Picture for Junjie Wang

Junjie Wang

Sid

OntoTune: Ontology-Driven Self-training for Aligning Large Language Models

Add code
Feb 08, 2025
Figure 1 for OntoTune: Ontology-Driven Self-training for Aligning Large Language Models
Figure 2 for OntoTune: Ontology-Driven Self-training for Aligning Large Language Models
Figure 3 for OntoTune: Ontology-Driven Self-training for Aligning Large Language Models
Figure 4 for OntoTune: Ontology-Driven Self-training for Aligning Large Language Models
Viaarxiv icon

Safe and Agile Transportation of Cable-Suspended Payload via Multiple Aerial Robots

Add code
Jan 25, 2025
Viaarxiv icon

Chain-of-Reasoning: Towards Unified Mathematical Reasoning in Large Language Models via a Multi-Paradigm Perspective

Add code
Jan 19, 2025
Viaarxiv icon

Joint Secrecy Rate Achieving and Authentication Enhancement via Tag-based Encoding in Chaotic UAV Communication Environment

Add code
Jan 06, 2025
Figure 1 for Joint Secrecy Rate Achieving and Authentication Enhancement via Tag-based Encoding in Chaotic UAV Communication Environment
Figure 2 for Joint Secrecy Rate Achieving and Authentication Enhancement via Tag-based Encoding in Chaotic UAV Communication Environment
Figure 3 for Joint Secrecy Rate Achieving and Authentication Enhancement via Tag-based Encoding in Chaotic UAV Communication Environment
Figure 4 for Joint Secrecy Rate Achieving and Authentication Enhancement via Tag-based Encoding in Chaotic UAV Communication Environment
Viaarxiv icon

Understanding Individual Agent Importance in Multi-Agent System via Counterfactual Reasoning

Add code
Dec 23, 2024
Viaarxiv icon

Multi-Domain Features Guided Supervised Contrastive Learning for Radar Target Detection

Add code
Dec 17, 2024
Viaarxiv icon

What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context

Add code
Dec 17, 2024
Figure 1 for What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context
Figure 2 for What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context
Figure 3 for What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context
Figure 4 for What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context
Viaarxiv icon

From Allies to Adversaries: Manipulating LLM Tool-Calling through Adversarial Injection

Add code
Dec 13, 2024
Viaarxiv icon

CodePurify: Defend Backdoor Attacks on Neural Code Models via Entropy-based Purification

Add code
Oct 26, 2024
Figure 1 for CodePurify: Defend Backdoor Attacks on Neural Code Models via Entropy-based Purification
Figure 2 for CodePurify: Defend Backdoor Attacks on Neural Code Models via Entropy-based Purification
Figure 3 for CodePurify: Defend Backdoor Attacks on Neural Code Models via Entropy-based Purification
Figure 4 for CodePurify: Defend Backdoor Attacks on Neural Code Models via Entropy-based Purification
Viaarxiv icon

Multi-path Exploration and Feedback Adjustment for Text-to-Image Person Retrieval

Add code
Oct 26, 2024
Figure 1 for Multi-path Exploration and Feedback Adjustment for Text-to-Image Person Retrieval
Figure 2 for Multi-path Exploration and Feedback Adjustment for Text-to-Image Person Retrieval
Figure 3 for Multi-path Exploration and Feedback Adjustment for Text-to-Image Person Retrieval
Figure 4 for Multi-path Exploration and Feedback Adjustment for Text-to-Image Person Retrieval
Viaarxiv icon