Alert button

"Time": models, code, and papers
Alert button

A Master Key Backdoor for Universal Impersonation Attack against DNN-based Face Verification

Add code
Bookmark button
Alert button
May 01, 2021
Wei Guo, Benedetta Tondi, Mauro Barni

Figure 1 for A Master Key Backdoor for Universal Impersonation Attack against DNN-based Face Verification
Figure 2 for A Master Key Backdoor for Universal Impersonation Attack against DNN-based Face Verification
Figure 3 for A Master Key Backdoor for Universal Impersonation Attack against DNN-based Face Verification
Figure 4 for A Master Key Backdoor for Universal Impersonation Attack against DNN-based Face Verification
Viaarxiv icon

Bootstrapping User and Item Representations for One-Class Collaborative Filtering

May 13, 2021
Dongha Lee, SeongKu Kang, Hyunjun Ju, Chanyoung Park, Hwanjo Yu

Figure 1 for Bootstrapping User and Item Representations for One-Class Collaborative Filtering
Figure 2 for Bootstrapping User and Item Representations for One-Class Collaborative Filtering
Figure 3 for Bootstrapping User and Item Representations for One-Class Collaborative Filtering
Figure 4 for Bootstrapping User and Item Representations for One-Class Collaborative Filtering
Viaarxiv icon

Wireless Federated Learning (WFL) for 6G Networks -- Part II: The Compute-then-Transmit NOMA Paradigm

Apr 24, 2021
Pavlos S. Bouzinis, Panagiotis D. Diamantoulakis, George K. Karagiannidis

Figure 1 for Wireless Federated Learning (WFL) for 6G Networks -- Part II: The Compute-then-Transmit NOMA Paradigm
Figure 2 for Wireless Federated Learning (WFL) for 6G Networks -- Part II: The Compute-then-Transmit NOMA Paradigm
Figure 3 for Wireless Federated Learning (WFL) for 6G Networks -- Part II: The Compute-then-Transmit NOMA Paradigm
Figure 4 for Wireless Federated Learning (WFL) for 6G Networks -- Part II: The Compute-then-Transmit NOMA Paradigm
Viaarxiv icon

Learning Spatio-Temporal Transformer for Visual Tracking

Add code
Bookmark button
Alert button
Mar 31, 2021
Bin Yan, Houwen Peng, Jianlong Fu, Dong Wang, Huchuan Lu

Viaarxiv icon

The workweek is the best time to start a family -- A Study of GPT-2 Based Claim Generation

Add code
Bookmark button
Alert button
Oct 13, 2020
Shai Gretz, Yonatan Bilu, Edo Cohen-Karlik, Noam Slonim

Figure 1 for The workweek is the best time to start a family -- A Study of GPT-2 Based Claim Generation
Figure 2 for The workweek is the best time to start a family -- A Study of GPT-2 Based Claim Generation
Figure 3 for The workweek is the best time to start a family -- A Study of GPT-2 Based Claim Generation
Figure 4 for The workweek is the best time to start a family -- A Study of GPT-2 Based Claim Generation
Viaarxiv icon

Neural Transformation Learning for Deep Anomaly Detection Beyond Images

Mar 31, 2021
Chen Qiu, Timo Pfrommer, Marius Kloft, Stephan Mandt, Maja Rudolph

Figure 1 for Neural Transformation Learning for Deep Anomaly Detection Beyond Images
Figure 2 for Neural Transformation Learning for Deep Anomaly Detection Beyond Images
Figure 3 for Neural Transformation Learning for Deep Anomaly Detection Beyond Images
Figure 4 for Neural Transformation Learning for Deep Anomaly Detection Beyond Images
Viaarxiv icon

Scalable Neural Tangent Kernel of Recurrent Architectures

Add code
Bookmark button
Alert button
Dec 09, 2020
Sina Alemohammad, Randall Balestriero, Zichao Wang, Richard Baraniuk

Figure 1 for Scalable Neural Tangent Kernel of Recurrent Architectures
Figure 2 for Scalable Neural Tangent Kernel of Recurrent Architectures
Figure 3 for Scalable Neural Tangent Kernel of Recurrent Architectures
Figure 4 for Scalable Neural Tangent Kernel of Recurrent Architectures
Viaarxiv icon

An Automated Method to Enrich Consumer Health Vocabularies Using GloVe Word Embeddings and An Auxiliary Lexical Resource

May 18, 2021
Mohammed Ibrahim, Susan Gauch, Omar Salman, Mohammed Alqahatani

Figure 1 for An Automated Method to Enrich Consumer Health Vocabularies Using GloVe Word Embeddings and An Auxiliary Lexical Resource
Figure 2 for An Automated Method to Enrich Consumer Health Vocabularies Using GloVe Word Embeddings and An Auxiliary Lexical Resource
Figure 3 for An Automated Method to Enrich Consumer Health Vocabularies Using GloVe Word Embeddings and An Auxiliary Lexical Resource
Figure 4 for An Automated Method to Enrich Consumer Health Vocabularies Using GloVe Word Embeddings and An Auxiliary Lexical Resource
Viaarxiv icon

Low-dimensional Denoising Embedding Transformer for ECG Classification

Mar 31, 2021
Jian Guan, Wenbo Wang, Pengming Feng, Xinxin Wang, Wenwu Wang

Figure 1 for Low-dimensional Denoising Embedding Transformer for ECG Classification
Figure 2 for Low-dimensional Denoising Embedding Transformer for ECG Classification
Figure 3 for Low-dimensional Denoising Embedding Transformer for ECG Classification
Figure 4 for Low-dimensional Denoising Embedding Transformer for ECG Classification
Viaarxiv icon

Colorectal Cancer Segmentation using Atrous Convolution and Residual Enhanced UNet

Mar 16, 2021
Nisarg A. Shah, Divij Gupta, Romil Lodaya, Ujjwal Baid, Sanjay Talbar

Figure 1 for Colorectal Cancer Segmentation using Atrous Convolution and Residual Enhanced UNet
Figure 2 for Colorectal Cancer Segmentation using Atrous Convolution and Residual Enhanced UNet
Figure 3 for Colorectal Cancer Segmentation using Atrous Convolution and Residual Enhanced UNet
Figure 4 for Colorectal Cancer Segmentation using Atrous Convolution and Residual Enhanced UNet
Viaarxiv icon