Yufan Zhuang

Orcid: 0000-0003-4063-6460

According to our database1, Yufan Zhuang authored at least 20 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Rate-Splitting With Hybrid Messages: DoF Analysis of the Two-User MIMO Broadcast Channel With Imperfect CSIT.
IEEE Trans. Wirel. Commun., September, 2024

Vector-ICL: In-context Learning with Continuous Vector Representations.
CoRR, 2024

EdgeLoc: A Communication-Adaptive Parallel System for Real-Time Localization in Infrastructure-Assisted Autonomous Driving.
CoRR, 2024

Learning a Decision Tree Algorithm with Transformers.
CoRR, 2024

Data Contamination Can Cross Language Barriers.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

2023
Incorporating Signal Awareness in Source Code Modeling: An Application to Vulnerability Detection.
ACM Trans. Softw. Eng. Methodol., November, 2023

Reconfigurable Intelligent Surface Assisted OFDM Relaying: Subcarrier Matching With Balanced SNR.
IEEE Trans. Veh. Technol., February, 2023

WavSpA: Wavelet Space Attention for Boosting Transformers' Long Sequence Learning Ability.
Proceedings of UniReps: the First Workshop on Unifying Representations in Neural Models, 2023

Code Vulnerability Detection via Signal-Aware Learning.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
Waveformer: Linear-Time Attention with Forward and Backward Wavelet Transform.
CoRR, 2022

Secure Rate-Splitting for MIMO Broadcast Channel with Imperfect CSIT and a Jammer.
Proceedings of the 31st Wireless and Optical Communications Conference, 2022

The Generalized Degrees-of-Freedom of the Asymmetric Interference Channel with Delayed CSIT.
Proceedings of the IEEE International Symposium on Information Theory, 2022

2021
Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection.
CoRR, 2021

Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation.
CoRR, 2021

Agreeing to Disagree: Choosing Among Eight Topic-Modeling Methods.
Big Data Res., 2021

Probing model signal-awareness via prediction-preserving input minimization.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

Towards Reliable AI for Source Code Understanding.
Proceedings of the SoCC '21: ACM Symposium on Cloud Computing, 2021

2020
Exploring Software Naturalness through Neural Language Models.
CoRR, 2020

Learning to map source code to software vulnerability using code-as-a-graph.
CoRR, 2020

2019
Search for K: Assessing Five Topic-Modeling Approaches to 120, 000 Canadian Articles.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019


  Loading...