Author of the publication

IDPG: An Instance-Dependent Prompt Generation Method.

, , , , , , and . NAACL-HLT, page 5507-5521. Association for Computational Linguistics, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Cooperative Storage Management Framework for Big Data in Satellite Network Operation and Maintenance., , and . SINC, volume 803 of Communications in Computer and Information Science, page 93-104. Springer, (2017)Auditing Revenue Assurance Information Systems for Telecom Operators., , , and . CONFENIS (2), volume 255 of IFIP, page 1597-1602. Springer, (2007)Weakly supervised 3D classification of chest CT using aggregated multi-resolution deep segmentation features., , , , , , , and . Medical Imaging: Computer-Aided Diagnosis, volume 11314 of SPIE Proceedings, SPIE, (2020)TensorFHE: Achieving Practical Computation on Encrypted Data Using GPGPU., , , , , and . HPCA, page 922-934. IEEE, (2023)Game-Theory-Based Clustering Scheme for Energy Balancing in Underwater Acoustic Sensor Networks., , , , , , and . IEEE Internet Things J., 8 (11): 9005-9013 (2021)Research on infrared image enhancement and segmentation of power equipment based on partial differential equation., , , , , and . J. Vis. Commun. Image Represent., (2019)Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor., , , , , , , , and . IEEE Trans. Computers, 69 (11): 1571-1583 (2020)Mitigating Cross-Core Cache Attacks via Suspicious Traffic Detection., , , , , and . IEEE Trans. Very Large Scale Integr. Syst., 29 (2): 347-358 (2021)Analysis and research on network security and privacy security in ubiquitous electricity Internet of Things., , , , , and . Comput. Commun., (2020)Taiyi: A high-performance CKKS accelerator for Practical Fully Homomorphic Encryption., , , , , , , and . CoRR, (2024)