Picture for Cong Wang

Cong Wang

Zhejiang University, Hangzhou, China

Underload: Defending against Latency Attacks for Object Detectors on Edge Devices

Add code
Dec 03, 2024
Viaarxiv icon

ONION: Physics-Informed Deep Learning Model for Line Integral Diagnostics Across Fusion Devices

Add code
Nov 27, 2024
Viaarxiv icon

FLMarket: Enabling Privacy-preserved Pre-training Data Pricing for Federated Learning

Add code
Nov 18, 2024
Figure 1 for FLMarket: Enabling Privacy-preserved Pre-training Data Pricing for Federated Learning
Figure 2 for FLMarket: Enabling Privacy-preserved Pre-training Data Pricing for Federated Learning
Figure 3 for FLMarket: Enabling Privacy-preserved Pre-training Data Pricing for Federated Learning
Figure 4 for FLMarket: Enabling Privacy-preserved Pre-training Data Pricing for Federated Learning
Viaarxiv icon

AdvDiffuser: Generating Adversarial Safety-Critical Driving Scenarios via Guided Diffusion

Add code
Oct 11, 2024
Viaarxiv icon

Task-unaware Lifelong Robot Learning with Retrieval-based Weighted Local Adaptation

Add code
Oct 03, 2024
Viaarxiv icon

Learning Adaptive Hydrodynamic Models Using Neural ODEs in Complex Conditions

Add code
Oct 01, 2024
Viaarxiv icon

EasyControl: Transfer ControlNet to Video Diffusion for Controllable Generation and Interpolation

Add code
Aug 23, 2024
Figure 1 for EasyControl: Transfer ControlNet to Video Diffusion for Controllable Generation and Interpolation
Figure 2 for EasyControl: Transfer ControlNet to Video Diffusion for Controllable Generation and Interpolation
Figure 3 for EasyControl: Transfer ControlNet to Video Diffusion for Controllable Generation and Interpolation
Figure 4 for EasyControl: Transfer ControlNet to Video Diffusion for Controllable Generation and Interpolation
Viaarxiv icon

Enhancing Modal Fusion by Alignment and Label Matching for Multimodal Emotion Recognition

Add code
Aug 18, 2024
Viaarxiv icon

A Debiased Nearest Neighbors Framework for Multi-Label Text Classification

Add code
Aug 06, 2024
Viaarxiv icon

Unveiling Privacy Vulnerabilities: Investigating the Role of Structure in Graph Data

Add code
Jul 26, 2024
Viaarxiv icon