Picture for Yuhong Yang

Yuhong Yang

Tutor-Student Reinforcement Learning: A Dynamic Curriculum for Robust Deepfake Detection

Add code
Mar 25, 2026
Viaarxiv icon

DeformTrace: A Deformable State Space Model with Relay Tokens for Temporal Forgery Localization

Add code
Mar 05, 2026
Viaarxiv icon

GEM-TFL: Bridging Weak and Full Supervision for Forgery Localization through EM-Guided Decomposition and Temporal Refinement

Add code
Mar 05, 2026
Viaarxiv icon

On damage of interpolation to adversarial robustness in regression

Add code
Jan 22, 2026
Viaarxiv icon

Seed1.5-VL Technical Report

Add code
May 11, 2025
Figure 1 for Seed1.5-VL Technical Report
Figure 2 for Seed1.5-VL Technical Report
Figure 3 for Seed1.5-VL Technical Report
Figure 4 for Seed1.5-VL Technical Report
Viaarxiv icon

RayFlow: Instance-Aware Diffusion Acceleration via Adaptive Flow Trajectories

Add code
Mar 10, 2025
Figure 1 for RayFlow: Instance-Aware Diffusion Acceleration via Adaptive Flow Trajectories
Figure 2 for RayFlow: Instance-Aware Diffusion Acceleration via Adaptive Flow Trajectories
Figure 3 for RayFlow: Instance-Aware Diffusion Acceleration via Adaptive Flow Trajectories
Figure 4 for RayFlow: Instance-Aware Diffusion Acceleration via Adaptive Flow Trajectories
Viaarxiv icon

Improving Speech Enhancement by Cross- and Sub-band Processing with State Space Model

Add code
Feb 22, 2025
Figure 1 for Improving Speech Enhancement by Cross- and Sub-band Processing with State Space Model
Figure 2 for Improving Speech Enhancement by Cross- and Sub-band Processing with State Space Model
Figure 3 for Improving Speech Enhancement by Cross- and Sub-band Processing with State Space Model
Figure 4 for Improving Speech Enhancement by Cross- and Sub-band Processing with State Space Model
Viaarxiv icon

Model Privacy: A Unified Framework to Understand Model Stealing Attacks and Defenses

Add code
Feb 21, 2025
Figure 1 for Model Privacy: A Unified Framework to Understand Model Stealing Attacks and Defenses
Figure 2 for Model Privacy: A Unified Framework to Understand Model Stealing Attacks and Defenses
Figure 3 for Model Privacy: A Unified Framework to Understand Model Stealing Attacks and Defenses
Figure 4 for Model Privacy: A Unified Framework to Understand Model Stealing Attacks and Defenses
Viaarxiv icon

FreeCodec: A disentangled neural speech codec with fewer tokens

Add code
Dec 02, 2024
Figure 1 for FreeCodec: A disentangled neural speech codec with fewer tokens
Figure 2 for FreeCodec: A disentangled neural speech codec with fewer tokens
Figure 3 for FreeCodec: A disentangled neural speech codec with fewer tokens
Figure 4 for FreeCodec: A disentangled neural speech codec with fewer tokens
Viaarxiv icon

Golden Ratio-Based Sufficient Dimension Reduction

Add code
Oct 25, 2024
Figure 1 for Golden Ratio-Based Sufficient Dimension Reduction
Figure 2 for Golden Ratio-Based Sufficient Dimension Reduction
Figure 3 for Golden Ratio-Based Sufficient Dimension Reduction
Figure 4 for Golden Ratio-Based Sufficient Dimension Reduction
Viaarxiv icon