Alert button
Picture for Yufan Zhuang

Yufan Zhuang

Alert button

Learning a Decision Tree Algorithm with Transformers

Add code
Bookmark button
Alert button
Feb 06, 2024
Yufan Zhuang, Liyuan Liu, Chandan Singh, Jingbo Shang, Jianfeng Gao

Viaarxiv icon

Waveformer: Linear-Time Attention with Forward and Backward Wavelet Transform

Add code
Bookmark button
Alert button
Oct 05, 2022
Yufan Zhuang, Zihan Wang, Fangbo Tao, Jingbo Shang

Figure 1 for Waveformer: Linear-Time Attention with Forward and Backward Wavelet Transform
Figure 2 for Waveformer: Linear-Time Attention with Forward and Backward Wavelet Transform
Figure 3 for Waveformer: Linear-Time Attention with Forward and Backward Wavelet Transform
Figure 4 for Waveformer: Linear-Time Attention with Forward and Backward Wavelet Transform
Viaarxiv icon

Reconfigurable Intelligent Surface Assisted OFDM Relaying: Subcarrier Matching with Balanced SNR

Add code
Bookmark button
Alert button
Mar 03, 2022
Tong Zhang, Shuai Wang, Yufan Zhuang, Changsheng You, Miaowen Wen, Yik-Chung Wu

Figure 1 for Reconfigurable Intelligent Surface Assisted OFDM Relaying: Subcarrier Matching with Balanced SNR
Figure 2 for Reconfigurable Intelligent Surface Assisted OFDM Relaying: Subcarrier Matching with Balanced SNR
Figure 3 for Reconfigurable Intelligent Surface Assisted OFDM Relaying: Subcarrier Matching with Balanced SNR
Figure 4 for Reconfigurable Intelligent Surface Assisted OFDM Relaying: Subcarrier Matching with Balanced SNR
Viaarxiv icon

Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection

Add code
Bookmark button
Alert button
Nov 10, 2021
Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Jim Laredo, Alessandro Morari

Figure 1 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Figure 2 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Figure 3 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Figure 4 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Viaarxiv icon

Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation

Add code
Bookmark button
Alert button
Sep 07, 2021
Yufan Zhuang, Sahil Suneja, Veronika Thost, Giacomo Domeniconi, Alessandro Morari, Jim Laredo

Figure 1 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Figure 2 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Figure 3 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Figure 4 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Viaarxiv icon

Probing Model Signal-Awareness via Prediction-Preserving Input Minimization

Add code
Bookmark button
Alert button
Nov 25, 2020
Yunhui Zheng, Sahil Suneja, Yufan Zhuang, Alessandro Morari, Jim Laredo

Figure 1 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Figure 2 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Figure 3 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Figure 4 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Viaarxiv icon

Exploring Software Naturalness through Neural Language Models

Add code
Bookmark button
Alert button
Jun 24, 2020
Luca Buratti, Saurabh Pujar, Mihaela Bornea, Scott McCarley, Yunhui Zheng, Gaetano Rossiello, Alessandro Morari, Jim Laredo, Veronika Thost, Yufan Zhuang, Giacomo Domeniconi

Figure 1 for Exploring Software Naturalness through Neural Language Models
Figure 2 for Exploring Software Naturalness through Neural Language Models
Figure 3 for Exploring Software Naturalness through Neural Language Models
Figure 4 for Exploring Software Naturalness through Neural Language Models
Viaarxiv icon

Exploring Software Naturalness throughNeural Language Models

Add code
Bookmark button
Alert button
Jun 22, 2020
Luca Buratti, Saurabh Pujar, Mihaela Bornea, Scott McCarley, Yunhui Zheng, Gaetano Rossiello, Alessandro Morari, Jim Laredo, Veronika Thost, Yufan Zhuang, Giacomo Domeniconi

Figure 1 for Exploring Software Naturalness throughNeural Language Models
Figure 2 for Exploring Software Naturalness throughNeural Language Models
Figure 3 for Exploring Software Naturalness throughNeural Language Models
Figure 4 for Exploring Software Naturalness throughNeural Language Models
Viaarxiv icon

Learning to map source code to software vulnerability using code-as-a-graph

Add code
Bookmark button
Alert button
Jun 15, 2020
Sahil Suneja, Yunhui Zheng, Yufan Zhuang, Jim Laredo, Alessandro Morari

Figure 1 for Learning to map source code to software vulnerability using code-as-a-graph
Figure 2 for Learning to map source code to software vulnerability using code-as-a-graph
Figure 3 for Learning to map source code to software vulnerability using code-as-a-graph
Figure 4 for Learning to map source code to software vulnerability using code-as-a-graph
Viaarxiv icon