Yuqi Lin

According to our database1, Yuqi Lin authored at least 17 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ConvBench: A Multi-Turn Conversation Evaluation Benchmark with Hierarchical Capability for Large Vision-Language Models.
CoRR, 2024

UniHDA: Towards Universal Hybrid Domain Adaptation of Image Generators.
CoRR, 2024

MMT-Bench: A Comprehensive Multimodal Benchmark for Evaluating Large Vision-Language Models Towards Multitask AGI.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Position: Towards Implicit Prompt For Text-To-Image Models.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Few-shot Hybrid Domain Adaptation of Image Generator.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

PCMA: A New Mediation Analysis Method Effectively Identifies Relevant Pathways Connecting Microbiota and Diseases.
Proceedings of the 15th ACM International Conference on Bioinformatics, 2024

TagCLIP: A Local-to-Global Framework to Enhance Open-Vocabulary Multi-Label Classification of CLIP without Training.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Few-shot Hybrid Domain Adaptation of Image Generators.
CoRR, 2023

A Low-Voltage Wide Swing Image Sensor with Simultaneous Energy Harvesting and Imaging Modes.
Proceedings of the 30th IEEE International Conference on Electronics, Circuits and Systems, 2023

CLIP is Also an Efficient Segmenter: A Text-Driven Approach for Weakly Supervised Semantic Segmentation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2021
Design of Kitchen Appliances for Aging Population Based on Healthy Diet.
Proceedings of the Advances in Ergonomics in Design, 2021

2019
An Efficient Approach for Mitigating Covert Storage Channel Attacks in Virtual Machines by the Anti-Detection Criterion.
J. Comput. Sci. Technol., 2019

2016
Designing and Modeling of Covert Channels in Operating Systems.
IEEE Trans. Computers, 2016

2015
C2Hunter: Detection and Mitigation of Covert Channels in Data Centers.
Proceedings of the Handbook on Data Centers, 2015

2013
Robust and Efficient Covert Channel Communications in Operating Systems: Design, Implementation and Evaluation.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

HyperVerify: A VM-assisted Architecture for Monitoring Hypervisor Non-control Data.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

2012
XenPump: A New Method to Mitigate Timing Channel in Cloud Computing.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012


  Loading...