Generative diffusion prior for unified image restoration and enhancement
Existing image restoration methods mostly leverage the posterior distribution of natural
images. However, they often assume known degradation and also require supervised training, …
images. However, they often assume known degradation and also require supervised training, …
Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art
Malware has been one of the most damaging threats to computers that span across multiple
operating systems and various file formats. To defend against ever-increasing and ever-…
operating systems and various file formats. To defend against ever-increasing and ever-…
[PDF][PDF] VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities.
With the explosive development of information technology, vulnerabilities have become one
of the major threats to computer security. Most vulnerabilities with similar patterns can be …
of the major threats to computer security. Most vulnerabilities with similar patterns can be …
Atomic Layer Deposition of TiO2 for a High-Efficiency Hole-Blocking Layer in Hole-Conductor-Free Perovskite Solar Cells Processed in Ambient Air
…, H Hu, F Chen, M Kong, Q Zhang, T Luo… - … applied materials & …, 2016 - ACS Publications
In this study we design and construct high-efficiency, low-cost, highly stable, hole-conductor-free,
solid-state perovskite solar cells, with TiO 2 as the electron transport layer (ETL) and …
solid-state perovskite solar cells, with TiO 2 as the electron transport layer (ETL) and …
Self-supervised learning for pre-training 3d point clouds: A survey
Point cloud data has been extensively studied due to its compact form and flexibility in
representing complex 3D structures. The ability of point cloud data to accurately capture and …
representing complex 3D structures. The ability of point cloud data to accurately capture and …
Research on the Dynamic Evolution of the Landscape Pattern in the Urban Fringe Area of Wuhan from 2000 to 2020
Y Long, S Luo, X Liu, T Luo, X Liu - ISPRS International Journal of Geo …, 2022 - mdpi.com
The urban fringe area is a discontinuous spatial phenomenon that refers to the urban-rural
interlacing zone which is undergoing urbanization on the fringe of the core built-up area of a …
interlacing zone which is undergoing urbanization on the fringe of the core built-up area of a …
Information leakage by model weights on federated learning
X Xu, J Wu, M Yang, T Luo, X Duan, W Li… - Proceedings of the …, 2020 - dl.acm.org
Federated learning aggregates data from multiple sources while protecting privacy, which
makes it possible to train efficient models in real scenes. However, although federated …
makes it possible to train efficient models in real scenes. However, although federated …
Temporal and spatial attractiveness characteristics of Wuhan urban Riverside from the perspective of traveling
Y Chen, B Jia, J Wu, X Liu, T Luo - Land, 2022 - mdpi.com
Improving the attractiveness of urban waterfronts has become an important objective to
promote economic development and improve the environmental quality. However, few studies …
promote economic development and improve the environmental quality. However, few studies …
Well-dispersed PEDOT: PSS/graphene nanocomposites synthesized by in situ polymerization as counter electrodes for dye-sensitized solar cells
…, Z Guo, B Dong, L Zhao, J Li, Q Zhang, T Luo - Journal of Materials …, 2015 - Springer
Preparation of graphene composite material suitable for drop-coating on FTO conductive
glasses in ambient conditions is reported. Highly dispersed PEDOT:PSS/graphene composites …
glasses in ambient conditions is reported. Highly dispersed PEDOT:PSS/graphene composites …
APP-Miner: Detecting API Misuses via Automatically Mining API Path Patterns
J Jiang, J Wu, X Ling, T Luo, S Qu… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
Extracting API patterns from the source code has been extensively employed to detect API
misuses. However, recent studies manually provide pattern templates as prerequisites, …
misuses. However, recent studies manually provide pattern templates as prerequisites, …