Picture for Yujun Cai

Yujun Cai

Enhancing LLM Character-Level Manipulation via Divide and Conquer

Add code
Feb 12, 2025
Viaarxiv icon

HyLiFormer: Hyperbolic Linear Attention for Skeleton-based Human Action Recognition

Add code
Feb 09, 2025
Viaarxiv icon

Lost in Edits? A $λ$-Compass for AIGC Provenance

Add code
Feb 05, 2025
Viaarxiv icon

Disentangling CLIP Features for Enhanced Localized Understanding

Add code
Feb 05, 2025
Viaarxiv icon

Are LLMs Really Not Knowledgable? Mining the Submerged Knowledge in LLMs' Memory

Add code
Dec 30, 2024
Viaarxiv icon

emg2pose: A Large and Diverse Benchmark for Surface Electromyographic Hand Pose Estimation

Add code
Dec 02, 2024
Figure 1 for emg2pose: A Large and Diverse Benchmark for Surface Electromyographic Hand Pose Estimation
Figure 2 for emg2pose: A Large and Diverse Benchmark for Surface Electromyographic Hand Pose Estimation
Figure 3 for emg2pose: A Large and Diverse Benchmark for Surface Electromyographic Hand Pose Estimation
Figure 4 for emg2pose: A Large and Diverse Benchmark for Surface Electromyographic Hand Pose Estimation
Viaarxiv icon

GradiSeg: Gradient-Guided Gaussian Segmentation with Enhanced 3D Boundary Precision

Add code
Nov 30, 2024
Viaarxiv icon

Exploring Visual Vulnerabilities via Multi-Loss Adversarial Search for Jailbreaking Vision-Language Models

Add code
Nov 27, 2024
Viaarxiv icon

DRS: Deep Question Reformulation With Structured Output

Add code
Nov 27, 2024
Figure 1 for DRS: Deep Question Reformulation With Structured Output
Figure 2 for DRS: Deep Question Reformulation With Structured Output
Figure 3 for DRS: Deep Question Reformulation With Structured Output
Figure 4 for DRS: Deep Question Reformulation With Structured Output
Viaarxiv icon

Vulnerability of LLMs to Vertically Aligned Text Manipulations

Add code
Oct 26, 2024
Figure 1 for Vulnerability of LLMs to Vertically Aligned Text Manipulations
Figure 2 for Vulnerability of LLMs to Vertically Aligned Text Manipulations
Figure 3 for Vulnerability of LLMs to Vertically Aligned Text Manipulations
Figure 4 for Vulnerability of LLMs to Vertically Aligned Text Manipulations
Viaarxiv icon