Author of the publication

Token Fusion: Bridging the Gap between Token Pruning and Token Merging.

, , , , and . WACV, page 1372-1381. IEEE, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Staying safe and visible via message sharing in online social networks., , , and . J. Comb. Optim., 28 (1): 186-217 (2014)Taking a HINT: Leveraging Explanations to Make Vision and Language Models More Grounded., , , , , , , and . ICCV, page 2591-2600. IEEE, (2019)EpicRec: Towards Practical Differentially Private Framework for Personalized Recommendation., and . ACM Conference on Computer and Communications Security, page 180-191. ACM, (2016)Adaptive approximation algorithms for hole healing in hybrid wireless sensor networks., , and . INFOCOM, page 1178-1186. IEEE, (2013)Exploring Covariate and Concept Shift for Detection and Calibration of Out-of-Distribution Data., , , , and . CoRR, (2021)Prompt Tuning for Zero-shot Compositional Learning., , , and . CoRR, (2023)CWCL: Cross-Modal Transfer with Continuously Weighted Contrastive Loss., , , , , , and . CoRR, (2023)TrojPrompt: A Black-box Trojan Attack on Pre-trained Language Models., , , , , , and . CoRR, (2023)Continual Diffusion with STAMINA: STack-And-Mask INcremental Adapters., , , , and . CoRR, (2023)Reactive jamming attacks in multi-radio wireless sensor networks: an efficient mitigating measure by identifying trigger nodes., , , , and . FOWANC@MobiHoc, page 87-96. ACM, (2009)