Author of the publication

BiPFT: Binary Pre-trained Foundation Transformer with Low-Rank Estimation of Binarization Residual Polynomials.

, , , , , , and . AAAI, page 16094-16102. AAAI Press, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Energy Efficient STDP-Based SNN Architecture With On-Chip Learning., , , , , , , , and . IEEE Trans. Circuits Syst. I Regul. Pap., 69 (12): 5147-5158 (2022)Knockoff-Guided Feature Selection via A Single Pre-trained Reinforced Agent., , , , , and . CoRR, (2024)Determining oil slick thickness using hyperspectral remote sensing in the Bohai Sea of China., , , , and . Int. J. Digit. Earth, 6 (1): 76-93 (2013)JUN and PDGFRA as Crucial Candidate Genes for Childhood Autism Spectrum Disorder., , , , , , , and . Frontiers Neuroinformatics, (2022)Identifying Linear Traces of the Han Dynasty Great Wall in Dunhuang Using Gaofen-1 Satellite Remote Sensing Imagery and the Hough Transform., , , , , , , and . Remote. Sens., 11 (22): 2711 (2019)On the billing vulnerabilities of SIP-based VoIP systems., , , and . Comput. Networks, 54 (11): 1837-1847 (2010)Artificial Malware Immunization Based on Dynamically Assigned Sense of Self., and . ISC, volume 6531 of Lecture Notes in Computer Science, page 166-180. Springer, (2010)Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation., and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 104-121. Springer, (2013)Roving Bugnet: Distributed Surveillance Threat and Mitigation., and . SEC, volume 297 of IFIP Advances in Information and Communication Technology, page 39-50. Springer, (2009)On the effectiveness of low latency anonymous network in the presence of timing attack., and . DSN, page 429-438. IEEE Computer Society, (2009)