Alert button

"Time": models, code, and papers
Alert button

ILASR: Privacy-Preserving Incremental Learning for AutomaticSpeech Recognition at Production Scale

Jul 19, 2022
Gopinath Chennupati, Milind Rao, Gurpreet Chadha, Aaron Eakin, Anirudh Raju, Gautam Tiwari, Anit Kumar Sahu, Ariya Rastrow, Jasha Droppo, Andy Oberlin, Buddha Nandanoor, Prahalad Venkataramanan, Zheng Wu, Pankaj Sitpure

Figure 1 for ILASR: Privacy-Preserving Incremental Learning for AutomaticSpeech Recognition at Production Scale
Figure 2 for ILASR: Privacy-Preserving Incremental Learning for AutomaticSpeech Recognition at Production Scale
Figure 3 for ILASR: Privacy-Preserving Incremental Learning for AutomaticSpeech Recognition at Production Scale
Figure 4 for ILASR: Privacy-Preserving Incremental Learning for AutomaticSpeech Recognition at Production Scale
Viaarxiv icon

Simultaneously Achieving Sublinear Regret and Constraint Violations for Online Convex Optimization with Time-varying Constraints

Nov 15, 2021
Qingsong Liu, Wenfei Wu, Longbo Huang, Zhixuan Fang

Figure 1 for Simultaneously Achieving Sublinear Regret and Constraint Violations for Online Convex Optimization with Time-varying Constraints
Figure 2 for Simultaneously Achieving Sublinear Regret and Constraint Violations for Online Convex Optimization with Time-varying Constraints
Figure 3 for Simultaneously Achieving Sublinear Regret and Constraint Violations for Online Convex Optimization with Time-varying Constraints
Figure 4 for Simultaneously Achieving Sublinear Regret and Constraint Violations for Online Convex Optimization with Time-varying Constraints
Viaarxiv icon

Transformer Quality in Linear Time

Feb 21, 2022
Weizhe Hua, Zihang Dai, Hanxiao Liu, Quoc V. Le

Figure 1 for Transformer Quality in Linear Time
Figure 2 for Transformer Quality in Linear Time
Figure 3 for Transformer Quality in Linear Time
Figure 4 for Transformer Quality in Linear Time
Viaarxiv icon

Phishing URL Detection: A Network-based Approach Robust to Evasion

Add code
Bookmark button
Alert button
Sep 03, 2022
Taeri Kim, Noseong Park, Jiwon Hong, Sang-Wook Kim

Figure 1 for Phishing URL Detection: A Network-based Approach Robust to Evasion
Figure 2 for Phishing URL Detection: A Network-based Approach Robust to Evasion
Figure 3 for Phishing URL Detection: A Network-based Approach Robust to Evasion
Figure 4 for Phishing URL Detection: A Network-based Approach Robust to Evasion
Viaarxiv icon

GAN Inversion for Consistent Video Interpolation and Manipulation

Add code
Bookmark button
Alert button
Aug 23, 2022
Weihao Xia, Yujiu Yang, Jing-Hao Xue

Figure 1 for GAN Inversion for Consistent Video Interpolation and Manipulation
Figure 2 for GAN Inversion for Consistent Video Interpolation and Manipulation
Figure 3 for GAN Inversion for Consistent Video Interpolation and Manipulation
Figure 4 for GAN Inversion for Consistent Video Interpolation and Manipulation
Viaarxiv icon

Learning Optimal Solutions via an LSTM-Optimization Framework

Jul 06, 2022
Dogacan Yilmaz, İ. Esra Büyüktahtakın

Figure 1 for Learning Optimal Solutions via an LSTM-Optimization Framework
Figure 2 for Learning Optimal Solutions via an LSTM-Optimization Framework
Figure 3 for Learning Optimal Solutions via an LSTM-Optimization Framework
Figure 4 for Learning Optimal Solutions via an LSTM-Optimization Framework
Viaarxiv icon

Joint optimal beamforming and power control in cell-free massive MIMO

Aug 11, 2022
Lorenzo Miretti, Renato Luis Garrido Cavalcante, Slawomir Stanczak

Figure 1 for Joint optimal beamforming and power control in cell-free massive MIMO
Figure 2 for Joint optimal beamforming and power control in cell-free massive MIMO
Viaarxiv icon

The Saddle-Point Accountant for Differential Privacy

Add code
Bookmark button
Alert button
Aug 20, 2022
Wael Alghamdi, Shahab Asoodeh, Flavio P. Calmon, Juan Felipe Gomez, Oliver Kosut, Lalitha Sankar, Fei Wei

Figure 1 for The Saddle-Point Accountant for Differential Privacy
Figure 2 for The Saddle-Point Accountant for Differential Privacy
Figure 3 for The Saddle-Point Accountant for Differential Privacy
Figure 4 for The Saddle-Point Accountant for Differential Privacy
Viaarxiv icon

Wacky Weights in Learned Sparse Representations and the Revenge of Score-at-a-Time Query Evaluation

Oct 28, 2021
Joel Mackenzie, Andrew Trotman, Jimmy Lin

Figure 1 for Wacky Weights in Learned Sparse Representations and the Revenge of Score-at-a-Time Query Evaluation
Figure 2 for Wacky Weights in Learned Sparse Representations and the Revenge of Score-at-a-Time Query Evaluation
Figure 3 for Wacky Weights in Learned Sparse Representations and the Revenge of Score-at-a-Time Query Evaluation
Figure 4 for Wacky Weights in Learned Sparse Representations and the Revenge of Score-at-a-Time Query Evaluation
Viaarxiv icon

Little Help Makes a Big Difference: Leveraging Active Learning to Improve Unsupervised Time Series Anomaly Detection

Add code
Bookmark button
Alert button
Jan 25, 2022
Hamza Bodor, Thai V. Hoang, Zonghua Zhang

Figure 1 for Little Help Makes a Big Difference: Leveraging Active Learning to Improve Unsupervised Time Series Anomaly Detection
Figure 2 for Little Help Makes a Big Difference: Leveraging Active Learning to Improve Unsupervised Time Series Anomaly Detection
Figure 3 for Little Help Makes a Big Difference: Leveraging Active Learning to Improve Unsupervised Time Series Anomaly Detection
Figure 4 for Little Help Makes a Big Difference: Leveraging Active Learning to Improve Unsupervised Time Series Anomaly Detection
Viaarxiv icon