Alert button

"Information": models, code, and papers
Alert button

Topological Pooling on Graphs

Add code
Bookmark button
Alert button
Mar 25, 2023
Yuzhou Chen, Yulia R. Gel

Figure 1 for Topological Pooling on Graphs
Figure 2 for Topological Pooling on Graphs
Figure 3 for Topological Pooling on Graphs
Figure 4 for Topological Pooling on Graphs
Viaarxiv icon

Learning with Explanation Constraints

Mar 25, 2023
Rattana Pukdee, Dylan Sam, J. Zico Kolter, Maria-Florina Balcan, Pradeep Ravikumar

Figure 1 for Learning with Explanation Constraints
Figure 2 for Learning with Explanation Constraints
Figure 3 for Learning with Explanation Constraints
Figure 4 for Learning with Explanation Constraints
Viaarxiv icon

Multi-Object Tracking by Iteratively Associating Detections with Uniform Appearance for Trawl-Based Fishing Bycatch Monitoring

Apr 10, 2023
Cheng-Yen Yang, Alan Yu Shyang Tan, Melanie J. Underwood, Charlotte Bodie, Zhongyu Jiang, Steve George, Karl Warr, Jenq-Neng Hwang, Emma Jones

Figure 1 for Multi-Object Tracking by Iteratively Associating Detections with Uniform Appearance for Trawl-Based Fishing Bycatch Monitoring
Figure 2 for Multi-Object Tracking by Iteratively Associating Detections with Uniform Appearance for Trawl-Based Fishing Bycatch Monitoring
Figure 3 for Multi-Object Tracking by Iteratively Associating Detections with Uniform Appearance for Trawl-Based Fishing Bycatch Monitoring
Figure 4 for Multi-Object Tracking by Iteratively Associating Detections with Uniform Appearance for Trawl-Based Fishing Bycatch Monitoring
Viaarxiv icon

coExplore: Combining multiple rankings for multi-robot exploration

Add code
Bookmark button
Alert button
Apr 10, 2023
Ingo Scheler, Robin Dietrich

Figure 1 for coExplore: Combining multiple rankings for multi-robot exploration
Figure 2 for coExplore: Combining multiple rankings for multi-robot exploration
Figure 3 for coExplore: Combining multiple rankings for multi-robot exploration
Figure 4 for coExplore: Combining multiple rankings for multi-robot exploration
Viaarxiv icon

Recover Triggered States: Protect Model Against Backdoor Attack in Reinforcement Learning

Add code
Bookmark button
Alert button
Apr 10, 2023
Hao Chen, Chen Gong, Yizhe Wang, Xinwen Hou

Figure 1 for Recover Triggered States: Protect Model Against Backdoor Attack in Reinforcement Learning
Figure 2 for Recover Triggered States: Protect Model Against Backdoor Attack in Reinforcement Learning
Figure 3 for Recover Triggered States: Protect Model Against Backdoor Attack in Reinforcement Learning
Figure 4 for Recover Triggered States: Protect Model Against Backdoor Attack in Reinforcement Learning
Viaarxiv icon

KERM: Knowledge Enhanced Reasoning for Vision-and-Language Navigation

Add code
Bookmark button
Alert button
Mar 28, 2023
Xiangyang Li, Zihan Wang, Jiahao Yang, Yaowei Wang, Shuqiang Jiang

Figure 1 for KERM: Knowledge Enhanced Reasoning for Vision-and-Language Navigation
Figure 2 for KERM: Knowledge Enhanced Reasoning for Vision-and-Language Navigation
Figure 3 for KERM: Knowledge Enhanced Reasoning for Vision-and-Language Navigation
Figure 4 for KERM: Knowledge Enhanced Reasoning for Vision-and-Language Navigation
Viaarxiv icon

On Codex Prompt Engineering for OCL Generation: An Empirical Study

Add code
Bookmark button
Alert button
Mar 28, 2023
Seif Abukhalaf, Mohammad Hamdaqa, Foutse Khomh

Figure 1 for On Codex Prompt Engineering for OCL Generation: An Empirical Study
Figure 2 for On Codex Prompt Engineering for OCL Generation: An Empirical Study
Figure 3 for On Codex Prompt Engineering for OCL Generation: An Empirical Study
Figure 4 for On Codex Prompt Engineering for OCL Generation: An Empirical Study
Viaarxiv icon

Mask Reference Image Quality Assessment

Mar 19, 2023
Pengxiang Xiao, Shuai He, Limin Liu, Anlong Ming

Figure 1 for Mask Reference Image Quality Assessment
Figure 2 for Mask Reference Image Quality Assessment
Figure 3 for Mask Reference Image Quality Assessment
Figure 4 for Mask Reference Image Quality Assessment
Viaarxiv icon

Crowdsourcing on Sensitive Data with Privacy-Preserving Text Rewriting

Mar 06, 2023
Nina Mouhammad, Johannes Daxenberger, Benjamin Schiller, Ivan Habernal

Figure 1 for Crowdsourcing on Sensitive Data with Privacy-Preserving Text Rewriting
Figure 2 for Crowdsourcing on Sensitive Data with Privacy-Preserving Text Rewriting
Figure 3 for Crowdsourcing on Sensitive Data with Privacy-Preserving Text Rewriting
Figure 4 for Crowdsourcing on Sensitive Data with Privacy-Preserving Text Rewriting
Viaarxiv icon

Dynamic Crowd Vetting: Collaborative Detection of Malicious Robots in Dynamic Communication Networks

Apr 02, 2023
Matthew Cavorsi, Frederik Mallmann-Trenn, David Saldaña, Stephanie Gil

Figure 1 for Dynamic Crowd Vetting: Collaborative Detection of Malicious Robots in Dynamic Communication Networks
Figure 2 for Dynamic Crowd Vetting: Collaborative Detection of Malicious Robots in Dynamic Communication Networks
Figure 3 for Dynamic Crowd Vetting: Collaborative Detection of Malicious Robots in Dynamic Communication Networks
Figure 4 for Dynamic Crowd Vetting: Collaborative Detection of Malicious Robots in Dynamic Communication Networks
Viaarxiv icon