Picture for Guoxiu He

Guoxiu He

Not All Videos Become Outdated: Short-Video Recommendation by Learning to Deconfound Release Interval Bias

Add code
Aug 30, 2024
Figure 1 for Not All Videos Become Outdated: Short-Video Recommendation by Learning to Deconfound Release Interval Bias
Figure 2 for Not All Videos Become Outdated: Short-Video Recommendation by Learning to Deconfound Release Interval Bias
Figure 3 for Not All Videos Become Outdated: Short-Video Recommendation by Learning to Deconfound Release Interval Bias
Figure 4 for Not All Videos Become Outdated: Short-Video Recommendation by Learning to Deconfound Release Interval Bias
Viaarxiv icon

Tree-Based Hard Attention with Self-Motivation for Large Language Models

Add code
Feb 14, 2024
Figure 1 for Tree-Based Hard Attention with Self-Motivation for Large Language Models
Figure 2 for Tree-Based Hard Attention with Self-Motivation for Large Language Models
Figure 3 for Tree-Based Hard Attention with Self-Motivation for Large Language Models
Figure 4 for Tree-Based Hard Attention with Self-Motivation for Large Language Models
Viaarxiv icon

Disentangling the Potential Impacts of Papers into Diffusion, Conformity, and Contribution Values

Add code
Nov 15, 2023
Figure 1 for Disentangling the Potential Impacts of Papers into Diffusion, Conformity, and Contribution Values
Figure 2 for Disentangling the Potential Impacts of Papers into Diffusion, Conformity, and Contribution Values
Figure 3 for Disentangling the Potential Impacts of Papers into Diffusion, Conformity, and Contribution Values
Figure 4 for Disentangling the Potential Impacts of Papers into Diffusion, Conformity, and Contribution Values
Viaarxiv icon

H2CGL: Modeling Dynamics of Citation Network for Impact Prediction

Add code
Apr 16, 2023
Figure 1 for H2CGL: Modeling Dynamics of Citation Network for Impact Prediction
Figure 2 for H2CGL: Modeling Dynamics of Citation Network for Impact Prediction
Figure 3 for H2CGL: Modeling Dynamics of Citation Network for Impact Prediction
Figure 4 for H2CGL: Modeling Dynamics of Citation Network for Impact Prediction
Viaarxiv icon

A Role-Selected Sharing Network for Joint Machine-Human Chatting Handoff and Service Satisfaction Analysis

Add code
Sep 17, 2021
Figure 1 for A Role-Selected Sharing Network for Joint Machine-Human Chatting Handoff and Service Satisfaction Analysis
Figure 2 for A Role-Selected Sharing Network for Joint Machine-Human Chatting Handoff and Service Satisfaction Analysis
Figure 3 for A Role-Selected Sharing Network for Joint Machine-Human Chatting Handoff and Service Satisfaction Analysis
Figure 4 for A Role-Selected Sharing Network for Joint Machine-Human Chatting Handoff and Service Satisfaction Analysis
Viaarxiv icon

Time to Transfer: Predicting and Evaluating Machine-Human Chatting Handoff

Add code
Dec 14, 2020
Figure 1 for Time to Transfer: Predicting and Evaluating Machine-Human Chatting Handoff
Figure 2 for Time to Transfer: Predicting and Evaluating Machine-Human Chatting Handoff
Figure 3 for Time to Transfer: Predicting and Evaluating Machine-Human Chatting Handoff
Figure 4 for Time to Transfer: Predicting and Evaluating Machine-Human Chatting Handoff
Viaarxiv icon

Read Beyond the Lines: Understanding the Implied Textual Meaning via a Skim and Intensive Reading Model

Add code
Jan 16, 2020
Figure 1 for Read Beyond the Lines: Understanding the Implied Textual Meaning via a Skim and Intensive Reading Model
Figure 2 for Read Beyond the Lines: Understanding the Implied Textual Meaning via a Skim and Intensive Reading Model
Figure 3 for Read Beyond the Lines: Understanding the Implied Textual Meaning via a Skim and Intensive Reading Model
Figure 4 for Read Beyond the Lines: Understanding the Implied Textual Meaning via a Skim and Intensive Reading Model
Viaarxiv icon

Detect Camouflaged Spam Content via StoneSkipping: Graph and Text Joint Embedding for Chinese Character Variation Representation

Add code
Aug 30, 2019
Figure 1 for Detect Camouflaged Spam Content via StoneSkipping: Graph and Text Joint Embedding for Chinese Character Variation Representation
Figure 2 for Detect Camouflaged Spam Content via StoneSkipping: Graph and Text Joint Embedding for Chinese Character Variation Representation
Figure 3 for Detect Camouflaged Spam Content via StoneSkipping: Graph and Text Joint Embedding for Chinese Character Variation Representation
Figure 4 for Detect Camouflaged Spam Content via StoneSkipping: Graph and Text Joint Embedding for Chinese Character Variation Representation
Viaarxiv icon