Alert button

"Information": models, code, and papers
Alert button

A Novel Chaos-based Light-weight Image Encryption Scheme for Multi-modal Hearing Aids

Feb 11, 2022
Awais Aziz Shah, Ahsan Adeel, Jawad Ahmad, Ahmed Al-Dubai, Mandar Gogate, Abhijeet Bishnu, Muhammad Diyan, Tassadaq Hussain, Kia Dashtipour, Tharm Ratnarajah, Amir Hussain

Figure 1 for A Novel Chaos-based Light-weight Image Encryption Scheme for Multi-modal Hearing Aids
Figure 2 for A Novel Chaos-based Light-weight Image Encryption Scheme for Multi-modal Hearing Aids
Figure 3 for A Novel Chaos-based Light-weight Image Encryption Scheme for Multi-modal Hearing Aids
Figure 4 for A Novel Chaos-based Light-weight Image Encryption Scheme for Multi-modal Hearing Aids
Viaarxiv icon

A Central Difference Graph Convolutional Operator for Skeleton-Based Action Recognition

Add code
Bookmark button
Alert button
Nov 13, 2021
Shuangyan Miao, Yonghong Hou, Zhimin Gao, Mingliang Xu, Wanqing Li

Figure 1 for A Central Difference Graph Convolutional Operator for Skeleton-Based Action Recognition
Figure 2 for A Central Difference Graph Convolutional Operator for Skeleton-Based Action Recognition
Figure 3 for A Central Difference Graph Convolutional Operator for Skeleton-Based Action Recognition
Figure 4 for A Central Difference Graph Convolutional Operator for Skeleton-Based Action Recognition
Viaarxiv icon

Understanding Knowledge Integration in Language Models with Graph Convolutions

Add code
Bookmark button
Alert button
Feb 15, 2022
Yifan Hou, Guoji Fu, Mrinmaya Sachan

Figure 1 for Understanding Knowledge Integration in Language Models with Graph Convolutions
Figure 2 for Understanding Knowledge Integration in Language Models with Graph Convolutions
Figure 3 for Understanding Knowledge Integration in Language Models with Graph Convolutions
Figure 4 for Understanding Knowledge Integration in Language Models with Graph Convolutions
Viaarxiv icon

Learning from scarce information: using synthetic data to classify Roman fine ware pottery

Jul 03, 2021
Santos J. Núñez Jareño, Daniël P. van Helden, Evgeny M. Mirkes, Ivan Y. Tyukin, Penelope M. Allison

Figure 1 for Learning from scarce information: using synthetic data to classify Roman fine ware pottery
Figure 2 for Learning from scarce information: using synthetic data to classify Roman fine ware pottery
Figure 3 for Learning from scarce information: using synthetic data to classify Roman fine ware pottery
Figure 4 for Learning from scarce information: using synthetic data to classify Roman fine ware pottery
Viaarxiv icon

AutoMC: Automated Model Compression based on Domain Knowledge and Progressive search strategy

Jan 24, 2022
Chunnan Wang, Hongzhi Wang, Xiangyu Shi

Figure 1 for AutoMC: Automated Model Compression based on Domain Knowledge and Progressive search strategy
Figure 2 for AutoMC: Automated Model Compression based on Domain Knowledge and Progressive search strategy
Figure 3 for AutoMC: Automated Model Compression based on Domain Knowledge and Progressive search strategy
Figure 4 for AutoMC: Automated Model Compression based on Domain Knowledge and Progressive search strategy
Viaarxiv icon

Federated Unlearning with Knowledge Distillation

Jan 24, 2022
Chen Wu, Sencun Zhu, Prasenjit Mitra

Figure 1 for Federated Unlearning with Knowledge Distillation
Figure 2 for Federated Unlearning with Knowledge Distillation
Figure 3 for Federated Unlearning with Knowledge Distillation
Figure 4 for Federated Unlearning with Knowledge Distillation
Viaarxiv icon

Early Detection of Security-Relevant Bug Reports using Machine Learning: How Far Are We?

Add code
Bookmark button
Alert button
Dec 19, 2021
Arthur D. Sawadogo, Quentin Guimard, Tegawendé F. Bissyandé, Abdoul Kader Kaboré, Jacques Klein, Naouel Moha

Figure 1 for Early Detection of Security-Relevant Bug Reports using Machine Learning: How Far Are We?
Figure 2 for Early Detection of Security-Relevant Bug Reports using Machine Learning: How Far Are We?
Figure 3 for Early Detection of Security-Relevant Bug Reports using Machine Learning: How Far Are We?
Figure 4 for Early Detection of Security-Relevant Bug Reports using Machine Learning: How Far Are We?
Viaarxiv icon

Reinforcement Learning Your Way: Agent Characterization through Policy Regularization

Jan 21, 2022
Charl Maree, Christian Omlin

Figure 1 for Reinforcement Learning Your Way: Agent Characterization through Policy Regularization
Figure 2 for Reinforcement Learning Your Way: Agent Characterization through Policy Regularization
Figure 3 for Reinforcement Learning Your Way: Agent Characterization through Policy Regularization
Viaarxiv icon

Swin UNETR: Swin Transformers for Semantic Segmentation of Brain Tumors in MRI Images

Jan 04, 2022
Ali Hatamizadeh, Vishwesh Nath, Yucheng Tang, Dong Yang, Holger Roth, Daguang Xu

Figure 1 for Swin UNETR: Swin Transformers for Semantic Segmentation of Brain Tumors in MRI Images
Figure 2 for Swin UNETR: Swin Transformers for Semantic Segmentation of Brain Tumors in MRI Images
Figure 3 for Swin UNETR: Swin Transformers for Semantic Segmentation of Brain Tumors in MRI Images
Figure 4 for Swin UNETR: Swin Transformers for Semantic Segmentation of Brain Tumors in MRI Images
Viaarxiv icon

Case law retrieval: problems, methods, challenges and evaluations in the last 20 years

Feb 15, 2022
Daniel Locke, Guido Zuccon

Viaarxiv icon