Picture for Junjie Wang

Junjie Wang

Sid

Joint Secrecy Rate Achieving and Authentication Enhancement via Tag-based Encoding in Chaotic UAV Communication Environment

Add code
Jan 06, 2025
Figure 1 for Joint Secrecy Rate Achieving and Authentication Enhancement via Tag-based Encoding in Chaotic UAV Communication Environment
Figure 2 for Joint Secrecy Rate Achieving and Authentication Enhancement via Tag-based Encoding in Chaotic UAV Communication Environment
Figure 3 for Joint Secrecy Rate Achieving and Authentication Enhancement via Tag-based Encoding in Chaotic UAV Communication Environment
Figure 4 for Joint Secrecy Rate Achieving and Authentication Enhancement via Tag-based Encoding in Chaotic UAV Communication Environment
Viaarxiv icon

Understanding Individual Agent Importance in Multi-Agent System via Counterfactual Reasoning

Add code
Dec 23, 2024
Viaarxiv icon

What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context

Add code
Dec 17, 2024
Figure 1 for What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context
Figure 2 for What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context
Figure 3 for What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context
Figure 4 for What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context
Viaarxiv icon

Multi-Domain Features Guided Supervised Contrastive Learning for Radar Target Detection

Add code
Dec 17, 2024
Viaarxiv icon

From Allies to Adversaries: Manipulating LLM Tool-Calling through Adversarial Injection

Add code
Dec 13, 2024
Viaarxiv icon

Multi-path Exploration and Feedback Adjustment for Text-to-Image Person Retrieval

Add code
Oct 26, 2024
Figure 1 for Multi-path Exploration and Feedback Adjustment for Text-to-Image Person Retrieval
Figure 2 for Multi-path Exploration and Feedback Adjustment for Text-to-Image Person Retrieval
Figure 3 for Multi-path Exploration and Feedback Adjustment for Text-to-Image Person Retrieval
Figure 4 for Multi-path Exploration and Feedback Adjustment for Text-to-Image Person Retrieval
Viaarxiv icon

CodePurify: Defend Backdoor Attacks on Neural Code Models via Entropy-based Purification

Add code
Oct 26, 2024
Figure 1 for CodePurify: Defend Backdoor Attacks on Neural Code Models via Entropy-based Purification
Figure 2 for CodePurify: Defend Backdoor Attacks on Neural Code Models via Entropy-based Purification
Figure 3 for CodePurify: Defend Backdoor Attacks on Neural Code Models via Entropy-based Purification
Figure 4 for CodePurify: Defend Backdoor Attacks on Neural Code Models via Entropy-based Purification
Viaarxiv icon

TorchTitan: One-stop PyTorch native solution for production ready LLM pre-training

Add code
Oct 09, 2024
Viaarxiv icon

Data-Efficient Massive Tool Retrieval: A Reinforcement Learning Approach for Query-Tool Alignment with Language Models

Add code
Oct 04, 2024
Figure 1 for Data-Efficient Massive Tool Retrieval: A Reinforcement Learning Approach for Query-Tool Alignment with Language Models
Figure 2 for Data-Efficient Massive Tool Retrieval: A Reinforcement Learning Approach for Query-Tool Alignment with Language Models
Figure 3 for Data-Efficient Massive Tool Retrieval: A Reinforcement Learning Approach for Query-Tool Alignment with Language Models
Figure 4 for Data-Efficient Massive Tool Retrieval: A Reinforcement Learning Approach for Query-Tool Alignment with Language Models
Viaarxiv icon

The Llama 3 Herd of Models

Add code
Jul 31, 2024
Viaarxiv icon