Picture for Fengyi Tang

Fengyi Tang

Persona Authentication through Generative Dialogue

Add code
Oct 25, 2021
Figure 1 for Persona Authentication through Generative Dialogue
Figure 2 for Persona Authentication through Generative Dialogue
Figure 3 for Persona Authentication through Generative Dialogue
Figure 4 for Persona Authentication through Generative Dialogue
Viaarxiv icon

MetaPred: Meta-Learning for Clinical Risk Prediction with Limited Patient Electronic Health Records

Add code
May 08, 2019
Figure 1 for MetaPred: Meta-Learning for Clinical Risk Prediction with Limited Patient Electronic Health Records
Figure 2 for MetaPred: Meta-Learning for Clinical Risk Prediction with Limited Patient Electronic Health Records
Figure 3 for MetaPred: Meta-Learning for Clinical Risk Prediction with Limited Patient Electronic Health Records
Figure 4 for MetaPred: Meta-Learning for Clinical Risk Prediction with Limited Patient Electronic Health Records
Viaarxiv icon

Distributed Data Vending on Blockchain

Add code
Mar 16, 2018
Figure 1 for Distributed Data Vending on Blockchain
Figure 2 for Distributed Data Vending on Blockchain
Figure 3 for Distributed Data Vending on Blockchain
Figure 4 for Distributed Data Vending on Blockchain
Viaarxiv icon

Improving Mild Cognitive Impairment Prediction via Reinforcement Learning and Dialogue Simulation

Add code
Feb 18, 2018
Figure 1 for Improving Mild Cognitive Impairment Prediction via Reinforcement Learning and Dialogue Simulation
Figure 2 for Improving Mild Cognitive Impairment Prediction via Reinforcement Learning and Dialogue Simulation
Figure 3 for Improving Mild Cognitive Impairment Prediction via Reinforcement Learning and Dialogue Simulation
Figure 4 for Improving Mild Cognitive Impairment Prediction via Reinforcement Learning and Dialogue Simulation
Viaarxiv icon

Identify Susceptible Locations in Medical Records via Adversarial Attacks on Deep Predictive Models

Add code
Feb 13, 2018
Figure 1 for Identify Susceptible Locations in Medical Records via Adversarial Attacks on Deep Predictive Models
Figure 2 for Identify Susceptible Locations in Medical Records via Adversarial Attacks on Deep Predictive Models
Figure 3 for Identify Susceptible Locations in Medical Records via Adversarial Attacks on Deep Predictive Models
Figure 4 for Identify Susceptible Locations in Medical Records via Adversarial Attacks on Deep Predictive Models
Viaarxiv icon