All Papers

34,598 papers found • Page 38 of 692

A Video-grounded Dialogue Dataset and Metric for Event-driven Activities

Wiradee Imrattanatrai, Masaki Asada, Kimihiro Hasegawa et al.

AAAI 2025paperarXiv:2501.18324

A View-consistent Sampling Method for Regularized Training of Neural Radiance Fields

Aoxiang Fan, Corentin Dumery, Nicolas Talabot et al.

ICCV 2025arXiv:2507.04408

A Visual Dive into Conditional Flow Matching

Anne Gagneux, Ségolène Martin, Rémi Emonet et al.

ICLR 2025

A Visual Leap in CLIP Compositionality Reasoning through Generation of Counterfactual Sets

Zexi Jia, Chuanwei Huang, Yeshuang Zhu et al.

ICCV 2025arXiv:2507.04699
3
citations

A-VL: Adaptive Attention for Large Vision-Language Models

Junyang Zhang, Mu Yuan, Ruiguang Zhong et al.

AAAI 2025paperarXiv:2409.14846
4
citations

AV-Link: Temporally-Aligned Diffusion Features for Cross-Modal Audio-Video Generation

Moayed Haji-Ali, Willi Menapace, Aliaksandr Siarohin et al.

ICCV 2025arXiv:2412.15191
11
citations

Avoiding Catastrophe in Online Learning by Asking for Help

Benjamin Plaut, Hanlin Zhu, Stuart Russell

ICML 2025arXiv:2402.08062
3
citations

Avoiding exp(R) scaling in RLHF through Preference-based Exploration

Mingyu Chen, Yiding Chen, Wen Sun et al.

NEURIPS 2025
3
citations

Avoiding Leakage Poisoning: Concept Interventions Under Distribution Shifts

Mateo Espinosa Zarlenga, Gabriele Dominici, Pietro Barbiero et al.

ICML 2025arXiv:2504.17921
4
citations

Avoiding spurious sharpness minimization broadens applicability of SAM

Sidak Pal Singh, Hossein Mobahi, Atish Agarwala et al.

ICML 2025arXiv:2502.02407
5
citations

Avoid Overclaims: Summary of Complexity Bounds for Algorithms in Minimization and Minimax Optimization

Siqi Zhang, Yifan Hu

ICLR 2025

AVQACL: A Novel Benchmark for Audio-Visual Question Answering Continual Learning

Kaixuan Wu, Xinde Li, Xinglin Li et al.

CVPR 2025

AVTrustBench: Assessing and Enhancing Reliability and Robustness in Audio-Visual LLMs

Sanjoy Chowdhury, Sayan Nag, Subhrajyoti Dasgupta et al.

ICCV 2025arXiv:2501.02135
10
citations

A Wander Through the Multimodal Landscape: Efficient Transfer Learning via Low-rank Sequence Multimodal Adapter

Zirun Guo, Xize Cheng, Yangyang Wu et al.

AAAI 2025paperarXiv:2412.08979
3
citations

A Watermark for Order-Agnostic Language Models

Ruibo Chen, Yihan Wu, Yanshuo Chen et al.

ICLR 2025arXiv:2410.13805
10
citations

A Wiener Process Perspective on Local Intrinsic Dimension Estimation Methods

Piotr Tempczyk, Łukasz Garncarek, Dominik Filipiak et al.

AAAI 2025paperarXiv:2406.17125
1
citations

AWRaCLe: All-Weather Image Restoration Using Visual In-Context Learning

Sudarshan Rajagopalan, Vishal M. Patel

AAAI 2025paperarXiv:2409.00263
14
citations

AxBench: Steering LLMs? Even Simple Baselines Outperform Sparse Autoencoders

Zhengxuan Wu, Aryaman Arora, Atticus Geiger et al.

ICML 2025spotlightarXiv:2501.17148
118
citations

Axial Neural Networks for Dimension-Free Foundation Models

Hyunsu Kim, Jonggeon Park, Joan Bruna et al.

NEURIPS 2025spotlightarXiv:2510.13665

Axis-level Symmetry Detection with Group-Equivariant Representation

Wongyun Yu, Ahyun Seo, Minsu Cho

ICCV 2025arXiv:2508.10740

B2Opt: Learning to Optimize Black-box Optimization with Little Budget

Xiaobin Li, Kai Wu, Xiaoyu Zhang et al.

AAAI 2025paperarXiv:2304.11787
22
citations

BaB-ND: Long-Horizon Motion Planning with Branch-and-Bound and Neural Dynamics

Keyi Shen, Jiangwei Yu, Jose Barreiros et al.

ICLR 2025arXiv:2412.09584
2
citations

BabyVLM: Data-Efficient Pretraining of VLMs Inspired by Infant Learning

Shengao Wang, Arjun Chandra, Aoming Liu et al.

ICCV 2025arXiv:2504.09426
1
citations

Backdoor Attack on Propagation-based Rumor Detectors

Di Jin, Yujun Zhang, Bingdao Feng et al.

