neural Networks on Encrypted Data

Add code
Bookmark button
Alert button
Sep 20, 2022
Jiaqi Xue, Lei Xu, Lin Chen, Weidong Shi, Kaidi Xu, Qian Lou

Figure 1 for Audit and Improve Robustness of Private Neural Networks on Encrypted Data
Figure 2 for Audit and Improve Robustness of Private Neural Networks on Encrypted Data
Figure 3 for Audit and Improve Robustness of Private Neural Networks on Encrypted Data
Figure 4 for Audit and Improve Robustness of Private Neural Networks on Encrypted Data
Viaarxiv icon

RAF: Recursive Adversarial Attacks on Face Recognition Using Extremely Limited Queries

Add code
Bookmark button
Alert button
Jul 04, 2022
Keshav Kasichainula, Hadi Mansourifar, Weidong Shi

Figure 1 for RAF: Recursive Adversarial Attacks on Face Recognition Using Extremely Limited Queries
Figure 2 for RAF: Recursive Adversarial Attacks on Face Recognition Using Extremely Limited Queries
Figure 3 for RAF: Recursive Adversarial Attacks on Face Recognition Using Extremely Limited Queries
Figure 4 for RAF: Recursive Adversarial Attacks on Face Recognition Using Extremely Limited Queries
Viaarxiv icon

Counter Hate Speech in Social Media: A Survey

Add code
Bookmark button
Alert button
Feb 21, 2022
Dana Alsagheer, Hadi Mansourifar, Weidong Shi

Viaarxiv icon

Hate Speech Detection in Clubhouse

Add code
Bookmark button
Alert button
Jul 11, 2021
Hadi Mansourifar, Dana Alsagheer, Reza Fathi, Weidong Shi, Lan Ni, Yan Huang

Figure 1 for Hate Speech Detection in Clubhouse
Figure 2 for Hate Speech Detection in Clubhouse
Figure 3 for Hate Speech Detection in Clubhouse
Figure 4 for Hate Speech Detection in Clubhouse
Viaarxiv icon