Picture for Mingyang Li

Mingyang Li

Mimicking the Familiar: Dynamic Command Generation for Information Theft Attacks in LLM Tool-Learning System

Add code
Feb 17, 2025
Viaarxiv icon

GENERator: A Long-Context Generative Genomic Foundation Model

Add code
Feb 11, 2025
Viaarxiv icon

Unpaired Translation of Point Clouds for Modeling Detector Response

Add code
Jan 30, 2025
Figure 1 for Unpaired Translation of Point Clouds for Modeling Detector Response
Figure 2 for Unpaired Translation of Point Clouds for Modeling Detector Response
Figure 3 for Unpaired Translation of Point Clouds for Modeling Detector Response
Figure 4 for Unpaired Translation of Point Clouds for Modeling Detector Response
Viaarxiv icon

SpikSSD: Better Extraction and Fusion for Object Detection with Spiking Neuron Networks

Add code
Jan 25, 2025
Viaarxiv icon

ProtCLIP: Function-Informed Protein Multi-Modal Learning

Add code
Dec 28, 2024
Viaarxiv icon

What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context

Add code
Dec 17, 2024
Figure 1 for What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context
Figure 2 for What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context
Figure 3 for What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context
Figure 4 for What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context
Viaarxiv icon

From Allies to Adversaries: Manipulating LLM Tool-Calling through Adversarial Injection

Add code
Dec 13, 2024
Viaarxiv icon

Through the Curved Cover: Synthesizing Cover Aberrated Scenes with Refractive Field

Add code
Nov 10, 2024
Viaarxiv icon

Bridge-IF: Learning Inverse Protein Folding with Markov Bridges

Add code
Nov 04, 2024
Figure 1 for Bridge-IF: Learning Inverse Protein Folding with Markov Bridges
Figure 2 for Bridge-IF: Learning Inverse Protein Folding with Markov Bridges
Figure 3 for Bridge-IF: Learning Inverse Protein Folding with Markov Bridges
Figure 4 for Bridge-IF: Learning Inverse Protein Folding with Markov Bridges
Viaarxiv icon

CodePurify: Defend Backdoor Attacks on Neural Code Models via Entropy-based Purification

Add code
Oct 26, 2024
Figure 1 for CodePurify: Defend Backdoor Attacks on Neural Code Models via Entropy-based Purification
Figure 2 for CodePurify: Defend Backdoor Attacks on Neural Code Models via Entropy-based Purification
Figure 3 for CodePurify: Defend Backdoor Attacks on Neural Code Models via Entropy-based Purification
Figure 4 for CodePurify: Defend Backdoor Attacks on Neural Code Models via Entropy-based Purification
Viaarxiv icon