AAAI 2025paper
4
citations

Backdoor Attacks Against No-Reference Image Quality Assessment Models via a Scalable Trigger

Yi Yu, Song Xia, Xun Lin et al.

AAAI 2025paperarXiv:2412.07277
12
citations

Backdoor Attacks in Token Selection of Attention Mechanism

Yunjuan Wang, Raman Arora

ICML 2025

Backdoor Attacks on Dense Retrieval via Public and Unintentional Triggers

Quanyu Long, Yue Deng, Leilei Gan et al.

COLM 2025paperarXiv:2402.13532
14
citations

Backdoor Attacks on Neural Networks via One-Bit Flip

Xiang Li, Lannan Luo, Qiang Zeng

ICCV 2025
2
citations

Backdoor Cleaning without External Guidance in MLLM Fine-tuning

Xuankun Rong, Wenke Huang, Jian Liang et al.

NEURIPS 2025arXiv:2505.16916
14
citations

Backdoor Defense via Enhanced Splitting and Trap Isolation

Hongrui Yu, Lu Qi, Wanyu Lin et al.

ICCV 2025

BackdoorDM: A Comprehensive Benchmark for Backdoor Learning on Diffusion Model

Weilin Lin, Nanjun Zhou, Yanyun Wang et al.

NEURIPS 2025arXiv:2502.11798
2
citations

Backdooring Self-Supervised Contrastive Learning by Noisy Alignment

Tuo Chen, Jie Gui, Minjing Dong et al.

ICCV 2025arXiv:2508.14015

Backdooring Vision-Language Models with Out-Of-Distribution Data

Weimin Lyu, Michael Yao, Saumya Gupta et al.

ICLR 2025arXiv:2410.01264
15
citations

BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks and Defenses on Large Language Models

Yige Li, Hanxun Huang, Yunhan Zhao et al.

NEURIPS 2025arXiv:2408.12798
11
citations

Backdoor Mitigation by Distance-Driven Detoxification

Shaokui Wei, Jiayin Liu, Hongyuan Zha

ICCV 2025highlightarXiv:2411.09585

Backdoor Mitigation via Invertible Pruning Masks

Kealan Dunnett, Reza Arablouei, Volkan Dedeoglu et al.

NEURIPS 2025arXiv:2509.15497

Backdoor Token Unlearning: Exposing and Defending Backdoors in Pretrained Language Models

Peihai Jiang, Xixiang Lyu, Yige Li et al.

AAAI 2025paperarXiv:2501.03272
7
citations

Background Invariance Testing According to Semantic Proximity

Zukang Liao, Min Chen

ICCV 2025arXiv:2208.09286

Back on Track: Bundle Adjustment for Dynamic Scene Reconstruction

Weirong Chen, Ganlin Zhang, Felix Wimbauer et al.

ICCV 2025arXiv:2504.14516
13
citations

Backpropagation-Free Test-Time Adaptation via Probabilistic Gaussian Alignment

Youjia Zhang, Youngeun Kim, Young-Geun Choi et al.

NEURIPS 2025arXiv:2508.15568

BackSlash: Rate Constrained Optimized Training of Large Language Models

Jun Wu, jiangtao wen, Yuxing Han

ICML 2025arXiv:2504.16968
1
citations

Backtracking Improves Generation Safety

Yiming Zhang, Jianfeng Chi, Hailey Nguyen et al.

ICLR 2025arXiv:2409.14586
24
citations

Backward Conformal Prediction

Etienne Gauthier, Francis Bach, Michael Jordan

NEURIPS 2025arXiv:2505.13732
5
citations

BACON: Improving Clarity of Image Captions via Bag-of-Concept Graphs

Zhantao Yang, Ruili Feng, Keyu Yan et al.

CVPR 2025arXiv:2407.03314
3
citations

BADGR: Bundle Adjustment Diffusion Conditioned by Gradients for Wide-Baseline Floor Plan Reconstruction

Yuguang Li, Ivaylo Boyadzhiev, Zixuan Liu et al.

CVPR 2025highlightarXiv:2503.19340

BADiff: Bandwidth Adaptive Diffusion Model

Xi Zhang, Hanwei Zhu, Yan Zhong et al.

NEURIPS 2025arXiv:2510.21366

BadJudge: Backdoor Vulnerabilities of LLM-As-A-Judge

Terry Tong, Fei Wang, Zhe Zhao et al.

ICLR 2025arXiv:2503.00596
13
citations

Bad-PFL: Exploiting Backdoor Attacks against Personalized Federated Learning

Mingyuan Fan, Zhanyi Hu, Fuyi Wang et al.

ICLR 2025

BadRobot: Jailbreaking Embodied LLM Agents in the Physical World

Hangtao Zhang, Chenyu Zhu, Xianlong Wang et al.

ICLR 2025
6
citations

BadToken: Token-level Backdoor Attacks to Multi-modal Large Language Models

Zenghui Yuan, Jiawen Shi, Pan Zhou et al.

CVPR 2025arXiv:2503.16023
10
citations