Picture for Chen Yan

Chen Yan

A Nonlinear Hash-based Optimization Method for SpMV on GPUs

Add code
Apr 11, 2025
Figure 1 for A Nonlinear Hash-based Optimization Method for SpMV on GPUs
Figure 2 for A Nonlinear Hash-based Optimization Method for SpMV on GPUs
Figure 3 for A Nonlinear Hash-based Optimization Method for SpMV on GPUs
Figure 4 for A Nonlinear Hash-based Optimization Method for SpMV on GPUs
Viaarxiv icon

Achieving O(1/N) Optimality Gap in Restless Bandits through Diffusion Approximation

Add code
Oct 19, 2024
Figure 1 for Achieving O(1/N) Optimality Gap in Restless Bandits through Diffusion Approximation
Figure 2 for Achieving O(1/N) Optimality Gap in Restless Bandits through Diffusion Approximation
Figure 3 for Achieving O(1/N) Optimality Gap in Restless Bandits through Diffusion Approximation
Figure 4 for Achieving O(1/N) Optimality Gap in Restless Bandits through Diffusion Approximation
Viaarxiv icon

PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR

Add code
Sep 26, 2024
Figure 1 for PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR
Figure 2 for PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR
Figure 3 for PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR
Figure 4 for PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR
Viaarxiv icon

SafeEar: Content Privacy-Preserving Audio Deepfake Detection

Add code
Sep 14, 2024
Figure 1 for SafeEar: Content Privacy-Preserving Audio Deepfake Detection
Figure 2 for SafeEar: Content Privacy-Preserving Audio Deepfake Detection
Figure 3 for SafeEar: Content Privacy-Preserving Audio Deepfake Detection
Figure 4 for SafeEar: Content Privacy-Preserving Audio Deepfake Detection
Viaarxiv icon

Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection

Add code
Jul 23, 2024
Figure 1 for Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection
Figure 2 for Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection
Figure 3 for Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection
Figure 4 for Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection
Viaarxiv icon

SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models

Add code
Apr 10, 2024
Figure 1 for SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models
Figure 2 for SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models
Figure 3 for SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models
Figure 4 for SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models
Viaarxiv icon

Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time

Add code
Aug 03, 2023
Figure 1 for Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
Figure 2 for Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
Figure 3 for Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
Figure 4 for Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
Viaarxiv icon

Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound

Add code
Jun 28, 2023
Figure 1 for Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound
Figure 2 for Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound
Figure 3 for Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound
Figure 4 for Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound
Viaarxiv icon

Improving Multimodal Interactive Agents with Reinforcement Learning from Human Feedback

Add code
Nov 21, 2022
Viaarxiv icon

Intra-agent speech permits zero-shot task acquisition

Add code
Jun 07, 2022
Figure 1 for Intra-agent speech permits zero-shot task acquisition
Figure 2 for Intra-agent speech permits zero-shot task acquisition
Figure 3 for Intra-agent speech permits zero-shot task acquisition
Figure 4 for Intra-agent speech permits zero-shot task acquisition
Viaarxiv icon