| LLM Code Customization with Visual Results: A Benchmark on TikZ | May 7, 2025 | Code Generationvalid | —Unverified | 0 |
| Sufficient Decision Proxies for Decision-Focused Learning | May 6, 2025 | valid | —Unverified | 0 |
| An Active Inference Model of Covert and Overt Visual Attention | May 6, 2025 | valid | CodeCode Available | 0 |
| Improved Dimensionality Reduction for Inverse Problems in Nuclear Fusion and High-Energy Astrophysics | May 5, 2025 | Dimensionality Reductionvalid | —Unverified | 0 |
| Logits-Constrained Framework with RoBERTa for Ancient Chinese NER | May 5, 2025 | Chinese Named Entity RecognitionModel Selection | —Unverified | 0 |
| Corr2Distrib: Making Ambiguous Correspondences an Ally to Predict Reliable 6D Pose Distributions | May 5, 2025 | Pose Estimationvalid | —Unverified | 0 |
| Model Checks in a Kernel Ridge Regression Framework | May 2, 2025 | regressionvalid | —Unverified | 0 |
| SymPlanner: Deliberate Planning in Language Models with Symbolic Representation | May 2, 2025 | valid | CodeCode Available | 1 |
| Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability | May 2, 2025 | Adversarial AttackIntrusion Detection | —Unverified | 0 |
| Policy Learning with α-Expected Welfare | May 1, 2025 | valid | —Unverified | 0 |