Author of the publication

Token Fusion: Bridging the Gap between Token Pruning and Token Merging.

, , , , and . WACV, page 1372-1381. IEEE, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile App Security Risk Assessment: A Crowdsourcing Ranking Approach from User Comments., , , and . SDM, page 658-666. SIAM, (2015)Differentially Private $k$-Means Clustering., , , , and . CoRR, (2015)Reward Constrained Interactive Recommendation with Natural Language Feedback., , , , , and . CoRR, (2020)A technique for self-certifying tamper resistant software., and . QoP, page 12-14. ACM, (2007)Traitor tracing for prerecorded and recordable media., , and . Digital Rights Management Workshop, page 83-90. ACM, (2004)Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging., , and . ESORICS, volume 5789 of Lecture Notes in Computer Science, page 268-284. Springer, (2009)Higher Dependability and Security for Mobile Applications.. SPC, volume 3934 of Lecture Notes in Computer Science, page 89-103. Springer, (2006)Defending against the Pirate Evolution Attack., and . ISPEC, volume 5451 of Lecture Notes in Computer Science, page 147-158. Springer, (2009)PPM: A Privacy Prediction Model for Online Social Networks., , and . SocInfo (2), volume 10047 of Lecture Notes in Computer Science, page 400-420. (2016)Efficient Privilege De-Escalation for Ad Libraries in Mobile Apps., , , and . MobiSys, page 89-103. ACM, (2015)