Alert button
Picture for Yang

Yang

Alert button

Tim

Explainable Traffic Flow Prediction with Large Language Models

Add code
Bookmark button
Alert button
Apr 13, 2024
Xusen Guo, Qiming Zhang, Junyue Jiang, Mingxing Peng, Meixin Zhu, Hao, Yang

Viaarxiv icon

LC-LLM: Explainable Lane-Change Intention and Trajectory Predictions with Large Language Models

Add code
Bookmark button
Alert button
Mar 27, 2024
Mingxing Peng, Xusen Guo, Xianda Chen, Meixin Zhu, Kehua Chen, Hao, Yang, Xuesong Wang, Yinhai Wang

Viaarxiv icon

ICE-SEARCH: A Language Model-Driven Feature Selection Approach

Add code
Bookmark button
Alert button
Feb 28, 2024
Tianze, Yang, Tianyi, Yang, Shaoshan Liu, Fuyuan Lvu, Xue Liu

Viaarxiv icon

ReactGenie: An Object-Oriented State Abstraction for Complex Multimodal Interactions Using Large Language Models

Add code
Bookmark button
Alert button
Jun 16, 2023
Jackie, Yang, Karina Li, Daniel Wan Rosli, Shuning Zhang, Yuhan Zhang, Monica S. Lam, James A. Landay

Figure 1 for ReactGenie: An Object-Oriented State Abstraction for Complex Multimodal Interactions Using Large Language Models
Figure 2 for ReactGenie: An Object-Oriented State Abstraction for Complex Multimodal Interactions Using Large Language Models
Figure 3 for ReactGenie: An Object-Oriented State Abstraction for Complex Multimodal Interactions Using Large Language Models
Figure 4 for ReactGenie: An Object-Oriented State Abstraction for Complex Multimodal Interactions Using Large Language Models
Viaarxiv icon

Implementing Active Learning in Cybersecurity: Detecting Anomalies in Redacted Emails

Add code
Bookmark button
Alert button
Mar 01, 2023
Mu-Huan, Chung, Lu Wang, Sharon, Li, Yuhong, Yang, Calvin Giang, Khilan Jerath, Abhay Raman, David Lie, Mark Chignell

Figure 1 for Implementing Active Learning in Cybersecurity: Detecting Anomalies in Redacted Emails
Figure 2 for Implementing Active Learning in Cybersecurity: Detecting Anomalies in Redacted Emails
Figure 3 for Implementing Active Learning in Cybersecurity: Detecting Anomalies in Redacted Emails
Figure 4 for Implementing Active Learning in Cybersecurity: Detecting Anomalies in Redacted Emails
Viaarxiv icon

Traffic-Twitter Transformer: A Nature Language Processing-joined Framework For Network-wide Traffic Forecasting

Add code
Bookmark button
Alert button
Jun 19, 2022
Meng-Ju Tsai, Zhiyong Cui, Hao, Yang, Yinhai Wang

Figure 1 for Traffic-Twitter Transformer: A Nature Language Processing-joined Framework For Network-wide Traffic Forecasting
Figure 2 for Traffic-Twitter Transformer: A Nature Language Processing-joined Framework For Network-wide Traffic Forecasting
Figure 3 for Traffic-Twitter Transformer: A Nature Language Processing-joined Framework For Network-wide Traffic Forecasting
Figure 4 for Traffic-Twitter Transformer: A Nature Language Processing-joined Framework For Network-wide Traffic Forecasting
Viaarxiv icon

TransFollower: Long-Sequence Car-Following Trajectory Prediction through Transformer

Add code
Bookmark button
Alert button
Feb 04, 2022
Meixin Zhu, Simon S. Du, Xuesong Wang, Hao, Yang, Ziyuan Pu, Yinhai Wang

Viaarxiv icon

Spatio-Temporal Human Action Recognition Modelwith Flexible-interval Sampling and Normalization

Add code
Bookmark button
Alert button
Aug 12, 2021
Yuke, Yang

Figure 1 for Spatio-Temporal Human Action Recognition Modelwith Flexible-interval Sampling and Normalization
Figure 2 for Spatio-Temporal Human Action Recognition Modelwith Flexible-interval Sampling and Normalization
Figure 3 for Spatio-Temporal Human Action Recognition Modelwith Flexible-interval Sampling and Normalization
Figure 4 for Spatio-Temporal Human Action Recognition Modelwith Flexible-interval Sampling and Normalization
Viaarxiv icon

Adversarial Classification of the Attacks on Smart Grids Using Game Theory and Deep Learning

Add code
Bookmark button
Alert button
Jun 06, 2021
Kian Hamedani, Lingjia Liu, Jithin Jagannath, Yang, Yi

Figure 1 for Adversarial Classification of the Attacks on Smart Grids Using Game Theory and Deep Learning
Figure 2 for Adversarial Classification of the Attacks on Smart Grids Using Game Theory and Deep Learning
Figure 3 for Adversarial Classification of the Attacks on Smart Grids Using Game Theory and Deep Learning
Figure 4 for Adversarial Classification of the Attacks on Smart Grids Using Game Theory and Deep Learning
Viaarxiv icon