Ziqiang Li, Hong Sun, Pengfei Xia, Beihao Xia, Xue Rui, Wei Zhang, Qinglang Guo, Zhangjie Fu, Bin Li A Proxy Attack-Free Strategy for Practically Improving the Poisoning Efficiency in Backdoor Attacks https://arxiv.org/abs/2306.08313
Scaling of Computational Order Parameters in Rydberg Atom Graph States https://arxiv.org/abs/2409.05941 Zhangjie Qin, V.W. Scarola
arXiv PDF link
Zhangjie Qin, V. W. Scarola Scaling of Computational Order Parameters in Rydberg Atom Graph States https://arxiv.org/abs/2409.05941
Ziqiang Li, Yueqi Zeng, Pengfei Xia, Lei Liu, Zhangjie Fu, Bin Li Large Language Models are Good Attackers: Efficient and Stealthy Textual Backdoor Attacks https://arxiv.org/abs/2408.11587
Zhangjie Qin, Daniel Azses, Eran Sela, Robert Raussendorf, V. W. Scarola Redundant string symmetry-based error correction: Demonstrations on quantum devices https://arxiv.org/abs/2310.12854
Thong Nguyen, Yi Bin, Junbin Xiao, Leigang Qu, Yicong Li, Jay Zhangjie Wu, Cong-Duy Nguyen, See-Kiong Ng, Luu Anh Tuan Video-Language Understanding: A Survey from Model Architecture, Model Training, and Data Perspectives https://arxiv.org/abs/2406.05615
Thong Nguyen, Yi Bin, Junbin Xiao, Leigang Qu, Yicong Li, Jay Zhangjie Wu, Cong-Duy Nguyen, See-Kiong Ng, Luu Anh Tuan Video-Language Understanding: A Survey from Model Architecture, Model Training, and Data Perspectives https://arxiv.org/abs/2406.05615
Thong Nguyen, Yi Bin, Junbin Xiao, Leigang Qu, Yicong Li, Jay Zhangjie Wu, Cong-Duy Nguyen, See-Kiong Ng, Luu Anh Tuan Video-Language Understanding: A Survey from Model Architecture, Model Training, and Data Perspectives https://arxiv.org/abs/2406.05615
Zhangjie Peng, Zecheng Lu, Xue Liu, Cunhua Pan, Jiangzhou Wang Active RIS-Aided Massive MIMO Uplink Systems with Low-Resolution ADCs https://arxiv.org/abs/2404.13875