Picture for Yu Zhang

Yu Zhang

AI Lab, Netease

SlingBAG: Sliding ball adaptive growth algorithm with differentiable radiation enables super-efficient iterative 3D photoacoustic image reconstruction

Add code
Jul 16, 2024
Figure 1 for SlingBAG: Sliding ball adaptive growth algorithm with differentiable radiation enables super-efficient iterative 3D photoacoustic image reconstruction
Figure 2 for SlingBAG: Sliding ball adaptive growth algorithm with differentiable radiation enables super-efficient iterative 3D photoacoustic image reconstruction
Figure 3 for SlingBAG: Sliding ball adaptive growth algorithm with differentiable radiation enables super-efficient iterative 3D photoacoustic image reconstruction
Figure 4 for SlingBAG: Sliding ball adaptive growth algorithm with differentiable radiation enables super-efficient iterative 3D photoacoustic image reconstruction
Viaarxiv icon

Stabilizing Dynamic Systems through Neural Network Learning: A Robust Approach

Add code
Jul 13, 2024
Viaarxiv icon

MTMamba: Enhancing Multi-Task Dense Scene Understanding by Mamba-Based Decoders

Add code
Jul 02, 2024
Figure 1 for MTMamba: Enhancing Multi-Task Dense Scene Understanding by Mamba-Based Decoders
Figure 2 for MTMamba: Enhancing Multi-Task Dense Scene Understanding by Mamba-Based Decoders
Figure 3 for MTMamba: Enhancing Multi-Task Dense Scene Understanding by Mamba-Based Decoders
Figure 4 for MTMamba: Enhancing Multi-Task Dense Scene Understanding by Mamba-Based Decoders
Viaarxiv icon

Active Shadowing (ASD): Manipulating Visual Perception of Robotics Behaviors via Implicit Communication

Add code
Jul 01, 2024
Figure 1 for Active Shadowing (ASD): Manipulating Visual Perception of Robotics Behaviors via Implicit Communication
Figure 2 for Active Shadowing (ASD): Manipulating Visual Perception of Robotics Behaviors via Implicit Communication
Figure 3 for Active Shadowing (ASD): Manipulating Visual Perception of Robotics Behaviors via Implicit Communication
Figure 4 for Active Shadowing (ASD): Manipulating Visual Perception of Robotics Behaviors via Implicit Communication
Viaarxiv icon

Learning Retrieval Augmentation for Personalized Dialogue Generation

Add code
Jun 27, 2024
Figure 1 for Learning Retrieval Augmentation for Personalized Dialogue Generation
Figure 2 for Learning Retrieval Augmentation for Personalized Dialogue Generation
Figure 3 for Learning Retrieval Augmentation for Personalized Dialogue Generation
Figure 4 for Learning Retrieval Augmentation for Personalized Dialogue Generation
Viaarxiv icon

Selective Prompting Tuning for Personalized Conversations with LLMs

Add code
Jun 26, 2024
Figure 1 for Selective Prompting Tuning for Personalized Conversations with LLMs
Figure 2 for Selective Prompting Tuning for Personalized Conversations with LLMs
Figure 3 for Selective Prompting Tuning for Personalized Conversations with LLMs
Figure 4 for Selective Prompting Tuning for Personalized Conversations with LLMs
Viaarxiv icon

D2O:Dynamic Discriminative Operations for Efficient Generative Inference of Large Language Models

Add code
Jun 18, 2024
Figure 1 for D2O:Dynamic Discriminative Operations for Efficient Generative Inference of Large Language Models
Figure 2 for D2O:Dynamic Discriminative Operations for Efficient Generative Inference of Large Language Models
Figure 3 for D2O:Dynamic Discriminative Operations for Efficient Generative Inference of Large Language Models
Figure 4 for D2O:Dynamic Discriminative Operations for Efficient Generative Inference of Large Language Models
Viaarxiv icon

A Comprehensive Survey of Scientific Large Language Models and Their Applications in Scientific Discovery

Add code
Jun 16, 2024
Figure 1 for A Comprehensive Survey of Scientific Large Language Models and Their Applications in Scientific Discovery
Viaarxiv icon

On Security Weaknesses and Vulnerabilities in Deep Learning Systems

Add code
Jun 12, 2024
Figure 1 for On Security Weaknesses and Vulnerabilities in Deep Learning Systems
Figure 2 for On Security Weaknesses and Vulnerabilities in Deep Learning Systems
Figure 3 for On Security Weaknesses and Vulnerabilities in Deep Learning Systems
Figure 4 for On Security Weaknesses and Vulnerabilities in Deep Learning Systems
Viaarxiv icon

Parallelizing Linear Transformers with the Delta Rule over Sequence Length

Add code
Jun 10, 2024
Viaarxiv icon