Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Obfuscation-resilient Android Malware Analysis Based on Contrastive Learning., , , , , and . CoRR, (2021)ToolEyes: Fine-Grained Evaluation for Tool Learning Capabilities of Large Language Models in Real-world Scenarios., , , , , , , , , and 1 other author(s). CoRR, (2024)Detecting Adversarial Samples through Sharpness of Loss Landscape., , , , , , , , and . ACL (Findings), page 11282-11298. Association for Computational Linguistics, (2023)Kernel-Whitening: Overcome Dataset Bias with Isotropic Sentence Embedding., , , and . EMNLP, page 4112-4122. Association for Computational Linguistics, (2022)EasyJailbreak: A Unified Framework for Jailbreaking Large Language Models., , , , , , , , , and 11 other author(s). CoRR, (2024)StepCoder: Improve Code Generation with Reinforcement Learning from Compiler Feedback., , , , , , , , , and 7 other author(s). CoRR, (2024)LoRAMoE: Revolutionizing Mixture of Experts for Maintaining World Knowledge in Language Model Alignment., , , , , , , , , and 6 other author(s). CoRR, (2023)Gitor: Scalable Code Clone Detection by Building Global Sample Graph., , , , and . ESEC/SIGSOFT FSE, page 784-795. ACM, (2023)SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis., , , , , , , and . ASE, page 821-833. IEEE, (2020)Secrets of RLHF in Large Language Models Part I: PPO., , , , , , , , , and 17 other author(s). CoRR, (2023)