Alert button

"Information": models, code, and papers
Alert button

Capsule Network based Contrastive Learning of Unsupervised Visual Representations

Add code
Bookmark button
Alert button
Sep 22, 2022
Harsh Panwar, Ioannis Patras

Figure 1 for Capsule Network based Contrastive Learning of Unsupervised Visual Representations
Figure 2 for Capsule Network based Contrastive Learning of Unsupervised Visual Representations
Figure 3 for Capsule Network based Contrastive Learning of Unsupervised Visual Representations
Figure 4 for Capsule Network based Contrastive Learning of Unsupervised Visual Representations
Viaarxiv icon

When Handcrafted Features and Deep Features Meet Mismatched Training and Test Sets for Deepfake Detection

Add code
Bookmark button
Alert button
Sep 27, 2022
Ying Xu, Sule Yildirim Yayilgan

Figure 1 for When Handcrafted Features and Deep Features Meet Mismatched Training and Test Sets for Deepfake Detection
Figure 2 for When Handcrafted Features and Deep Features Meet Mismatched Training and Test Sets for Deepfake Detection
Figure 3 for When Handcrafted Features and Deep Features Meet Mismatched Training and Test Sets for Deepfake Detection
Figure 4 for When Handcrafted Features and Deep Features Meet Mismatched Training and Test Sets for Deepfake Detection
Viaarxiv icon

The mpEDMD Algorithm for Data-Driven Computations of Measure-Preserving Dynamical Systems

Add code
Bookmark button
Alert button
Sep 06, 2022
Matthew J. Colbrook

Figure 1 for The mpEDMD Algorithm for Data-Driven Computations of Measure-Preserving Dynamical Systems
Figure 2 for The mpEDMD Algorithm for Data-Driven Computations of Measure-Preserving Dynamical Systems
Figure 3 for The mpEDMD Algorithm for Data-Driven Computations of Measure-Preserving Dynamical Systems
Figure 4 for The mpEDMD Algorithm for Data-Driven Computations of Measure-Preserving Dynamical Systems
Viaarxiv icon

Phishing URL Detection: A Network-based Approach Robust to Evasion

Add code
Bookmark button
Alert button
Sep 03, 2022
Taeri Kim, Noseong Park, Jiwon Hong, Sang-Wook Kim

Figure 1 for Phishing URL Detection: A Network-based Approach Robust to Evasion
Figure 2 for Phishing URL Detection: A Network-based Approach Robust to Evasion
Figure 3 for Phishing URL Detection: A Network-based Approach Robust to Evasion
Figure 4 for Phishing URL Detection: A Network-based Approach Robust to Evasion
Viaarxiv icon

A Compact Pretraining Approach for Neural Language Models

Add code
Bookmark button
Alert button
Aug 29, 2022
Shahriar Golchin, Mihai Surdeanu, Nazgol Tavabi, Ata Kiapour

Figure 1 for A Compact Pretraining Approach for Neural Language Models
Figure 2 for A Compact Pretraining Approach for Neural Language Models
Figure 3 for A Compact Pretraining Approach for Neural Language Models
Figure 4 for A Compact Pretraining Approach for Neural Language Models
Viaarxiv icon

Deep Reinforcement Learning for Optimal Power Flow with Renewables Using Spatial-Temporal Graph Information

Dec 22, 2021
Jinhao Li, Ruichang Zhang, Hao Wang, Zhi Liu, Hongyang Lai, Yanru Zhang

Figure 1 for Deep Reinforcement Learning for Optimal Power Flow with Renewables Using Spatial-Temporal Graph Information
Figure 2 for Deep Reinforcement Learning for Optimal Power Flow with Renewables Using Spatial-Temporal Graph Information
Figure 3 for Deep Reinforcement Learning for Optimal Power Flow with Renewables Using Spatial-Temporal Graph Information
Figure 4 for Deep Reinforcement Learning for Optimal Power Flow with Renewables Using Spatial-Temporal Graph Information
Viaarxiv icon

Topics in Deep Learning and Optimization Algorithms for IoT Applications in Smart Transportation

Oct 13, 2022
Hongde Wu

Figure 1 for Topics in Deep Learning and Optimization Algorithms for IoT Applications in Smart Transportation
Figure 2 for Topics in Deep Learning and Optimization Algorithms for IoT Applications in Smart Transportation
Figure 3 for Topics in Deep Learning and Optimization Algorithms for IoT Applications in Smart Transportation
Figure 4 for Topics in Deep Learning and Optimization Algorithms for IoT Applications in Smart Transportation
Viaarxiv icon

Using Entropy Measures for Monitoring the Evolution of Activity Patterns

Oct 05, 2022
Yushan Huang, Yuchen Zhao, Hamed Haddadi, Payam Barnaghi

Figure 1 for Using Entropy Measures for Monitoring the Evolution of Activity Patterns
Figure 2 for Using Entropy Measures for Monitoring the Evolution of Activity Patterns
Figure 3 for Using Entropy Measures for Monitoring the Evolution of Activity Patterns
Figure 4 for Using Entropy Measures for Monitoring the Evolution of Activity Patterns
Viaarxiv icon

Tradeoffs between convergence rate and noise amplification for momentum-based accelerated optimization algorithms

Sep 24, 2022
Hesameddin Mohammadi, Meisam Razaviyayn, Mihailo R. Jovanović

Figure 1 for Tradeoffs between convergence rate and noise amplification for momentum-based accelerated optimization algorithms
Figure 2 for Tradeoffs between convergence rate and noise amplification for momentum-based accelerated optimization algorithms
Figure 3 for Tradeoffs between convergence rate and noise amplification for momentum-based accelerated optimization algorithms
Figure 4 for Tradeoffs between convergence rate and noise amplification for momentum-based accelerated optimization algorithms
Viaarxiv icon

Are disentangled representations all you need to build speaker anonymization systems?

Add code
Bookmark button
Alert button
Aug 24, 2022
Pierre Champion, Denis Jouvet, Anthony Larcher

Figure 1 for Are disentangled representations all you need to build speaker anonymization systems?
Figure 2 for Are disentangled representations all you need to build speaker anonymization systems?
Viaarxiv icon