Picture for Qingzhao Zhang

Qingzhao Zhang

Cocoon: Robust Multi-Modal Perception with Uncertainty-Aware Sensor Fusion

Add code
Oct 16, 2024
Figure 1 for Cocoon: Robust Multi-Modal Perception with Uncertainty-Aware Sensor Fusion
Figure 2 for Cocoon: Robust Multi-Modal Perception with Uncertainty-Aware Sensor Fusion
Figure 3 for Cocoon: Robust Multi-Modal Perception with Uncertainty-Aware Sensor Fusion
Figure 4 for Cocoon: Robust Multi-Modal Perception with Uncertainty-Aware Sensor Fusion
Viaarxiv icon

Compute Or Load KV Cache? Why Not Both?

Add code
Oct 04, 2024
Figure 1 for Compute Or Load KV Cache? Why Not Both?
Figure 2 for Compute Or Load KV Cache? Why Not Both?
Figure 3 for Compute Or Load KV Cache? Why Not Both?
Figure 4 for Compute Or Load KV Cache? Why Not Both?
Viaarxiv icon

Safeguard is a Double-edged Sword: Denial-of-service Attack on Large Language Models

Add code
Oct 03, 2024
Figure 1 for Safeguard is a Double-edged Sword: Denial-of-service Attack on Large Language Models
Figure 2 for Safeguard is a Double-edged Sword: Denial-of-service Attack on Large Language Models
Figure 3 for Safeguard is a Double-edged Sword: Denial-of-service Attack on Large Language Models
Figure 4 for Safeguard is a Double-edged Sword: Denial-of-service Attack on Large Language Models
Viaarxiv icon

Adaptive Skeleton Graph Decoding

Add code
Feb 19, 2024
Figure 1 for Adaptive Skeleton Graph Decoding
Figure 2 for Adaptive Skeleton Graph Decoding
Figure 3 for Adaptive Skeleton Graph Decoding
Figure 4 for Adaptive Skeleton Graph Decoding
Viaarxiv icon

Exploring the Limits of ChatGPT in Software Security Applications

Add code
Dec 08, 2023
Figure 1 for Exploring the Limits of ChatGPT in Software Security Applications
Figure 2 for Exploring the Limits of ChatGPT in Software Security Applications
Figure 3 for Exploring the Limits of ChatGPT in Software Security Applications
Figure 4 for Exploring the Limits of ChatGPT in Software Security Applications
Viaarxiv icon

On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures

Add code
Oct 03, 2023
Figure 1 for On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures
Figure 2 for On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures
Figure 3 for On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures
Figure 4 for On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures
Viaarxiv icon

CALICO: Self-Supervised Camera-LiDAR Contrastive Pre-training for BEV Perception

Add code
Jun 01, 2023
Figure 1 for CALICO: Self-Supervised Camera-LiDAR Contrastive Pre-training for BEV Perception
Figure 2 for CALICO: Self-Supervised Camera-LiDAR Contrastive Pre-training for BEV Perception
Figure 3 for CALICO: Self-Supervised Camera-LiDAR Contrastive Pre-training for BEV Perception
Figure 4 for CALICO: Self-Supervised Camera-LiDAR Contrastive Pre-training for BEV Perception
Viaarxiv icon

Benchmarking Robustness of 3D Point Cloud Recognition Against Common Corruptions

Add code
Jan 28, 2022
Figure 1 for Benchmarking Robustness of 3D Point Cloud Recognition Against Common Corruptions
Figure 2 for Benchmarking Robustness of 3D Point Cloud Recognition Against Common Corruptions
Figure 3 for Benchmarking Robustness of 3D Point Cloud Recognition Against Common Corruptions
Figure 4 for Benchmarking Robustness of 3D Point Cloud Recognition Against Common Corruptions
Viaarxiv icon

On Adversarial Robustness of Trajectory Prediction for Autonomous Vehicles

Add code
Jan 13, 2022
Figure 1 for On Adversarial Robustness of Trajectory Prediction for Autonomous Vehicles
Figure 2 for On Adversarial Robustness of Trajectory Prediction for Autonomous Vehicles
Figure 3 for On Adversarial Robustness of Trajectory Prediction for Autonomous Vehicles
Figure 4 for On Adversarial Robustness of Trajectory Prediction for Autonomous Vehicles
Viaarxiv icon