Alert button

"Text": models, code, and papers
Alert button

AVATAR: Robust Voice Search Engine Leveraging Autoregressive Document Retrieval and Contrastive Learning

Sep 04, 2023
Yi-Cheng Wang, Tzu-Ting Yang, Hsin-Wei Wang, Bi-Cheng Yan, Berlin Chen

Figure 1 for AVATAR: Robust Voice Search Engine Leveraging Autoregressive Document Retrieval and Contrastive Learning
Figure 2 for AVATAR: Robust Voice Search Engine Leveraging Autoregressive Document Retrieval and Contrastive Learning
Figure 3 for AVATAR: Robust Voice Search Engine Leveraging Autoregressive Document Retrieval and Contrastive Learning
Figure 4 for AVATAR: Robust Voice Search Engine Leveraging Autoregressive Document Retrieval and Contrastive Learning
Viaarxiv icon

Recurrent Attention Networks for Long-text Modeling

Jun 12, 2023
Xianming Li, Zongxi Li, Xiaotian Luo, Haoran Xie, Xing Lee, Yingbin Zhao, Fu Lee Wang, Qing Li

Figure 1 for Recurrent Attention Networks for Long-text Modeling
Figure 2 for Recurrent Attention Networks for Long-text Modeling
Figure 3 for Recurrent Attention Networks for Long-text Modeling
Figure 4 for Recurrent Attention Networks for Long-text Modeling
Viaarxiv icon

Compositional Learning of Visually-Grounded Concepts Using Reinforcement

Sep 08, 2023
Zijun Lin, Haidi Azaman, M Ganesh Kumar, Cheston Tan

Figure 1 for Compositional Learning of Visually-Grounded Concepts Using Reinforcement
Figure 2 for Compositional Learning of Visually-Grounded Concepts Using Reinforcement
Figure 3 for Compositional Learning of Visually-Grounded Concepts Using Reinforcement
Figure 4 for Compositional Learning of Visually-Grounded Concepts Using Reinforcement
Viaarxiv icon

Wi-BFI: Extracting the IEEE 802.11 Beamforming Feedback Information from Commercial Wi-Fi Devices

Sep 08, 2023
Khandaker Foysal Haque, Francesca Meneghello, Francesco Restuccia

Figure 1 for Wi-BFI: Extracting the IEEE 802.11 Beamforming Feedback Information from Commercial Wi-Fi Devices
Figure 2 for Wi-BFI: Extracting the IEEE 802.11 Beamforming Feedback Information from Commercial Wi-Fi Devices
Figure 3 for Wi-BFI: Extracting the IEEE 802.11 Beamforming Feedback Information from Commercial Wi-Fi Devices
Figure 4 for Wi-BFI: Extracting the IEEE 802.11 Beamforming Feedback Information from Commercial Wi-Fi Devices
Viaarxiv icon

AIGC for Various Data Modalities: A Survey

Aug 27, 2023
Lin Geng Foo, Hossein Rahmani, Jun Liu

Figure 1 for AIGC for Various Data Modalities: A Survey
Figure 2 for AIGC for Various Data Modalities: A Survey
Figure 3 for AIGC for Various Data Modalities: A Survey
Figure 4 for AIGC for Various Data Modalities: A Survey
Viaarxiv icon

Cabrita: closing the gap for foreign languages

Aug 23, 2023
Celio Larcher, Marcos Piau, Paulo Finardi, Pedro Gengo, Piero Esposito, Vinicius Caridá

Figure 1 for Cabrita: closing the gap for foreign languages
Figure 2 for Cabrita: closing the gap for foreign languages
Figure 3 for Cabrita: closing the gap for foreign languages
Figure 4 for Cabrita: closing the gap for foreign languages
Viaarxiv icon

Approximating Human-Like Few-shot Learning with GPT-based Compression

Aug 14, 2023
Cynthia Huang, Yuqing Xie, Zhiying Jiang, Jimmy Lin, Ming Li

Figure 1 for Approximating Human-Like Few-shot Learning with GPT-based Compression
Figure 2 for Approximating Human-Like Few-shot Learning with GPT-based Compression
Figure 3 for Approximating Human-Like Few-shot Learning with GPT-based Compression
Figure 4 for Approximating Human-Like Few-shot Learning with GPT-based Compression
Viaarxiv icon

Priority-Centric Human Motion Generation in Discrete Latent Space

Aug 28, 2023
Hanyang Kong, Kehong Gong, Dongze Lian, Michael Bi Mi, Xinchao Wang

Figure 1 for Priority-Centric Human Motion Generation in Discrete Latent Space
Figure 2 for Priority-Centric Human Motion Generation in Discrete Latent Space
Figure 3 for Priority-Centric Human Motion Generation in Discrete Latent Space
Figure 4 for Priority-Centric Human Motion Generation in Discrete Latent Space
Viaarxiv icon

How to Detect Unauthorized Data Usages in Text-to-image Diffusion Models

Jul 06, 2023
Zhenting Wang, Chen Chen, Yuchen Liu, Lingjuan Lyu, Dimitris Metaxas, Shiqing Ma

Figure 1 for How to Detect Unauthorized Data Usages in Text-to-image Diffusion Models
Figure 2 for How to Detect Unauthorized Data Usages in Text-to-image Diffusion Models
Figure 3 for How to Detect Unauthorized Data Usages in Text-to-image Diffusion Models
Figure 4 for How to Detect Unauthorized Data Usages in Text-to-image Diffusion Models
Viaarxiv icon

Decompose and Realign: Tackling Condition Misalignment in Text-to-Image Diffusion Models

Jun 26, 2023
Luozhou Wang, Guibao Shen, Yijun Li, Ying-cong Chen

Figure 1 for Decompose and Realign: Tackling Condition Misalignment in Text-to-Image Diffusion Models
Figure 2 for Decompose and Realign: Tackling Condition Misalignment in Text-to-Image Diffusion Models
Figure 3 for Decompose and Realign: Tackling Condition Misalignment in Text-to-Image Diffusion Models
Figure 4 for Decompose and Realign: Tackling Condition Misalignment in Text-to-Image Diffusion Models
Viaarxiv icon