Alert button

"Information": models, code, and papers
Alert button

Reinforcement Learning for Deceiving Reactive Jammers in Wireless Networks

Mar 25, 2021
Ali Pourranjbar, Georges Kaddoum, Aidin Ferdowsi, Walid Saad

Figure 1 for Reinforcement Learning for Deceiving Reactive Jammers in Wireless Networks
Figure 2 for Reinforcement Learning for Deceiving Reactive Jammers in Wireless Networks
Figure 3 for Reinforcement Learning for Deceiving Reactive Jammers in Wireless Networks
Figure 4 for Reinforcement Learning for Deceiving Reactive Jammers in Wireless Networks
Viaarxiv icon

ERNIE-Gram: Pre-Training with Explicitly N-Gram Masked Language Modeling for Natural Language Understanding

Oct 23, 2020
Dongling Xiao, Yu-Kun Li, Han Zhang, Yu Sun, Hao Tian, Hua Wu, Haifeng Wang

Figure 1 for ERNIE-Gram: Pre-Training with Explicitly N-Gram Masked Language Modeling for Natural Language Understanding
Figure 2 for ERNIE-Gram: Pre-Training with Explicitly N-Gram Masked Language Modeling for Natural Language Understanding
Figure 3 for ERNIE-Gram: Pre-Training with Explicitly N-Gram Masked Language Modeling for Natural Language Understanding
Figure 4 for ERNIE-Gram: Pre-Training with Explicitly N-Gram Masked Language Modeling for Natural Language Understanding
Viaarxiv icon

Knowledge-enriched, Type-constrained and Grammar-guided Question Generation over Knowledge Bases

Oct 23, 2020
Sheng Bi, Xiya Cheng, Yuan-Fang Li, Yongzhen Wang, Guilin Qi

Figure 1 for Knowledge-enriched, Type-constrained and Grammar-guided Question Generation over Knowledge Bases
Figure 2 for Knowledge-enriched, Type-constrained and Grammar-guided Question Generation over Knowledge Bases
Figure 3 for Knowledge-enriched, Type-constrained and Grammar-guided Question Generation over Knowledge Bases
Figure 4 for Knowledge-enriched, Type-constrained and Grammar-guided Question Generation over Knowledge Bases
Viaarxiv icon

NODE-SELECT: A Graph Neural Network Based On A Selective Propagation Technique

Feb 17, 2021
Steph-Yves Louis, Alireza Nasiri, Fatima J. Rolland, Cameron Mitro, Jianjun Hu

Figure 1 for NODE-SELECT: A Graph Neural Network Based On A Selective Propagation Technique
Figure 2 for NODE-SELECT: A Graph Neural Network Based On A Selective Propagation Technique
Figure 3 for NODE-SELECT: A Graph Neural Network Based On A Selective Propagation Technique
Figure 4 for NODE-SELECT: A Graph Neural Network Based On A Selective Propagation Technique
Viaarxiv icon

Future Frame Prediction for Robot-assisted Surgery

Mar 18, 2021
Xiaojie Gao, Yueming Jin, Zixu Zhao, Qi Dou, Pheng-Ann Heng

Figure 1 for Future Frame Prediction for Robot-assisted Surgery
Figure 2 for Future Frame Prediction for Robot-assisted Surgery
Figure 3 for Future Frame Prediction for Robot-assisted Surgery
Figure 4 for Future Frame Prediction for Robot-assisted Surgery
Viaarxiv icon

A fully automated end-to-end process for fluorescence microscopy images of yeast cells: From segmentation to detection and classification

Apr 06, 2021
Asmaa Haja, Lambert R. B. Schomaker

Figure 1 for A fully automated end-to-end process for fluorescence microscopy images of yeast cells: From segmentation to detection and classification
Figure 2 for A fully automated end-to-end process for fluorescence microscopy images of yeast cells: From segmentation to detection and classification
Figure 3 for A fully automated end-to-end process for fluorescence microscopy images of yeast cells: From segmentation to detection and classification
Figure 4 for A fully automated end-to-end process for fluorescence microscopy images of yeast cells: From segmentation to detection and classification
Viaarxiv icon

Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks

Dec 21, 2020
Chenchen Zhao, Hao Li

Figure 1 for Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks
Figure 2 for Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks
Figure 3 for Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks
Figure 4 for Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks
Viaarxiv icon

CAP-GAN: Towards Adversarial Robustness with Cycle-consistent Attentional Purification

Feb 17, 2021
Mingu Kang, Trung Quang Tran, Seungju Cho, Daeyoung Kim

Figure 1 for CAP-GAN: Towards Adversarial Robustness with Cycle-consistent Attentional Purification
Figure 2 for CAP-GAN: Towards Adversarial Robustness with Cycle-consistent Attentional Purification
Figure 3 for CAP-GAN: Towards Adversarial Robustness with Cycle-consistent Attentional Purification
Figure 4 for CAP-GAN: Towards Adversarial Robustness with Cycle-consistent Attentional Purification
Viaarxiv icon

A Note on Data Biases in Generative Models

Dec 04, 2020
Patrick Esser, Robin Rombach, Björn Ommer

Figure 1 for A Note on Data Biases in Generative Models
Figure 2 for A Note on Data Biases in Generative Models
Figure 3 for A Note on Data Biases in Generative Models
Figure 4 for A Note on Data Biases in Generative Models
Viaarxiv icon

Beyond Trivial Counterfactual Explanations with Diverse Valuable Explanations

Mar 18, 2021
Pau Rodriguez, Massimo Caccia, Alexandre Lacoste, Lee Zamparo, Issam Laradji, Laurent Charlin, David Vazquez

Figure 1 for Beyond Trivial Counterfactual Explanations with Diverse Valuable Explanations
Figure 2 for Beyond Trivial Counterfactual Explanations with Diverse Valuable Explanations
Figure 3 for Beyond Trivial Counterfactual Explanations with Diverse Valuable Explanations
Figure 4 for Beyond Trivial Counterfactual Explanations with Diverse Valuable Explanations
Viaarxiv icon