Picture for Lior Wolf

Lior Wolf

The Hidden Attention of Mamba Models

Add code
Mar 03, 2024
Figure 1 for The Hidden Attention of Mamba Models
Figure 2 for The Hidden Attention of Mamba Models
Figure 3 for The Hidden Attention of Mamba Models
Figure 4 for The Hidden Attention of Mamba Models
Viaarxiv icon

Backward Lens: Projecting Language Model Gradients into the Vocabulary Space

Add code
Feb 20, 2024
Figure 1 for Backward Lens: Projecting Language Model Gradients into the Vocabulary Space
Figure 2 for Backward Lens: Projecting Language Model Gradients into the Vocabulary Space
Figure 3 for Backward Lens: Projecting Language Model Gradients into the Vocabulary Space
Figure 4 for Backward Lens: Projecting Language Model Gradients into the Vocabulary Space
Viaarxiv icon

Training-Free Consistent Text-to-Image Generation

Add code
Feb 05, 2024
Viaarxiv icon

DiffMoog: a Differentiable Modular Synthesizer for Sound Matching

Add code
Jan 23, 2024
Viaarxiv icon

Dynamic Layer Tying for Parameter-Efficient Transformers

Add code
Jan 23, 2024
Viaarxiv icon

PRILoRA: Pruned and Rank-Increasing Low-Rank Adaptation

Add code
Jan 20, 2024
Viaarxiv icon

Efficient Verification-Based Face Identification

Add code
Dec 20, 2023
Figure 1 for Efficient Verification-Based Face Identification
Figure 2 for Efficient Verification-Based Face Identification
Figure 3 for Efficient Verification-Based Face Identification
Figure 4 for Efficient Verification-Based Face Identification
Viaarxiv icon

Degree-based stratification of nodes in Graph Neural Networks

Add code
Dec 16, 2023
Viaarxiv icon

On the Long Range Abilities of Transformers

Add code
Nov 28, 2023
Figure 1 for On the Long Range Abilities of Transformers
Figure 2 for On the Long Range Abilities of Transformers
Figure 3 for On the Long Range Abilities of Transformers
Figure 4 for On the Long Range Abilities of Transformers
Viaarxiv icon

Converting Transformers to Polynomial Form for Secure Inference Over Homomorphic Encryption

Add code
Nov 15, 2023
Figure 1 for Converting Transformers to Polynomial Form for Secure Inference Over Homomorphic Encryption
Figure 2 for Converting Transformers to Polynomial Form for Secure Inference Over Homomorphic Encryption
Figure 3 for Converting Transformers to Polynomial Form for Secure Inference Over Homomorphic Encryption
Figure 4 for Converting Transformers to Polynomial Form for Secure Inference Over Homomorphic Encryption
Viaarxiv icon