Picture for Honglak Lee

Honglak Lee

University of Michigan, Ann Arbor

Evolving Reinforcement Learning Algorithms

Add code
Jan 08, 2021
Figure 1 for Evolving Reinforcement Learning Algorithms
Figure 2 for Evolving Reinforcement Learning Algorithms
Figure 3 for Evolving Reinforcement Learning Algorithms
Figure 4 for Evolving Reinforcement Learning Algorithms
Viaarxiv icon

Few-shot Sequence Learning with Transformers

Add code
Dec 17, 2020
Figure 1 for Few-shot Sequence Learning with Transformers
Figure 2 for Few-shot Sequence Learning with Transformers
Figure 3 for Few-shot Sequence Learning with Transformers
Figure 4 for Few-shot Sequence Learning with Transformers
Viaarxiv icon

Text-to-Image Generation Grounded by Fine-Grained User Attention

Add code
Nov 07, 2020
Figure 1 for Text-to-Image Generation Grounded by Fine-Grained User Attention
Figure 2 for Text-to-Image Generation Grounded by Fine-Grained User Attention
Figure 3 for Text-to-Image Generation Grounded by Fine-Grained User Attention
Figure 4 for Text-to-Image Generation Grounded by Fine-Grained User Attention
Viaarxiv icon

What's in a Loss Function for Image Classification?

Add code
Oct 30, 2020
Figure 1 for What's in a Loss Function for Image Classification?
Figure 2 for What's in a Loss Function for Image Classification?
Figure 3 for What's in a Loss Function for Image Classification?
Figure 4 for What's in a Loss Function for Image Classification?
Viaarxiv icon

Reinforcement Learning for Sparse-Reward Object-Interaction Tasks in First-person Simulated 3D Environments

Add code
Oct 28, 2020
Figure 1 for Reinforcement Learning for Sparse-Reward Object-Interaction Tasks in First-person Simulated 3D Environments
Figure 2 for Reinforcement Learning for Sparse-Reward Object-Interaction Tasks in First-person Simulated 3D Environments
Figure 3 for Reinforcement Learning for Sparse-Reward Object-Interaction Tasks in First-person Simulated 3D Environments
Figure 4 for Reinforcement Learning for Sparse-Reward Object-Interaction Tasks in First-person Simulated 3D Environments
Viaarxiv icon

Bridging Imagination and Reality for Model-Based Deep Reinforcement Learning

Add code
Oct 23, 2020
Figure 1 for Bridging Imagination and Reality for Model-Based Deep Reinforcement Learning
Figure 2 for Bridging Imagination and Reality for Model-Based Deep Reinforcement Learning
Figure 3 for Bridging Imagination and Reality for Model-Based Deep Reinforcement Learning
Figure 4 for Bridging Imagination and Reality for Model-Based Deep Reinforcement Learning
Viaarxiv icon

i-Mix: A Strategy for Regularizing Contrastive Representation Learning

Add code
Oct 17, 2020
Figure 1 for i-Mix: A Strategy for Regularizing Contrastive Representation Learning
Figure 2 for i-Mix: A Strategy for Regularizing Contrastive Representation Learning
Figure 3 for i-Mix: A Strategy for Regularizing Contrastive Representation Learning
Figure 4 for i-Mix: A Strategy for Regularizing Contrastive Representation Learning
Viaarxiv icon

Text as Neural Operator: Image Manipulation by Text Instruction

Add code
Aug 12, 2020
Figure 1 for Text as Neural Operator: Image Manipulation by Text Instruction
Figure 2 for Text as Neural Operator: Image Manipulation by Text Instruction
Figure 3 for Text as Neural Operator: Image Manipulation by Text Instruction
Figure 4 for Text as Neural Operator: Image Manipulation by Text Instruction
Viaarxiv icon

Predictive Information Accelerates Learning in RL

Add code
Jul 24, 2020
Figure 1 for Predictive Information Accelerates Learning in RL
Figure 2 for Predictive Information Accelerates Learning in RL
Figure 3 for Predictive Information Accelerates Learning in RL
Figure 4 for Predictive Information Accelerates Learning in RL
Viaarxiv icon

Understanding and Diagnosing Vulnerability under Adversarial Attacks

Add code
Jul 17, 2020
Figure 1 for Understanding and Diagnosing Vulnerability under Adversarial Attacks
Figure 2 for Understanding and Diagnosing Vulnerability under Adversarial Attacks
Figure 3 for Understanding and Diagnosing Vulnerability under Adversarial Attacks
Figure 4 for Understanding and Diagnosing Vulnerability under Adversarial Attacks
Viaarxiv icon