Alert button

"Information": models, code, and papers
Alert button

Better Lightweight Network for Free: Codeword Mimic Learning for Massive MIMO CSI feedback

Oct 29, 2022
Zhilin Lu, Xudong Zhang, Rui Zeng, Jintao Wang

Figure 1 for Better Lightweight Network for Free: Codeword Mimic Learning for Massive MIMO CSI feedback
Figure 2 for Better Lightweight Network for Free: Codeword Mimic Learning for Massive MIMO CSI feedback
Figure 3 for Better Lightweight Network for Free: Codeword Mimic Learning for Massive MIMO CSI feedback
Figure 4 for Better Lightweight Network for Free: Codeword Mimic Learning for Massive MIMO CSI feedback
Viaarxiv icon

AU-Aware Vision Transformers for Biased Facial Expression Recognition

Nov 12, 2022
Shuyi Mao, Xinpeng Li, Qingyang Wu, Xiaojiang Peng

Figure 1 for AU-Aware Vision Transformers for Biased Facial Expression Recognition
Figure 2 for AU-Aware Vision Transformers for Biased Facial Expression Recognition
Figure 3 for AU-Aware Vision Transformers for Biased Facial Expression Recognition
Figure 4 for AU-Aware Vision Transformers for Biased Facial Expression Recognition
Viaarxiv icon

Q-ViT: Accurate and Fully Quantized Low-bit Vision Transformer

Oct 13, 2022
Yanjing Li, Sheng Xu, Baochang Zhang, Xianbin Cao, Peng Gao, Guodong Guo

Figure 1 for Q-ViT: Accurate and Fully Quantized Low-bit Vision Transformer
Figure 2 for Q-ViT: Accurate and Fully Quantized Low-bit Vision Transformer
Figure 3 for Q-ViT: Accurate and Fully Quantized Low-bit Vision Transformer
Figure 4 for Q-ViT: Accurate and Fully Quantized Low-bit Vision Transformer
Viaarxiv icon

Dungeons and Dragons as a Dialog Challenge for Artificial Intelligence

Oct 13, 2022
Chris Callison-Burch, Gaurav Singh Tomar, Lara J. Martin, Daphne Ippolito, Suma Bailis, David Reitter

Figure 1 for Dungeons and Dragons as a Dialog Challenge for Artificial Intelligence
Figure 2 for Dungeons and Dragons as a Dialog Challenge for Artificial Intelligence
Figure 3 for Dungeons and Dragons as a Dialog Challenge for Artificial Intelligence
Figure 4 for Dungeons and Dragons as a Dialog Challenge for Artificial Intelligence
Viaarxiv icon

Subspace-Contrastive Multi-View Clustering

Oct 13, 2022
Fu Lele, Zhang Lei, Yang Jinghua, Chen Chuan, Zhang Chuanfu, Zheng Zibin

Figure 1 for Subspace-Contrastive Multi-View Clustering
Figure 2 for Subspace-Contrastive Multi-View Clustering
Figure 3 for Subspace-Contrastive Multi-View Clustering
Figure 4 for Subspace-Contrastive Multi-View Clustering
Viaarxiv icon

LP-BFGS attack: An adversarial attack based on the Hessian with limited pixels

Oct 26, 2022
Jiebao Zhang, Wenhua Qian, Rencan Nie, Jinde Cao, Dan Xu

Figure 1 for LP-BFGS attack: An adversarial attack based on the Hessian with limited pixels
Figure 2 for LP-BFGS attack: An adversarial attack based on the Hessian with limited pixels
Figure 3 for LP-BFGS attack: An adversarial attack based on the Hessian with limited pixels
Figure 4 for LP-BFGS attack: An adversarial attack based on the Hessian with limited pixels
Viaarxiv icon

The scaling of goals via homeostasis: an evolutionary simulation, experiment and analysis

Nov 15, 2022
Leo Pio-Lopez, Johanna Bischof, Jennifer V. LaPalme, Michael Levin

Figure 1 for The scaling of goals via homeostasis: an evolutionary simulation, experiment and analysis
Figure 2 for The scaling of goals via homeostasis: an evolutionary simulation, experiment and analysis
Figure 3 for The scaling of goals via homeostasis: an evolutionary simulation, experiment and analysis
Figure 4 for The scaling of goals via homeostasis: an evolutionary simulation, experiment and analysis
Viaarxiv icon

Sensing-Assisted Eavesdropper Estimation: An ISAC Breakthrough in Physical Layer Security

Oct 15, 2022
Nanchi Su, Fan Liu, Christos Masouros

Figure 1 for Sensing-Assisted Eavesdropper Estimation: An ISAC Breakthrough in Physical Layer Security
Figure 2 for Sensing-Assisted Eavesdropper Estimation: An ISAC Breakthrough in Physical Layer Security
Figure 3 for Sensing-Assisted Eavesdropper Estimation: An ISAC Breakthrough in Physical Layer Security
Figure 4 for Sensing-Assisted Eavesdropper Estimation: An ISAC Breakthrough in Physical Layer Security
Viaarxiv icon

Augmentation-Free Graph Contrastive Learning of Invariant-Discriminative Representations

Oct 15, 2022
Haifeng Li, Jun Cao, Jiawei Zhu, Qinyao Luo, Silu He, Xuyin Wang

Figure 1 for Augmentation-Free Graph Contrastive Learning of Invariant-Discriminative Representations
Figure 2 for Augmentation-Free Graph Contrastive Learning of Invariant-Discriminative Representations
Figure 3 for Augmentation-Free Graph Contrastive Learning of Invariant-Discriminative Representations
Figure 4 for Augmentation-Free Graph Contrastive Learning of Invariant-Discriminative Representations
Viaarxiv icon

The least-used key selection method for information retrieval in large-scale Cloud-based service repositories

Aug 16, 2022
Jiayan Gu, Ashiq Anjum, Yan Wu, Lu Liu, John Panneerselvam, Yao Lu, Bo Yuan

Figure 1 for The least-used key selection method for information retrieval in large-scale Cloud-based service repositories
Figure 2 for The least-used key selection method for information retrieval in large-scale Cloud-based service repositories
Figure 3 for The least-used key selection method for information retrieval in large-scale Cloud-based service repositories
Figure 4 for The least-used key selection method for information retrieval in large-scale Cloud-based service repositories
Viaarxiv icon