Alert button

"Information": models, code, and papers
Alert button

MNet: Rethinking 2D/3D Networks for Anisotropic Medical Image Segmentation

Add code
Bookmark button
Alert button
May 10, 2022
Zhangfu Dong, Yuting He, Xiaoming Qi, Yang Chen, Huazhong Shu, Jean-Louis Coatrieux, Guanyu Yang, Shuo Li

Figure 1 for MNet: Rethinking 2D/3D Networks for Anisotropic Medical Image Segmentation
Figure 2 for MNet: Rethinking 2D/3D Networks for Anisotropic Medical Image Segmentation
Figure 3 for MNet: Rethinking 2D/3D Networks for Anisotropic Medical Image Segmentation
Figure 4 for MNet: Rethinking 2D/3D Networks for Anisotropic Medical Image Segmentation
Viaarxiv icon

Local Byte Fusion for Neural Machine Translation

Add code
Bookmark button
Alert button
May 23, 2022
Makesh Narsimhan Sreedhar, Xiangpeng Wan, Yu Cheng, Junjie Hu

Figure 1 for Local Byte Fusion for Neural Machine Translation
Figure 2 for Local Byte Fusion for Neural Machine Translation
Figure 3 for Local Byte Fusion for Neural Machine Translation
Figure 4 for Local Byte Fusion for Neural Machine Translation
Viaarxiv icon

Learning structures of the French clinical language:development and validation of word embedding models using 21 million clinical reports from electronic health records

Add code
Bookmark button
Alert button
Jul 26, 2022
Basile Dura, Charline Jean, Xavier Tannier, Alice Calliger, Romain Bey, Antoine Neuraz, Rémi Flicoteaux

Figure 1 for Learning structures of the French clinical language:development and validation of word embedding models using 21 million clinical reports from electronic health records
Figure 2 for Learning structures of the French clinical language:development and validation of word embedding models using 21 million clinical reports from electronic health records
Figure 3 for Learning structures of the French clinical language:development and validation of word embedding models using 21 million clinical reports from electronic health records
Figure 4 for Learning structures of the French clinical language:development and validation of word embedding models using 21 million clinical reports from electronic health records
Viaarxiv icon

Electromagnetic Signal Injection Attacks on Differential Signaling

Jul 31, 2022
Youqian Zhang, Kasper Rasmussen

Figure 1 for Electromagnetic Signal Injection Attacks on Differential Signaling
Figure 2 for Electromagnetic Signal Injection Attacks on Differential Signaling
Figure 3 for Electromagnetic Signal Injection Attacks on Differential Signaling
Figure 4 for Electromagnetic Signal Injection Attacks on Differential Signaling
Viaarxiv icon

NSNet: Non-saliency Suppression Sampler for Efficient Video Recognition

Add code
Bookmark button
Alert button
Jul 21, 2022
Boyang Xia, Wenhao Wu, Haoran Wang, Rui Su, Dongliang He, Haosen Yang, Xiaoran Fan, Wanli Ouyang

Figure 1 for NSNet: Non-saliency Suppression Sampler for Efficient Video Recognition
Figure 2 for NSNet: Non-saliency Suppression Sampler for Efficient Video Recognition
Figure 3 for NSNet: Non-saliency Suppression Sampler for Efficient Video Recognition
Figure 4 for NSNet: Non-saliency Suppression Sampler for Efficient Video Recognition
Viaarxiv icon

A Novel Underwater Image Enhancement and Improved Underwater Biological Detection Pipeline

May 20, 2022
Zheng Liu, Yaoming Zhuang, Pengrun Jia, Chengdong Wu, Hongli Xu ang Zhanlin Liu

Viaarxiv icon

Multimodal Dialogue State Tracking

Add code
Bookmark button
Alert button
Jun 16, 2022
Hung Le, Nancy F. Chen, Steven C. H. Hoi

Figure 1 for Multimodal Dialogue State Tracking
Figure 2 for Multimodal Dialogue State Tracking
Figure 3 for Multimodal Dialogue State Tracking
Figure 4 for Multimodal Dialogue State Tracking
Viaarxiv icon

Towards Privacy-Preserving Person Re-identification via Person Identify Shift

Jul 15, 2022
Shuguang Dou, Xinyang Jiang, Qingsong Zhao, Dongsheng Li, Cairong Zhao

Figure 1 for Towards Privacy-Preserving Person Re-identification via Person Identify Shift
Figure 2 for Towards Privacy-Preserving Person Re-identification via Person Identify Shift
Figure 3 for Towards Privacy-Preserving Person Re-identification via Person Identify Shift
Figure 4 for Towards Privacy-Preserving Person Re-identification via Person Identify Shift
Viaarxiv icon

ID-Agnostic User Behavior Pre-training for Sequential Recommendation

Jun 06, 2022
Shanlei Mu, Yupeng Hou, Wayne Xin Zhao, Yaliang Li, Bolin Ding

Figure 1 for ID-Agnostic User Behavior Pre-training for Sequential Recommendation
Figure 2 for ID-Agnostic User Behavior Pre-training for Sequential Recommendation
Figure 3 for ID-Agnostic User Behavior Pre-training for Sequential Recommendation
Figure 4 for ID-Agnostic User Behavior Pre-training for Sequential Recommendation
Viaarxiv icon

"Why do so?" -- A Practical Perspective on Machine Learning Security

Jul 11, 2022
Kathrin Grosse, Lukas Bieringer, Tarek Richard Besold, Battista Biggio, Katharina Krombholz

Figure 1 for "Why do so?" -- A Practical Perspective on Machine Learning Security
Figure 2 for "Why do so?" -- A Practical Perspective on Machine Learning Security
Figure 3 for "Why do so?" -- A Practical Perspective on Machine Learning Security
Figure 4 for "Why do so?" -- A Practical Perspective on Machine Learning Security
Viaarxiv icon