Author of the publication

RA-ISF: Learning to Answer and Understand from Retrieval Augmentation via Iterative Self-Feedback.

, , , , , , and . CoRR, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Invisible Poisoning: Highly Stealthy Targeted Poisoning Attack., , , , , and . Inscrypt, volume 12020 of Lecture Notes in Computer Science, page 173-198. Springer, (2019)Reasoning over Multi-view Knowledge Graphs., , , , , , and . CoRR, (2022)NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification., , , , , , , , and . CoRR, (2021)Spreading social influence with both positive and negative opinions in online networks., , , , and . Big Data Min. Anal., 2 (2): 100-117 (2019)Study of clear channel assessment mechanism for ZigBee packet transmission under Wi-Fi interference., , , , and . CCNC, page 765-768. IEEE, (2013)Latency-aware computation offloading and DQN-based resource allocation approaches in SDN-enabled MEC., , and . Ad Hoc Networks, (2022)DetectS ec: Evaluating the robustness of object detection models to adversarial attacks., , , , , , , , , and . Int. J. Intell. Syst., 37 (9): 6463-6492 (2022)Image Registration Algorithm for Remote Sensing Images Based on Pixel Location Information., , , , , , and . Remote. Sens., 15 (2): 436 (January 2023)RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks., , , , and . CoRR, (2023)Demystifying Self-supervised Trojan Attacks., , , , , , and . CoRR, (2022)