Alert button
Picture for Mo Yu

Mo Yu

Alert button

Invariant Rationalization

Add code
Bookmark button
Alert button
Mar 22, 2020
Shiyu Chang, Yang Zhang, Mo Yu, Tommi S. Jaakkola

Figure 1 for Invariant Rationalization
Figure 2 for Invariant Rationalization
Figure 3 for Invariant Rationalization
Figure 4 for Invariant Rationalization
Viaarxiv icon

Differential Treatment for Stuff and Things: A Simple Unsupervised Domain Adaptation Method for Semantic Segmentation

Add code
Bookmark button
Alert button
Mar 18, 2020
Zhonghao Wang, Mo Yu, Yunchao Wei, Rogerior Feris, Jinjun Xiong, Wen-mei Hwu, Thomas S. Huang, Honghui Shi

Figure 1 for Differential Treatment for Stuff and Things: A Simple Unsupervised Domain Adaptation Method for Semantic Segmentation
Figure 2 for Differential Treatment for Stuff and Things: A Simple Unsupervised Domain Adaptation Method for Semantic Segmentation
Figure 3 for Differential Treatment for Stuff and Things: A Simple Unsupervised Domain Adaptation Method for Semantic Segmentation
Figure 4 for Differential Treatment for Stuff and Things: A Simple Unsupervised Domain Adaptation Method for Semantic Segmentation
Viaarxiv icon

Leveraging Dependency Forest for Neural Medical Relation Extraction

Add code
Bookmark button
Alert button
Dec 16, 2019
Linfeng Song, Yue Zhang, Daniel Gildea, Mo Yu, Zhiguo Wang, Jinsong Su

Figure 1 for Leveraging Dependency Forest for Neural Medical Relation Extraction
Figure 2 for Leveraging Dependency Forest for Neural Medical Relation Extraction
Figure 3 for Leveraging Dependency Forest for Neural Medical Relation Extraction
Figure 4 for Leveraging Dependency Forest for Neural Medical Relation Extraction
Viaarxiv icon

Generalizable Resource Allocation in Stream Processing via Deep Reinforcement Learning

Add code
Bookmark button
Alert button
Nov 19, 2019
Xiang Ni, Jing Li, Mo Yu, Wang Zhou, Kun-Lung Wu

Figure 1 for Generalizable Resource Allocation in Stream Processing via Deep Reinforcement Learning
Figure 2 for Generalizable Resource Allocation in Stream Processing via Deep Reinforcement Learning
Figure 3 for Generalizable Resource Allocation in Stream Processing via Deep Reinforcement Learning
Figure 4 for Generalizable Resource Allocation in Stream Processing via Deep Reinforcement Learning
Viaarxiv icon

Do Multi-hop Readers Dream of Reasoning Chains?

Add code
Bookmark button
Alert button
Oct 31, 2019
Haoyu Wang, Mo Yu, Xiaoxiao Guo, Rajarshi Das, Wenhan Xiong, Tian Gao

Figure 1 for Do Multi-hop Readers Dream of Reasoning Chains?
Figure 2 for Do Multi-hop Readers Dream of Reasoning Chains?
Figure 3 for Do Multi-hop Readers Dream of Reasoning Chains?
Viaarxiv icon

Rethinking Cooperative Rationalization: Introspective Extraction and Complement Control

Add code
Bookmark button
Alert button
Oct 29, 2019
Mo Yu, Shiyu Chang, Yang Zhang, Tommi S. Jaakkola

Figure 1 for Rethinking Cooperative Rationalization: Introspective Extraction and Complement Control
Figure 2 for Rethinking Cooperative Rationalization: Introspective Extraction and Complement Control
Figure 3 for Rethinking Cooperative Rationalization: Introspective Extraction and Complement Control
Figure 4 for Rethinking Cooperative Rationalization: Introspective Extraction and Complement Control
Viaarxiv icon

A Game Theoretic Approach to Class-wise Selective Rationalization

Add code
Bookmark button
Alert button
Oct 28, 2019
Shiyu Chang, Yang Zhang, Mo Yu, Tommi S. Jaakkola

Figure 1 for A Game Theoretic Approach to Class-wise Selective Rationalization
Figure 2 for A Game Theoretic Approach to Class-wise Selective Rationalization
Figure 3 for A Game Theoretic Approach to Class-wise Selective Rationalization
Figure 4 for A Game Theoretic Approach to Class-wise Selective Rationalization
Viaarxiv icon

An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack

Add code
Bookmark button
Alert button
Oct 01, 2019
Yang Zhang, Shiyu Chang, Mo Yu, Kaizhi Qian

Figure 1 for An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack
Figure 2 for An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack
Figure 3 for An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack
Figure 4 for An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack
Viaarxiv icon

Multi-step Entity-centric Information Retrieval for Multi-Hop Question Answering

Add code
Bookmark button
Alert button
Sep 17, 2019
Ameya Godbole, Dilip Kavarthapu, Rajarshi Das, Zhiyu Gong, Abhishek Singhal, Hamed Zamani, Mo Yu, Tian Gao, Xiaoxiao Guo, Manzil Zaheer, Andrew McCallum

Figure 1 for Multi-step Entity-centric Information Retrieval for Multi-Hop Question Answering
Figure 2 for Multi-step Entity-centric Information Retrieval for Multi-Hop Question Answering
Figure 3 for Multi-step Entity-centric Information Retrieval for Multi-Hop Question Answering
Figure 4 for Multi-step Entity-centric Information Retrieval for Multi-Hop Question Answering
Viaarxiv icon