Picture for Yongxin Chen

Yongxin Chen

Accelerating Gaussian Variational Inference for Motion Planning Under Uncertainty

Add code
Nov 05, 2024
Viaarxiv icon

Path Integral Control for Hybrid Dynamical Systems

Add code
Nov 01, 2024
Viaarxiv icon

Improving Neural Optimal Transport via Displacement Interpolation

Add code
Oct 03, 2024
Figure 1 for Improving Neural Optimal Transport via Displacement Interpolation
Figure 2 for Improving Neural Optimal Transport via Displacement Interpolation
Figure 3 for Improving Neural Optimal Transport via Displacement Interpolation
Figure 4 for Improving Neural Optimal Transport via Displacement Interpolation
Viaarxiv icon

Plug-and-Play Controllable Generation for Discrete Masked Models

Add code
Oct 03, 2024
Viaarxiv icon

Generative Factor Chaining: Coordinated Manipulation with Diffusion-based Factor Graph

Add code
Sep 24, 2024
Viaarxiv icon

Masked Diffusion Models are Secretly Time-Agnostic Masked Models and Exploit Inaccurate Categorical Sampling

Add code
Sep 04, 2024
Figure 1 for Masked Diffusion Models are Secretly Time-Agnostic Masked Models and Exploit Inaccurate Categorical Sampling
Figure 2 for Masked Diffusion Models are Secretly Time-Agnostic Masked Models and Exploit Inaccurate Categorical Sampling
Figure 3 for Masked Diffusion Models are Secretly Time-Agnostic Masked Models and Exploit Inaccurate Categorical Sampling
Figure 4 for Masked Diffusion Models are Secretly Time-Agnostic Masked Models and Exploit Inaccurate Categorical Sampling
Viaarxiv icon

Provable Benefit of Annealed Langevin Monte Carlo for Non-log-concave Sampling

Add code
Jul 24, 2024
Viaarxiv icon

QueST: Self-Supervised Skill Abstractions for Learning Continuous Control

Add code
Jul 23, 2024
Viaarxiv icon

Novel clustered federated learning based on local loss

Add code
Jul 12, 2024
Viaarxiv icon

Diffusion Policy Attacker: Crafting Adversarial Attacks for Diffusion-based Policies

Add code
May 29, 2024
Figure 1 for Diffusion Policy Attacker: Crafting Adversarial Attacks for Diffusion-based Policies
Figure 2 for Diffusion Policy Attacker: Crafting Adversarial Attacks for Diffusion-based Policies
Figure 3 for Diffusion Policy Attacker: Crafting Adversarial Attacks for Diffusion-based Policies
Figure 4 for Diffusion Policy Attacker: Crafting Adversarial Attacks for Diffusion-based Policies
Viaarxiv icon