Yunke Wang

Orcid: 0009-0003-9796-530X

According to our database1, Yunke Wang authored at least 15 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A novel condition-based maintenance policy considering imperfect switching for warm standby systems.
Qual. Reliab. Eng. Int., April, 2024

Multi-tailed vision transformer for efficient inference.
Neural Networks, 2024

Multi-animal 3D social pose estimation, identification and behaviour embedding with a few-shot learning framework.
Nat. Mac. Intell., 2024

FusionSAM: Latent Space driven Segment Anything Model for Multimodal Fusion and Segmentation.
CoRR, 2024

Collage Prompting: Budget-Friendly Visual Recognition with GPT-4V.
CoRR, 2024

Visual Imitation Learning with Calibrated Contrastive Representation.
CoRR, 2024

MAEDiff: Masked Autoencoder-enhanced Diffusion Models for Unsupervised Anomaly Detection in Brain Images.
CoRR, 2024

Imitation Learning from Purified Demonstrations.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

2023
Imitation Learning from Purified Demonstration.
CoRR, 2023

Learning to Schedule in Diffusion Probabilistic Models.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

Unlabeled Imperfect Demonstrations in Adversarial Imitation Learning.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Multi-Tailed Vision Transformer for Efficient Inference.
CoRR, 2022

2021
Robust Adversarial Imitation Learning via Adaptively-Selected Demonstrations.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Learning to Weight Imperfect Demonstrations.
Proceedings of the 38th International Conference on Machine Learning, 2021

2015
A statistical study of covert timing channels using network packet frequency.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015


  Loading...