Picture for Abhishek Singh

Abhishek Singh

Microsoft

PoinT-5: Pointer Network and T-5 based Financial NarrativeSummarisation

Add code
Oct 12, 2020
Figure 1 for PoinT-5: Pointer Network and T-5 based Financial NarrativeSummarisation
Figure 2 for PoinT-5: Pointer Network and T-5 based Financial NarrativeSummarisation
Figure 3 for PoinT-5: Pointer Network and T-5 based Financial NarrativeSummarisation
Figure 4 for PoinT-5: Pointer Network and T-5 based Financial NarrativeSummarisation
Viaarxiv icon

Proximity Sensing for Contact Tracing

Add code
Sep 04, 2020
Figure 1 for Proximity Sensing for Contact Tracing
Figure 2 for Proximity Sensing for Contact Tracing
Figure 3 for Proximity Sensing for Contact Tracing
Figure 4 for Proximity Sensing for Contact Tracing
Viaarxiv icon

NoPeek: Information leakage reduction to share activations in distributed deep learning

Add code
Aug 20, 2020
Figure 1 for NoPeek: Information leakage reduction to share activations in distributed deep learning
Figure 2 for NoPeek: Information leakage reduction to share activations in distributed deep learning
Figure 3 for NoPeek: Information leakage reduction to share activations in distributed deep learning
Figure 4 for NoPeek: Information leakage reduction to share activations in distributed deep learning
Viaarxiv icon

SplitNN-driven Vertical Partitioning

Add code
Aug 07, 2020
Figure 1 for SplitNN-driven Vertical Partitioning
Figure 2 for SplitNN-driven Vertical Partitioning
Figure 3 for SplitNN-driven Vertical Partitioning
Figure 4 for SplitNN-driven Vertical Partitioning
Viaarxiv icon

FedML: A Research Library and Benchmark for Federated Machine Learning

Add code
Jul 27, 2020
Figure 1 for FedML: A Research Library and Benchmark for Federated Machine Learning
Figure 2 for FedML: A Research Library and Benchmark for Federated Machine Learning
Figure 3 for FedML: A Research Library and Benchmark for Federated Machine Learning
Figure 4 for FedML: A Research Library and Benchmark for Federated Machine Learning
Viaarxiv icon

Voice@SRIB at SemEval-2020 Task : Sentiment and Offensiveness detection in Social Media

Add code
Jul 20, 2020
Figure 1 for Voice@SRIB at SemEval-2020 Task : Sentiment and Offensiveness detection in Social Media
Figure 2 for Voice@SRIB at SemEval-2020 Task : Sentiment and Offensiveness detection in Social Media
Figure 3 for Voice@SRIB at SemEval-2020 Task : Sentiment and Offensiveness detection in Social Media
Figure 4 for Voice@SRIB at SemEval-2020 Task : Sentiment and Offensiveness detection in Social Media
Viaarxiv icon

Privacy in Deep Learning: A Survey

Add code
May 09, 2020
Figure 1 for Privacy in Deep Learning: A Survey
Figure 2 for Privacy in Deep Learning: A Survey
Figure 3 for Privacy in Deep Learning: A Survey
Figure 4 for Privacy in Deep Learning: A Survey
Viaarxiv icon

Clinical XLNet: Modeling Sequential Clinical Notes and Predicting Prolonged Mechanical Ventilation

Add code
Dec 27, 2019
Figure 1 for Clinical XLNet: Modeling Sequential Clinical Notes and Predicting Prolonged Mechanical Ventilation
Figure 2 for Clinical XLNet: Modeling Sequential Clinical Notes and Predicting Prolonged Mechanical Ventilation
Figure 3 for Clinical XLNet: Modeling Sequential Clinical Notes and Predicting Prolonged Mechanical Ventilation
Figure 4 for Clinical XLNet: Modeling Sequential Clinical Notes and Predicting Prolonged Mechanical Ventilation
Viaarxiv icon

NASIB: Neural Architecture Search withIn Budget

Add code
Oct 19, 2019
Figure 1 for NASIB: Neural Architecture Search withIn Budget
Figure 2 for NASIB: Neural Architecture Search withIn Budget
Figure 3 for NASIB: Neural Architecture Search withIn Budget
Figure 4 for NASIB: Neural Architecture Search withIn Budget
Viaarxiv icon

Maximal adversarial perturbations for obfuscation: Hiding certain attributes while preserving rest

Add code
Sep 27, 2019
Figure 1 for Maximal adversarial perturbations for obfuscation: Hiding certain attributes while preserving rest
Figure 2 for Maximal adversarial perturbations for obfuscation: Hiding certain attributes while preserving rest
Figure 3 for Maximal adversarial perturbations for obfuscation: Hiding certain attributes while preserving rest
Figure 4 for Maximal adversarial perturbations for obfuscation: Hiding certain attributes while preserving rest
Viaarxiv icon