Picture for Yaoliang Yu

Yaoliang Yu

University of Alberta

Provably Adaptive Linear Approximation for the Shapley Value and Beyond

Add code
Apr 09, 2026
Viaarxiv icon

Efficient Bilevel Optimization with KFAC-Based Hypergradients

Add code
Mar 31, 2026
Viaarxiv icon

TreeGrad-Ranker: Feature Ranking via $O(L)$-Time Gradients for Decision Trees

Add code
Feb 12, 2026
Viaarxiv icon

SFBD-OMNI: Bridge models for lossy measurement restoration with limited clean samples

Add code
Dec 18, 2025
Viaarxiv icon

Adaptive Context Length Optimization with Low-Frequency Truncation for Multi-Agent Reinforcement Learning

Add code
Oct 30, 2025
Figure 1 for Adaptive Context Length Optimization with Low-Frequency Truncation for Multi-Agent Reinforcement Learning
Figure 2 for Adaptive Context Length Optimization with Low-Frequency Truncation for Multi-Agent Reinforcement Learning
Figure 3 for Adaptive Context Length Optimization with Low-Frequency Truncation for Multi-Agent Reinforcement Learning
Figure 4 for Adaptive Context Length Optimization with Low-Frequency Truncation for Multi-Agent Reinforcement Learning
Viaarxiv icon

Not All Samples Are Equal: Quantifying Instance-level Difficulty in Targeted Data Poisoning

Add code
Sep 08, 2025
Viaarxiv icon

Stochastic Forward-Backward Deconvolution: Training Diffusion Models with Finite Noisy Datasets

Add code
Feb 08, 2025
Figure 1 for Stochastic Forward-Backward Deconvolution: Training Diffusion Models with Finite Noisy Datasets
Figure 2 for Stochastic Forward-Backward Deconvolution: Training Diffusion Models with Finite Noisy Datasets
Figure 3 for Stochastic Forward-Backward Deconvolution: Training Diffusion Models with Finite Noisy Datasets
Figure 4 for Stochastic Forward-Backward Deconvolution: Training Diffusion Models with Finite Noisy Datasets
Viaarxiv icon

BridgePure: Revealing the Fragility of Black-box Data Protection

Add code
Dec 30, 2024
Viaarxiv icon

Unlocking The Potential of Adaptive Attacks on Diffusion-Based Purification

Add code
Nov 25, 2024
Figure 1 for Unlocking The Potential of Adaptive Attacks on Diffusion-Based Purification
Figure 2 for Unlocking The Potential of Adaptive Attacks on Diffusion-Based Purification
Figure 3 for Unlocking The Potential of Adaptive Attacks on Diffusion-Based Purification
Figure 4 for Unlocking The Potential of Adaptive Attacks on Diffusion-Based Purification
Viaarxiv icon

One Sample Fits All: Approximating All Probabilistic Values Simultaneously and Efficiently

Add code
Oct 31, 2024
Figure 1 for One Sample Fits All: Approximating All Probabilistic Values Simultaneously and Efficiently
Figure 2 for One Sample Fits All: Approximating All Probabilistic Values Simultaneously and Efficiently
Figure 3 for One Sample Fits All: Approximating All Probabilistic Values Simultaneously and Efficiently
Figure 4 for One Sample Fits All: Approximating All Probabilistic Values Simultaneously and Efficiently
Viaarxiv icon