Picture for Yufan Zhuang

Yufan Zhuang

Vector-ICL: In-context Learning with Continuous Vector Representations

Add code
Oct 08, 2024
Viaarxiv icon

Data Contamination Can Cross Language Barriers

Add code
Jun 19, 2024
Viaarxiv icon

Learning a Decision Tree Algorithm with Transformers

Add code
Feb 06, 2024
Viaarxiv icon

Waveformer: Linear-Time Attention with Forward and Backward Wavelet Transform

Add code
Oct 05, 2022
Figure 1 for Waveformer: Linear-Time Attention with Forward and Backward Wavelet Transform
Figure 2 for Waveformer: Linear-Time Attention with Forward and Backward Wavelet Transform
Figure 3 for Waveformer: Linear-Time Attention with Forward and Backward Wavelet Transform
Figure 4 for Waveformer: Linear-Time Attention with Forward and Backward Wavelet Transform
Viaarxiv icon

Reconfigurable Intelligent Surface Assisted OFDM Relaying: Subcarrier Matching with Balanced SNR

Add code
Mar 03, 2022
Figure 1 for Reconfigurable Intelligent Surface Assisted OFDM Relaying: Subcarrier Matching with Balanced SNR
Figure 2 for Reconfigurable Intelligent Surface Assisted OFDM Relaying: Subcarrier Matching with Balanced SNR
Figure 3 for Reconfigurable Intelligent Surface Assisted OFDM Relaying: Subcarrier Matching with Balanced SNR
Figure 4 for Reconfigurable Intelligent Surface Assisted OFDM Relaying: Subcarrier Matching with Balanced SNR
Viaarxiv icon

Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection

Add code
Nov 10, 2021
Figure 1 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Figure 2 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Figure 3 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Figure 4 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Viaarxiv icon

Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation

Add code
Sep 07, 2021
Figure 1 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Figure 2 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Figure 3 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Figure 4 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Viaarxiv icon

Probing Model Signal-Awareness via Prediction-Preserving Input Minimization

Add code
Nov 25, 2020
Figure 1 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Figure 2 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Figure 3 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Figure 4 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Viaarxiv icon

Exploring Software Naturalness through Neural Language Models

Add code
Jun 24, 2020
Figure 1 for Exploring Software Naturalness through Neural Language Models
Figure 2 for Exploring Software Naturalness through Neural Language Models
Figure 3 for Exploring Software Naturalness through Neural Language Models
Figure 4 for Exploring Software Naturalness through Neural Language Models
Viaarxiv icon

Learning to map source code to software vulnerability using code-as-a-graph

Add code
Jun 15, 2020
Figure 1 for Learning to map source code to software vulnerability using code-as-a-graph
Figure 2 for Learning to map source code to software vulnerability using code-as-a-graph
Figure 3 for Learning to map source code to software vulnerability using code-as-a-graph
Figure 4 for Learning to map source code to software vulnerability using code-as-a-graph
Viaarxiv icon