Alert button
Picture for William H. Hsu

William H. Hsu

Alert button

Vision-Based Layout Detection from Scientific Literature using Recurrent Convolutional Neural Networks

Oct 18, 2020
Huichen Yang, William H. Hsu

Figure 1 for Vision-Based Layout Detection from Scientific Literature using Recurrent Convolutional Neural Networks
Figure 2 for Vision-Based Layout Detection from Scientific Literature using Recurrent Convolutional Neural Networks
Figure 3 for Vision-Based Layout Detection from Scientific Literature using Recurrent Convolutional Neural Networks
Figure 4 for Vision-Based Layout Detection from Scientific Literature using Recurrent Convolutional Neural Networks
Viaarxiv icon

Pipelines for Procedural Information Extraction from Scientific Literature: Towards Recipes using Machine Learning and Data Science

Dec 16, 2019
Huichen Yang, Carlos A. Aguirre, Maria F. De La Torre, Derek Christensen, Luis Bobadilla, Emily Davich, Jordan Roth, Lei Luo, Yihong Theis, Alice Lam, T. Yong-Jin Han, David Buttler, William H. Hsu

Figure 1 for Pipelines for Procedural Information Extraction from Scientific Literature: Towards Recipes using Machine Learning and Data Science
Figure 2 for Pipelines for Procedural Information Extraction from Scientific Literature: Towards Recipes using Machine Learning and Data Science
Figure 3 for Pipelines for Procedural Information Extraction from Scientific Literature: Towards Recipes using Machine Learning and Data Science
Figure 4 for Pipelines for Procedural Information Extraction from Scientific Literature: Towards Recipes using Machine Learning and Data Science
Viaarxiv icon

A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams

Jul 12, 2019
Avishek Bose, Vahid Behzadan, Carlos Aguirre, William H. Hsu

Figure 1 for A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams
Figure 2 for A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams
Figure 3 for A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams
Figure 4 for A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams
Viaarxiv icon