Picture for Dongqi Han

Dongqi Han

The VEP Booster: A Closed-Loop AI System for Visual EEG Biomarker Auto-generation

Add code
Jul 21, 2024
Viaarxiv icon

Advancing Spiking Neural Networks for Sequential Modeling with Central Pattern Generators

Add code
May 23, 2024
Figure 1 for Advancing Spiking Neural Networks for Sequential Modeling with Central Pattern Generators
Figure 2 for Advancing Spiking Neural Networks for Sequential Modeling with Central Pattern Generators
Figure 3 for Advancing Spiking Neural Networks for Sequential Modeling with Central Pattern Generators
Figure 4 for Advancing Spiking Neural Networks for Sequential Modeling with Central Pattern Generators
Viaarxiv icon

Understanding Training-free Diffusion Guidance: Mechanisms and Limitations

Add code
Mar 19, 2024
Viaarxiv icon

Efficient and Effective Time-Series Forecasting with Spiking Neural Networks

Add code
Feb 02, 2024
Viaarxiv icon

Toward Open-ended Embodied Tasks Solving

Add code
Dec 10, 2023
Viaarxiv icon

AdaMedGraph: Adaboosting Graph Neural Networks for Personalized Medicine

Add code
Nov 24, 2023
Viaarxiv icon

Energy-Efficient Visual Search by Eye Movement and Low-Latency Spiking Neural Network

Add code
Oct 10, 2023
Viaarxiv icon

Habits and goals in synergy: a variational Bayesian framework for behavior

Add code
Apr 11, 2023
Viaarxiv icon

threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning

Add code
Nov 08, 2021
Figure 1 for threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Figure 2 for threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Figure 3 for threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Figure 4 for threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Viaarxiv icon

DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications

Add code
Sep 23, 2021
Figure 1 for DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications
Figure 2 for DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications
Figure 3 for DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications
Figure 4 for DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications
Viaarxiv icon