Alert button

"Information": models, code, and papers
Alert button

Hiding Information in Big Data based on Deep Learning

Dec 31, 2019
Dingju Zhu

Figure 1 for Hiding Information in Big Data based on Deep Learning
Figure 2 for Hiding Information in Big Data based on Deep Learning
Figure 3 for Hiding Information in Big Data based on Deep Learning
Figure 4 for Hiding Information in Big Data based on Deep Learning
Viaarxiv icon

Sparse Interventions in Language Models with Differentiable Masking

Add code
Bookmark button
Alert button
Dec 13, 2021
Nicola De Cao, Leon Schmid, Dieuwke Hupkes, Ivan Titov

Figure 1 for Sparse Interventions in Language Models with Differentiable Masking
Figure 2 for Sparse Interventions in Language Models with Differentiable Masking
Figure 3 for Sparse Interventions in Language Models with Differentiable Masking
Figure 4 for Sparse Interventions in Language Models with Differentiable Masking
Viaarxiv icon

SeMask: Semantically Masked Transformers for Semantic Segmentation

Add code
Bookmark button
Alert button
Dec 23, 2021
Jitesh Jain, Anukriti Singh, Nikita Orlov, Zilong Huang, Jiachen Li, Steven Walton, Humphrey Shi

Figure 1 for SeMask: Semantically Masked Transformers for Semantic Segmentation
Figure 2 for SeMask: Semantically Masked Transformers for Semantic Segmentation
Figure 3 for SeMask: Semantically Masked Transformers for Semantic Segmentation
Figure 4 for SeMask: Semantically Masked Transformers for Semantic Segmentation
Viaarxiv icon

Adversarial Imitation Learning from Video using a State Observer

Feb 01, 2022
Haresh Karnan, Garrett Warnell, Faraz Torabi, Peter Stone

Figure 1 for Adversarial Imitation Learning from Video using a State Observer
Figure 2 for Adversarial Imitation Learning from Video using a State Observer
Figure 3 for Adversarial Imitation Learning from Video using a State Observer
Figure 4 for Adversarial Imitation Learning from Video using a State Observer
Viaarxiv icon

The Effect of Model Size on Worst-Group Generalization

Dec 08, 2021
Alan Pham, Eunice Chan, Vikranth Srivatsa, Dhruba Ghosh, Yaoqing Yang, Yaodong Yu, Ruiqi Zhong, Joseph E. Gonzalez, Jacob Steinhardt

Figure 1 for The Effect of Model Size on Worst-Group Generalization
Figure 2 for The Effect of Model Size on Worst-Group Generalization
Figure 3 for The Effect of Model Size on Worst-Group Generalization
Figure 4 for The Effect of Model Size on Worst-Group Generalization
Viaarxiv icon

SECP-Net: SE-Connection Pyramid Network of Organ At Risk Segmentation for Nasopharyngeal Carcinoma

Dec 28, 2021
Zexi Huang, Lihua Guo, Xin Yang, Sijuan Huang

Figure 1 for SECP-Net: SE-Connection Pyramid Network of Organ At Risk Segmentation for Nasopharyngeal Carcinoma
Figure 2 for SECP-Net: SE-Connection Pyramid Network of Organ At Risk Segmentation for Nasopharyngeal Carcinoma
Figure 3 for SECP-Net: SE-Connection Pyramid Network of Organ At Risk Segmentation for Nasopharyngeal Carcinoma
Figure 4 for SECP-Net: SE-Connection Pyramid Network of Organ At Risk Segmentation for Nasopharyngeal Carcinoma
Viaarxiv icon

GuidedMix-Net: Semi-supervised Semantic Segmentation by Using Labeled Images as Reference

Dec 28, 2021
Peng Tu, Yawen Huang, Feng Zheng, Zhenyu He, Liujun Cao, Ling Shao

Figure 1 for GuidedMix-Net: Semi-supervised Semantic Segmentation by Using Labeled Images as Reference
Figure 2 for GuidedMix-Net: Semi-supervised Semantic Segmentation by Using Labeled Images as Reference
Figure 3 for GuidedMix-Net: Semi-supervised Semantic Segmentation by Using Labeled Images as Reference
Figure 4 for GuidedMix-Net: Semi-supervised Semantic Segmentation by Using Labeled Images as Reference
Viaarxiv icon

Decentralized Task Offloading in Edge Computing: A Multi-User Multi-Armed Bandit Approach

Dec 28, 2021
Xiong Wang, Jiancheng Ye, John C. S. Lui

Figure 1 for Decentralized Task Offloading in Edge Computing: A Multi-User Multi-Armed Bandit Approach
Figure 2 for Decentralized Task Offloading in Edge Computing: A Multi-User Multi-Armed Bandit Approach
Figure 3 for Decentralized Task Offloading in Edge Computing: A Multi-User Multi-Armed Bandit Approach
Figure 4 for Decentralized Task Offloading in Edge Computing: A Multi-User Multi-Armed Bandit Approach
Viaarxiv icon

Dynamic Bottleneck for Robust Self-Supervised Exploration

Add code
Bookmark button
Alert button
Oct 25, 2021
Chenjia Bai, Lingxiao Wang, Lei Han, Animesh Garg, Jianye Hao, Peng Liu, Zhaoran Wang

Figure 1 for Dynamic Bottleneck for Robust Self-Supervised Exploration
Figure 2 for Dynamic Bottleneck for Robust Self-Supervised Exploration
Figure 3 for Dynamic Bottleneck for Robust Self-Supervised Exploration
Figure 4 for Dynamic Bottleneck for Robust Self-Supervised Exploration
Viaarxiv icon

Revisiting Over-Smoothness in Text to Speech

Add code
Bookmark button
Alert button
Feb 26, 2022
Yi Ren, Xu Tan, Tao Qin, Zhou Zhao, Tie-Yan Liu

Figure 1 for Revisiting Over-Smoothness in Text to Speech
Figure 2 for Revisiting Over-Smoothness in Text to Speech
Figure 3 for Revisiting Over-Smoothness in Text to Speech
Figure 4 for Revisiting Over-Smoothness in Text to Speech
Viaarxiv icon