no code implementations • 15 May 2025 • Zemin Huang, Zhiyang Chen, Zijun Wang, Tiancheng Li, Guo-Jun Qi
DCoLT treats each intermediate step in the reverse diffusion process as a latent "thinking" action and optimizes the entire reasoning trajectory to maximize the reward on the correctness of the final answer with outcome-based Reinforcement Learning (RL).
no code implementations • 13 May 2025 • Zijun Wang, Rama Kiran, Jinesh Nair, Chien-Hua Chen, Tzu-Han Chou, Shawn Tsai, Rui Zhang
This paper proposes an adaptive near-field beam training method to enhance performance in multi-user and multipath environments.
no code implementations • 2 Apr 2025 • Zijun Wang, Haoqin Tu, YuHan Wang, Juncheng Wu, Jieru Mei, Brian R. Bartoldson, Bhavya Kailkhura, Cihang Xie
This paper introduces STAR-1, a high-quality, just-1k-scale safety dataset specifically designed for large reasoning models (LRMs) like DeepSeek-R1.
no code implementations • 27 Mar 2025 • Zijun Wang, Rama Kiran, Shawn Tsai, Rui Zhang
Extremely large antenna arrays (ELAAs) operating in high-frequency bands have spurred the development of near-field communication, driving advancements in beam training design.
1 code implementation • 11 Mar 2025 • Changxing Liu, Genjia Liu, Zijun Wang, Jinchang Yang, Siheng Chen
Vehicle-to-vehicle (V2V) cooperative autonomous driving holds great promise for improving safety by addressing the perception and prediction uncertainties inherent in single-agent systems.
no code implementations • 5 Mar 2025 • Wenrui Cheng, Tiantian Zhu, Chunlin Xiong, Haofei Sun, Zijun Wang, Shunan Jing, Mingqi Lv, Yan Chen
Recently, provenance-based intrusion detection systems (PIDSes) have been widely proposed for endpoint threat analysis.
1 code implementation • CVPR 2025 • Zhu Liu, Zijun Wang, JinYuan Liu, Fanqi Meng, Long Ma, Risheng Liu
The scarcity of high-quality infrared data, coupled with the challenges of dynamic, intricate degradations, makes it difficult to recover details using existing methods.
1 code implementation • 11 Oct 2024 • Zijun Wang, Haoqin Tu, Jieru Mei, Bingchen Zhao, Yisen Wang, Cihang Xie
This paper studies the vulnerabilities of transformer-based Large Language Models (LLMs) to jailbreaking attacks, focusing specifically on the optimization-based Greedy Coordinate Gradient (GCG) strategy.
1 code implementation • 27 Nov 2023 • Haoqin Tu, Chenhang Cui, Zijun Wang, Yiyang Zhou, Bingchen Zhao, Junlin Han, Wangchunshu Zhou, Huaxiu Yao, Cihang Xie
Different from prior studies, we shift our focus from evaluating standard performance to introducing a comprehensive safety evaluation suite, covering both out-of-distribution (OOD) generalization and adversarial robustness.
1 code implementation • 15 Jun 2023 • Yiming Li, Sihang Li, Xinhao Liu, Moonjun Gong, Kenan Li, Nuo Chen, Zijun Wang, Zhiheng Li, Tao Jiang, Fisher Yu, Yue Wang, Hang Zhao, Zhiding Yu, Chen Feng
Monocular scene understanding is a foundational component of autonomous systems.
3D Semantic Scene Completion
3D Semantic Scene Completion from a single 2D image
1 code implementation • 31 May 2022 • Fei Shen, Zhe Wang, Zijun Wang, Xiaode Fu, Jiayi Chen, Xiaoyu Du, Jinhui Tang
Vision-based pattern identification (such as face, fingerprint, iris etc.)
2 code implementations • 18 May 2022 • Jie Xiang, Yun Wang, Lifeng An, Haiyang Liu, Zijun Wang, Jian Liu
Although existing monocular depth estimation methods have made great progress, predicting an accurate absolute depth map from a single image is still challenging due to the limited modeling capacity of networks and the scale ambiguity issue.
1 code implementation • 11 Aug 2018 • Wei Tan, Shiyu Chang, Liana Fong, Cheng Li, Zijun Wang, Liangliang Cao
Current MF implementations are either optimized for a single machine or with a need of a large computer cluster but still are insufficient.