Picture for Xin Zhao

Xin Zhao

JD.com

Optimizing AUV speed dynamics with a data-driven Koopman operator approach

Add code
Mar 11, 2025
Viaarxiv icon

Every FLOP Counts: Scaling a 300B Mixture-of-Experts LING LLM without Premium GPUs

Add code
Mar 07, 2025
Figure 1 for Every FLOP Counts: Scaling a 300B Mixture-of-Experts LING LLM without Premium GPUs
Figure 2 for Every FLOP Counts: Scaling a 300B Mixture-of-Experts LING LLM without Premium GPUs
Figure 3 for Every FLOP Counts: Scaling a 300B Mixture-of-Experts LING LLM without Premium GPUs
Figure 4 for Every FLOP Counts: Scaling a 300B Mixture-of-Experts LING LLM without Premium GPUs
Viaarxiv icon

C-3PO: Compact Plug-and-Play Proxy Optimization to Achieve Human-like Retrieval-Augmented Generation

Add code
Feb 10, 2025
Figure 1 for C-3PO: Compact Plug-and-Play Proxy Optimization to Achieve Human-like Retrieval-Augmented Generation
Figure 2 for C-3PO: Compact Plug-and-Play Proxy Optimization to Achieve Human-like Retrieval-Augmented Generation
Figure 3 for C-3PO: Compact Plug-and-Play Proxy Optimization to Achieve Human-like Retrieval-Augmented Generation
Figure 4 for C-3PO: Compact Plug-and-Play Proxy Optimization to Achieve Human-like Retrieval-Augmented Generation
Viaarxiv icon

Neuron Empirical Gradient: Connecting Neurons' Linear Controllability and Representational Capacity

Add code
Dec 24, 2024
Viaarxiv icon

IDEA-Bench: How Far are Generative Models from Professional Designing?

Add code
Dec 16, 2024
Figure 1 for IDEA-Bench: How Far are Generative Models from Professional Designing?
Figure 2 for IDEA-Bench: How Far are Generative Models from Professional Designing?
Figure 3 for IDEA-Bench: How Far are Generative Models from Professional Designing?
Figure 4 for IDEA-Bench: How Far are Generative Models from Professional Designing?
Viaarxiv icon

Antelope: Potent and Concealed Jailbreak Attack Strategy

Add code
Dec 11, 2024
Viaarxiv icon

Buster: Incorporating Backdoor Attacks into Text Encoder to Mitigate NSFW Content Generation

Add code
Dec 10, 2024
Figure 1 for Buster: Incorporating Backdoor Attacks into Text Encoder to Mitigate NSFW Content Generation
Figure 2 for Buster: Incorporating Backdoor Attacks into Text Encoder to Mitigate NSFW Content Generation
Figure 3 for Buster: Incorporating Backdoor Attacks into Text Encoder to Mitigate NSFW Content Generation
Figure 4 for Buster: Incorporating Backdoor Attacks into Text Encoder to Mitigate NSFW Content Generation
Viaarxiv icon

Break the ID-Language Barrier: An Adaption Framework for Sequential Recommendation

Add code
Nov 27, 2024
Figure 1 for Break the ID-Language Barrier: An Adaption Framework for Sequential Recommendation
Figure 2 for Break the ID-Language Barrier: An Adaption Framework for Sequential Recommendation
Figure 3 for Break the ID-Language Barrier: An Adaption Framework for Sequential Recommendation
Figure 4 for Break the ID-Language Barrier: An Adaption Framework for Sequential Recommendation
Viaarxiv icon

Morph: A Motion-free Physics Optimization Framework for Human Motion Generation

Add code
Nov 22, 2024
Viaarxiv icon

Can LVLMs Describe Videos like Humans? A Five-in-One Video Annotations Benchmark for Better Human-Machine Comparison

Add code
Oct 20, 2024
Figure 1 for Can LVLMs Describe Videos like Humans? A Five-in-One Video Annotations Benchmark for Better Human-Machine Comparison
Figure 2 for Can LVLMs Describe Videos like Humans? A Five-in-One Video Annotations Benchmark for Better Human-Machine Comparison
Figure 3 for Can LVLMs Describe Videos like Humans? A Five-in-One Video Annotations Benchmark for Better Human-Machine Comparison
Figure 4 for Can LVLMs Describe Videos like Humans? A Five-in-One Video Annotations Benchmark for Better Human-Machine Comparison
Viaarxiv icon