Alert button

"Information": models, code, and papers
Alert button

IPProtect: protecting the intellectual property of visual datasets during data valuation

Add code
Bookmark button
Alert button
Dec 22, 2022
Gursimran Singh, Chendi Wang, Ahnaf Tazwar, Lanjun Wang, Yong Zhang

Figure 1 for IPProtect: protecting the intellectual property of visual datasets during data valuation
Figure 2 for IPProtect: protecting the intellectual property of visual datasets during data valuation
Figure 3 for IPProtect: protecting the intellectual property of visual datasets during data valuation
Figure 4 for IPProtect: protecting the intellectual property of visual datasets during data valuation
Viaarxiv icon

Vehicle in Virtual Environment (VVE) Method

Dec 22, 2022
Sukru Yaren Gelbal, Bilin Aksun-Guvenc, Levent Guvenc

Figure 1 for Vehicle in Virtual Environment (VVE) Method
Figure 2 for Vehicle in Virtual Environment (VVE) Method
Figure 3 for Vehicle in Virtual Environment (VVE) Method
Figure 4 for Vehicle in Virtual Environment (VVE) Method
Viaarxiv icon

MIST: a Large-Scale Annotated Resource and Neural Models for Functions of Modal Verbs in English Scientific Text

Add code
Bookmark button
Alert button
Dec 14, 2022
Sophie Henning, Nicole Macher, Stefan Grünewald, Annemarie Friedrich

Figure 1 for MIST: a Large-Scale Annotated Resource and Neural Models for Functions of Modal Verbs in English Scientific Text
Figure 2 for MIST: a Large-Scale Annotated Resource and Neural Models for Functions of Modal Verbs in English Scientific Text
Figure 3 for MIST: a Large-Scale Annotated Resource and Neural Models for Functions of Modal Verbs in English Scientific Text
Figure 4 for MIST: a Large-Scale Annotated Resource and Neural Models for Functions of Modal Verbs in English Scientific Text
Viaarxiv icon

Synthesis of Adversarial DDOS Attacks Using Tabular Generative Adversarial Networks

Dec 14, 2022
Abdelmageed Ahmed Hassan, Mohamed Sayed Hussein, Ahmed Shehata AboMoustafa, Sarah Hossam Elmowafy

Figure 1 for Synthesis of Adversarial DDOS Attacks Using Tabular Generative Adversarial Networks
Figure 2 for Synthesis of Adversarial DDOS Attacks Using Tabular Generative Adversarial Networks
Figure 3 for Synthesis of Adversarial DDOS Attacks Using Tabular Generative Adversarial Networks
Figure 4 for Synthesis of Adversarial DDOS Attacks Using Tabular Generative Adversarial Networks
Viaarxiv icon

On Analyzing the Role of Image for Visual-enhanced Relation Extraction

Add code
Bookmark button
Alert button
Nov 14, 2022
Lei Li, Xiang Chen, Shuofei Qiao, Feiyu Xiong, Huajun Chen, Ningyu Zhang

Figure 1 for On Analyzing the Role of Image for Visual-enhanced Relation Extraction
Figure 2 for On Analyzing the Role of Image for Visual-enhanced Relation Extraction
Figure 3 for On Analyzing the Role of Image for Visual-enhanced Relation Extraction
Figure 4 for On Analyzing the Role of Image for Visual-enhanced Relation Extraction
Viaarxiv icon

Are All Edges Necessary? A Unified Framework for Graph Purification

Nov 09, 2022
Zishan Gu, Jintang Li, Liang Chen

Figure 1 for Are All Edges Necessary? A Unified Framework for Graph Purification
Figure 2 for Are All Edges Necessary? A Unified Framework for Graph Purification
Figure 3 for Are All Edges Necessary? A Unified Framework for Graph Purification
Figure 4 for Are All Edges Necessary? A Unified Framework for Graph Purification
Viaarxiv icon

A Scope Sensitive and Result Attentive Model for Multi-Intent Spoken Language Understanding

Nov 22, 2022
Lizhi Cheng, Wenmian Yang, Weijia Jia

Figure 1 for A Scope Sensitive and Result Attentive Model for Multi-Intent Spoken Language Understanding
Figure 2 for A Scope Sensitive and Result Attentive Model for Multi-Intent Spoken Language Understanding
Figure 3 for A Scope Sensitive and Result Attentive Model for Multi-Intent Spoken Language Understanding
Figure 4 for A Scope Sensitive and Result Attentive Model for Multi-Intent Spoken Language Understanding
Viaarxiv icon

PESE: Event Structure Extraction using Pointer Network based Encoder-Decoder Architecture

Add code
Bookmark button
Alert button
Nov 22, 2022
Alapan Kuila, Sudeshan Sarkar

Figure 1 for PESE: Event Structure Extraction using Pointer Network based Encoder-Decoder Architecture
Figure 2 for PESE: Event Structure Extraction using Pointer Network based Encoder-Decoder Architecture
Figure 3 for PESE: Event Structure Extraction using Pointer Network based Encoder-Decoder Architecture
Figure 4 for PESE: Event Structure Extraction using Pointer Network based Encoder-Decoder Architecture
Viaarxiv icon

Prune and distill: similar reformatting of image information along rat visual cortex and deep neural networks

May 27, 2022
Paolo Muratore, Sina Tafazoli, Eugenio Piasini, Alessandro Laio, Davide Zoccolan

Figure 1 for Prune and distill: similar reformatting of image information along rat visual cortex and deep neural networks
Figure 2 for Prune and distill: similar reformatting of image information along rat visual cortex and deep neural networks
Figure 3 for Prune and distill: similar reformatting of image information along rat visual cortex and deep neural networks
Figure 4 for Prune and distill: similar reformatting of image information along rat visual cortex and deep neural networks
Viaarxiv icon

A Unified Approach to Differentially Private Bayes Point Estimation

Nov 18, 2022
Braghadeesh Lakshminarayanan, Cristian R. Rojas

Figure 1 for A Unified Approach to Differentially Private Bayes Point Estimation
Figure 2 for A Unified Approach to Differentially Private Bayes Point Estimation
Figure 3 for A Unified Approach to Differentially Private Bayes Point Estimation
Figure 4 for A Unified Approach to Differentially Private Bayes Point Estimation
Viaarxiv icon