Alert button
Picture for Kunjal Panchal

Kunjal Panchal

Alert button

Flow: Per-Instance Personalized Federated Learning Through Dynamic Routing

Add code
Bookmark button
Alert button
Nov 28, 2022
Kunjal Panchal, Sunav Choudhary, Hui Guan

Figure 1 for Flow: Per-Instance Personalized Federated Learning Through Dynamic Routing
Figure 2 for Flow: Per-Instance Personalized Federated Learning Through Dynamic Routing
Figure 3 for Flow: Per-Instance Personalized Federated Learning Through Dynamic Routing
Figure 4 for Flow: Per-Instance Personalized Federated Learning Through Dynamic Routing
Viaarxiv icon

Hierachical Delta-Attention Method for Multimodal Fusion

Add code
Bookmark button
Alert button
Nov 22, 2020
Kunjal Panchal

Figure 1 for Hierachical Delta-Attention Method for Multimodal Fusion
Figure 2 for Hierachical Delta-Attention Method for Multimodal Fusion
Figure 3 for Hierachical Delta-Attention Method for Multimodal Fusion
Figure 4 for Hierachical Delta-Attention Method for Multimodal Fusion
Viaarxiv icon

Improved Algorithm for Seamlessly Creating Infinite Loops from a Video Clip, while Preserving Variety in Textures

Add code
Bookmark button
Alert button
Nov 04, 2020
Kunjal Panchal

Figure 1 for Improved Algorithm for Seamlessly Creating Infinite Loops from a Video Clip, while Preserving Variety in Textures
Figure 2 for Improved Algorithm for Seamlessly Creating Infinite Loops from a Video Clip, while Preserving Variety in Textures
Figure 3 for Improved Algorithm for Seamlessly Creating Infinite Loops from a Video Clip, while Preserving Variety in Textures
Figure 4 for Improved Algorithm for Seamlessly Creating Infinite Loops from a Video Clip, while Preserving Variety in Textures
Viaarxiv icon

Differential Privacy and Natural Language Processing to Generate Contextually Similar Decoy Messages in Honey Encryption Scheme

Add code
Bookmark button
Alert button
Oct 29, 2020
Kunjal Panchal

Figure 1 for Differential Privacy and Natural Language Processing to Generate Contextually Similar Decoy Messages in Honey Encryption Scheme
Figure 2 for Differential Privacy and Natural Language Processing to Generate Contextually Similar Decoy Messages in Honey Encryption Scheme
Figure 3 for Differential Privacy and Natural Language Processing to Generate Contextually Similar Decoy Messages in Honey Encryption Scheme
Figure 4 for Differential Privacy and Natural Language Processing to Generate Contextually Similar Decoy Messages in Honey Encryption Scheme
Viaarxiv icon