Picture for Mo Yu

Mo Yu

Frustratingly Hard Evidence Retrieval for QA Over Books

Add code
Jul 20, 2020
Figure 1 for Frustratingly Hard Evidence Retrieval for QA Over Books
Figure 2 for Frustratingly Hard Evidence Retrieval for QA Over Books
Figure 3 for Frustratingly Hard Evidence Retrieval for QA Over Books
Figure 4 for Frustratingly Hard Evidence Retrieval for QA Over Books
Viaarxiv icon

Differential Treatment for Stuff and Things: A Simple Unsupervised Domain Adaptation Method for Semantic Segmentation

Add code
Apr 22, 2020
Figure 1 for Differential Treatment for Stuff and Things: A Simple Unsupervised Domain Adaptation Method for Semantic Segmentation
Figure 2 for Differential Treatment for Stuff and Things: A Simple Unsupervised Domain Adaptation Method for Semantic Segmentation
Figure 3 for Differential Treatment for Stuff and Things: A Simple Unsupervised Domain Adaptation Method for Semantic Segmentation
Figure 4 for Differential Treatment for Stuff and Things: A Simple Unsupervised Domain Adaptation Method for Semantic Segmentation
Viaarxiv icon

Learning to Recover Reasoning Chains for Multi-Hop Question Answering via Cooperative Games

Add code
Apr 06, 2020
Figure 1 for Learning to Recover Reasoning Chains for Multi-Hop Question Answering via Cooperative Games
Figure 2 for Learning to Recover Reasoning Chains for Multi-Hop Question Answering via Cooperative Games
Figure 3 for Learning to Recover Reasoning Chains for Multi-Hop Question Answering via Cooperative Games
Figure 4 for Learning to Recover Reasoning Chains for Multi-Hop Question Answering via Cooperative Games
Viaarxiv icon

Invariant Rationalization

Add code
Mar 22, 2020
Figure 1 for Invariant Rationalization
Figure 2 for Invariant Rationalization
Figure 3 for Invariant Rationalization
Figure 4 for Invariant Rationalization
Viaarxiv icon

Leveraging Dependency Forest for Neural Medical Relation Extraction

Add code
Dec 16, 2019
Figure 1 for Leveraging Dependency Forest for Neural Medical Relation Extraction
Figure 2 for Leveraging Dependency Forest for Neural Medical Relation Extraction
Figure 3 for Leveraging Dependency Forest for Neural Medical Relation Extraction
Figure 4 for Leveraging Dependency Forest for Neural Medical Relation Extraction
Viaarxiv icon

Generalizable Resource Allocation in Stream Processing via Deep Reinforcement Learning

Add code
Nov 19, 2019
Figure 1 for Generalizable Resource Allocation in Stream Processing via Deep Reinforcement Learning
Figure 2 for Generalizable Resource Allocation in Stream Processing via Deep Reinforcement Learning
Figure 3 for Generalizable Resource Allocation in Stream Processing via Deep Reinforcement Learning
Figure 4 for Generalizable Resource Allocation in Stream Processing via Deep Reinforcement Learning
Viaarxiv icon

Do Multi-hop Readers Dream of Reasoning Chains?

Add code
Oct 31, 2019
Figure 1 for Do Multi-hop Readers Dream of Reasoning Chains?
Figure 2 for Do Multi-hop Readers Dream of Reasoning Chains?
Figure 3 for Do Multi-hop Readers Dream of Reasoning Chains?
Viaarxiv icon

Rethinking Cooperative Rationalization: Introspective Extraction and Complement Control

Add code
Oct 29, 2019
Figure 1 for Rethinking Cooperative Rationalization: Introspective Extraction and Complement Control
Figure 2 for Rethinking Cooperative Rationalization: Introspective Extraction and Complement Control
Figure 3 for Rethinking Cooperative Rationalization: Introspective Extraction and Complement Control
Figure 4 for Rethinking Cooperative Rationalization: Introspective Extraction and Complement Control
Viaarxiv icon

A Game Theoretic Approach to Class-wise Selective Rationalization

Add code
Oct 28, 2019
Figure 1 for A Game Theoretic Approach to Class-wise Selective Rationalization
Figure 2 for A Game Theoretic Approach to Class-wise Selective Rationalization
Figure 3 for A Game Theoretic Approach to Class-wise Selective Rationalization
Figure 4 for A Game Theoretic Approach to Class-wise Selective Rationalization
Viaarxiv icon

An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack

Add code
Oct 01, 2019
Figure 1 for An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack
Figure 2 for An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack
Figure 3 for An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack
Figure 4 for An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack
Viaarxiv icon