no code implementations • 20 Feb 2024 • Hongtao Zhu, Sizhe Zhang, Yang Su, Zhenyu Zhao, Nan Chen
In the domain of causal inference research, the prevalent potential outcomes framework, notably the Rubin Causal Model (RCM), often overlooks individual interference and assumes independent treatment effects.
1 code implementation • 29 Sep 2023 • Yang Su
Large Language Models (LLMs) are trained and aligned to follow natural language instructions with only a handful of examples, and they are prompted as task-driven autonomous agents to adapt to various sources of execution environments.
no code implementations • 18 Mar 2023 • Yang Su, Hui Zhou, Yansha Deng, Mischa Dohler
To maximize the number of UAVs that receive the message successfully within the latency and energy constraints, we formulate the problem as a Constrained Markov Decision Process to find the optimal policy.
no code implementations • 26 Apr 2022 • Huang Zhang, Yang Su, Faisal Altaf, Torsten Wik, Sebastien Gros
For that reason, various data-driven methods have been proposed for point prediction of battery cycle life with minimum knowledge of the battery degradation mechanisms.
no code implementations • 10 Feb 2021 • Jian Li, Ruo-Yu Liu, Emma de Ona Wilhelmi, Diego F. Torres, Qian-Cheng Liu, Matthew Kerr, Rolf Buehler, Yang Su, Hao-Ning He, Meng-Yuan Xiao
The unidentified TeV source MGRO J1908+06, with emission extending from hundreds of GeV to beyond 100TeV, is one of the most intriguing sources in the Galactic plane.
High Energy Astrophysical Phenomena
no code implementations • 17 Dec 2020 • Qing-Zeng Yan, Ji Yang, Yan Sun, Yang Su, Ye Xu, Hongchi Wang, Xin Zhou, Chen Wang
We present distances to 76 medium-sized molecular clouds and an extra large-scale one in the second Galactic quadrant ($104. 75^\circ <l<150. 25^\circ $ and $|b|<5. 25^\circ$), 73 of which are accurately measured for the first time.
Astrophysics of Galaxies
no code implementations • 19 May 2018 • Yansong Gao, Yang Su, Lei Xu, Damith C. Ranasinghe
A Physical unclonable functions (PUF), alike a fingerprint, exploits manufacturing randomness to endow each physical item with a unique identifier.
Cryptography and Security