Picture for Jianxing Liu

Jianxing Liu

Graph Counselor: Adaptive Graph Exploration via Multi-Agent Synergy to Enhance LLM Reasoning

Add code
Jun 04, 2025
Viaarxiv icon

Boost, Disentangle, and Customize: A Robust System2-to-System1 Pipeline for Code Generation

Add code
Feb 18, 2025
Figure 1 for Boost, Disentangle, and Customize: A Robust System2-to-System1 Pipeline for Code Generation
Figure 2 for Boost, Disentangle, and Customize: A Robust System2-to-System1 Pipeline for Code Generation
Figure 3 for Boost, Disentangle, and Customize: A Robust System2-to-System1 Pipeline for Code Generation
Figure 4 for Boost, Disentangle, and Customize: A Robust System2-to-System1 Pipeline for Code Generation
Viaarxiv icon

Enhancing Adversarial Transferability via Information Bottleneck Constraints

Add code
Jun 08, 2024
Figure 1 for Enhancing Adversarial Transferability via Information Bottleneck Constraints
Figure 2 for Enhancing Adversarial Transferability via Information Bottleneck Constraints
Figure 3 for Enhancing Adversarial Transferability via Information Bottleneck Constraints
Figure 4 for Enhancing Adversarial Transferability via Information Bottleneck Constraints
Viaarxiv icon

SMR: State Memory Replay for Long Sequence Modeling

Add code
May 27, 2024
Viaarxiv icon

Contrastive Augmented Graph2Graph Memory Interaction for Few Shot Continual Learning

Add code
Mar 07, 2024
Figure 1 for Contrastive Augmented Graph2Graph Memory Interaction for Few Shot Continual Learning
Figure 2 for Contrastive Augmented Graph2Graph Memory Interaction for Few Shot Continual Learning
Figure 3 for Contrastive Augmented Graph2Graph Memory Interaction for Few Shot Continual Learning
Figure 4 for Contrastive Augmented Graph2Graph Memory Interaction for Few Shot Continual Learning
Viaarxiv icon

Interactive Continual Learning: Fast and Slow Thinking

Add code
Mar 05, 2024
Viaarxiv icon

Investigating Deep Watermark Security: An Adversarial Transferability Perspective

Add code
Feb 26, 2024
Figure 1 for Investigating Deep Watermark Security: An Adversarial Transferability Perspective
Figure 2 for Investigating Deep Watermark Security: An Adversarial Transferability Perspective
Figure 3 for Investigating Deep Watermark Security: An Adversarial Transferability Perspective
Figure 4 for Investigating Deep Watermark Security: An Adversarial Transferability Perspective
Viaarxiv icon