Picture for Qing Wang

Qing Wang

HandSplat: Embedding-Driven Gaussian Splatting for High-Fidelity Hand Rendering

Add code
Mar 18, 2025
Viaarxiv icon

Ticktack : Long Span Temporal Alignment of Large Language Models Leveraging Sexagenary Cycle Time Expression

Add code
Mar 07, 2025
Viaarxiv icon

NTR-Gaussian: Nighttime Dynamic Thermal Reconstruction with 4D Gaussian Splatting Based on Thermodynamics

Add code
Mar 05, 2025
Viaarxiv icon

Depth-Adaptive Graph Neural Networks via Learnable Bakry-'Emery Curvature

Add code
Mar 03, 2025
Viaarxiv icon

PhenoProfiler: Advancing Phenotypic Learning for Image-based Drug Discovery

Add code
Feb 26, 2025
Viaarxiv icon

Mimicking the Familiar: Dynamic Command Generation for Information Theft Attacks in LLM Tool-Learning System

Add code
Feb 17, 2025
Viaarxiv icon

SS4Rec: Continuous-Time Sequential Recommendation with State Space Models

Add code
Feb 12, 2025
Viaarxiv icon

Divergence-Augmented Policy Optimization

Add code
Jan 25, 2025
Viaarxiv icon

An Experimental Study on Joint Modeling for Sound Event Localization and Detection with Source Distance Estimation

Add code
Jan 18, 2025
Figure 1 for An Experimental Study on Joint Modeling for Sound Event Localization and Detection with Source Distance Estimation
Figure 2 for An Experimental Study on Joint Modeling for Sound Event Localization and Detection with Source Distance Estimation
Figure 3 for An Experimental Study on Joint Modeling for Sound Event Localization and Detection with Source Distance Estimation
Figure 4 for An Experimental Study on Joint Modeling for Sound Event Localization and Detection with Source Distance Estimation
Viaarxiv icon

DiffAttack: Diffusion-based Timbre-reserved Adversarial Attack in Speaker Identification

Add code
Jan 09, 2025
Figure 1 for DiffAttack: Diffusion-based Timbre-reserved Adversarial Attack in Speaker Identification
Figure 2 for DiffAttack: Diffusion-based Timbre-reserved Adversarial Attack in Speaker Identification
Figure 3 for DiffAttack: Diffusion-based Timbre-reserved Adversarial Attack in Speaker Identification
Figure 4 for DiffAttack: Diffusion-based Timbre-reserved Adversarial Attack in Speaker Identification
Viaarxiv icon