Picture for Wenqiang Zhang

Wenqiang Zhang

Fudan university

Collaborative Reconstruction and Repair for Multi-class Industrial Anomaly Detection

Add code
Dec 12, 2025
Viaarxiv icon

Virtual Width Networks

Add code
Nov 17, 2025
Viaarxiv icon

Commonality in Few: Few-Shot Multimodal Anomaly Detection via Hypergraph-Enhanced Memory

Add code
Nov 16, 2025
Viaarxiv icon

Seeing is Believing: Rich-Context Hallucination Detection for MLLMs via Backward Visual Grounding

Add code
Nov 15, 2025
Viaarxiv icon

Fast Visuomotor Policy for Robotic Manipulation

Add code
Oct 14, 2025
Viaarxiv icon

LingoLoop Attack: Trapping MLLMs via Linguistic Context and State Entrapment into Endless Loops

Add code
Jun 17, 2025
Viaarxiv icon

ForceVLA: Enhancing VLA Models with a Force-aware MoE for Contact-rich Manipulation

Add code
May 28, 2025
Viaarxiv icon

Agent RL Scaling Law: Agent RL with Spontaneous Code Execution for Mathematical Problem Solving

Add code
May 14, 2025
Figure 1 for Agent RL Scaling Law: Agent RL with Spontaneous Code Execution for Mathematical Problem Solving
Figure 2 for Agent RL Scaling Law: Agent RL with Spontaneous Code Execution for Mathematical Problem Solving
Figure 3 for Agent RL Scaling Law: Agent RL with Spontaneous Code Execution for Mathematical Problem Solving
Figure 4 for Agent RL Scaling Law: Agent RL with Spontaneous Code Execution for Mathematical Problem Solving
Viaarxiv icon

HSS-IAD: A Heterogeneous Same-Sort Industrial Anomaly Detection Dataset

Add code
Apr 17, 2025
Figure 1 for HSS-IAD: A Heterogeneous Same-Sort Industrial Anomaly Detection Dataset
Figure 2 for HSS-IAD: A Heterogeneous Same-Sort Industrial Anomaly Detection Dataset
Figure 3 for HSS-IAD: A Heterogeneous Same-Sort Industrial Anomaly Detection Dataset
Figure 4 for HSS-IAD: A Heterogeneous Same-Sort Industrial Anomaly Detection Dataset
Viaarxiv icon

Search is All You Need for Few-shot Anomaly Detection

Add code
Apr 16, 2025
Figure 1 for Search is All You Need for Few-shot Anomaly Detection
Figure 2 for Search is All You Need for Few-shot Anomaly Detection
Figure 3 for Search is All You Need for Few-shot Anomaly Detection
Figure 4 for Search is All You Need for Few-shot Anomaly Detection
Viaarxiv icon