arXiv ID string | arXiv URL string | PDF URL string | DOI string | Publication Date timestamp[us] | Updated Date string | Title string | Authors string | Author Affiliations string | Abstract string | Categories string | Primary Category string | Comment string | Journal Reference string | label int64 | source string | classification_embedding list | proximity_embedding list |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2301.00395v1 | http://arxiv.org/abs/2301.00395v1 | http://arxiv.org/pdf/2301.00395v1 | null | 2023-01-01T00:00:00 | 2023-01-01 | CORGI-PM: A Chinese Corpus For Gender Bias Probing and Mitigation | Ge Zhang; Yizhi Li; Yaoyao Wu; Linyuan Zhang; Chenghua Lin; Jiayi Geng; Shi Wang; Jie Fu | null | As natural language processing (NLP) for gender bias becomes a significant interdisciplinary topic, the prevalent data-driven techniques such as large-scale language models suffer from data inadequacy and biased corpus, especially for languages with insufficient resources such as Chinese. To this end, we propose a Chin... | cs.CL; cs.AI; cs.CY; cs.LG | cs.CL | null | null | 0 | Random | [
-1.126556396484375,
0.24466031789779663,
-0.09409134089946747,
-1.1796098947525024,
0.5045156478881836,
-0.6005960702896118,
1.3871023654937744,
0.3268076777458191,
-1.1975990533828735,
-0.5355108976364136,
0.16207680106163025,
0.33175498247146606,
0.8115179538726807,
1.2071462869644165,
... | [
-0.057876765727996826,
0.7983450889587402,
-0.48018166422843933,
-0.4227030277252197,
-0.172611802816391,
-0.17255638539791107,
0.5069254636764526,
-0.38259604573249817,
-0.6956799626350403,
0.1501150131225586,
0.916933536529541,
-0.16540348529815674,
0.6074739098548889,
0.1127134859561920... |
2301.00436v3 | http://arxiv.org/abs/2301.00436v3 | http://arxiv.org/pdf/2301.00436v3 | null | 2023-01-01T00:00:00 | 2023-04-03 | Hierarchical Explanations for Video Action Recognition | Sadaf Gulshad; Teng Long; Nanne van Noord | null | To interpret deep neural networks, one main approach is to dissect the visual input and find the prototypical parts responsible for the classification. However, existing methods often ignore the hierarchical relationship between these prototypes, and thus can not explain semantic concepts at both higher level (e.g., wa... | cs.CV; cs.AI; cs.LG | cs.CV | null | null | 0 | Random | [
-0.3681137263774872,
-0.7237918376922607,
-0.1321452260017395,
-1.085010290145874,
0.6548585891723633,
0.542561411857605,
0.46236321330070496,
-0.00431407056748867,
-0.29542478919029236,
-0.8641098737716675,
0.2471758872270584,
1.7978839874267578,
1.0793426036834717,
-0.15864503383636475,
... | [
-0.24045611917972565,
0.5931233167648315,
-0.2974378764629364,
-0.2669661343097687,
0.27124276757240295,
0.5238010287284851,
0.18181759119033813,
-0.14119207859039307,
-0.22030600905418396,
-0.3778696060180664,
1.0046837329864502,
0.642080545425415,
0.2838360667228699,
-0.05031519383192062... |
2301.00433v1 | http://arxiv.org/abs/2301.00433v1 | http://arxiv.org/pdf/2301.00433v1 | null | 2023-01-01T00:00:00 | 2023-01-01 | Optimization of Image Transmission in a Cooperative Semantic Communication Networks | Wenjing Zhang; Yining Wang; Mingzhe Chen; Tao Luo; Dusit Niyato | null | In this paper, a semantic communication framework for image transmission is developed. In the investigated framework, a set of servers cooperatively transmit images to a set of users utilizing semantic communication techniques. To evaluate the performance of studied semantic communication system, a multimodal metric is... | cs.AI; cs.CV; cs.IT; math.IT | cs.AI | 29 pages, 10 figures | null | 0 | Random | [
-0.6450912952423096,
-0.6701726913452148,
-0.922021746635437,
-0.7833524942398071,
-0.39189162850379944,
1.3660849332809448,
0.5543034672737122,
-0.1179090291261673,
0.05601479485630989,
-0.25471875071525574,
-1.006367802619934,
1.2961021661758423,
0.15467551350593567,
-0.4706738591194153,... | [
0.3203534781932831,
0.2773016095161438,
-0.3726387321949005,
-0.0022126645781099796,
-0.2797456681728363,
0.5903337597846985,
-0.1591241955757141,
-0.2932327687740326,
-0.499271035194397,
0.3182874917984009,
0.31993699073791504,
0.54746413230896,
-0.04108468070626259,
-0.12774698436260223,... |
2301.00406v4 | http://arxiv.org/abs/2301.00406v4 | http://arxiv.org/pdf/2301.00406v4 | null | 2023-01-01T00:00:00 | 2024-03-06 | Curvature regularization for Non-line-of-sight Imaging from Under-sampled Data | Rui Ding; Juntian Ye; Qifeng Gao; Feihu Xu; Yuping Duan | null | Non-line-of-sight (NLOS) imaging aims to reconstruct the three-dimensional hidden scenes from the data measured in the line-of-sight, which uses photon time-of-flight information encoded in light after multiple diffuse reflections. The under-sampled scanning data can facilitate fast imaging. However, the resulting reco... | cs.CV; eess.IV | cs.CV | null | null | 0 | Random | [
0.2264835089445114,
-0.3034544885158539,
0.5695904493331909,
-0.3438293933868408,
-1.3148773908615112,
0.5791388750076294,
0.8122506141662598,
-0.5909553170204163,
0.0901155173778534,
-0.0470472015440464,
-0.01982753910124302,
0.543763279914856,
0.5510851740837097,
-0.48814427852630615,
... | [
1.0014580488204956,
0.5685479044914246,
0.10624171793460846,
0.23274175822734833,
0.06707561016082764,
0.3210146725177765,
-0.1572587490081787,
-0.559328019618988,
-0.456077516078949,
-0.7548860311508179,
0.6073456406593323,
0.140275776386261,
-0.34387800097465515,
-0.11965184658765793,
... |
2301.00383v2 | http://arxiv.org/abs/2301.00383v2 | http://arxiv.org/pdf/2301.00383v2 | 10.1109/TIP.2023.3235583 | 2023-01-01T00:00:00 | 2023-02-13 | Discriminative Radial Domain Adaptation | Zenan Huang; Jun Wen; Siheng Chen; Linchao Zhu; Nenggan Zheng | null | Domain adaptation methods reduce domain shift typically by learning domain-invariant features. Most existing methods are built on distribution matching, e.g., adversarial domain adaptation, which tends to corrupt feature discriminability. In this paper, we propose Discriminative Radial Domain Adaptation (DRDA) which br... | cs.LG; cs.CV | cs.LG | 13 pages, 14 figures | null | 0 | Random | [
-1.2205188274383545,
-0.9206641912460327,
-0.23449325561523438,
-0.5720550417900085,
-0.5458042621612549,
-0.09498164057731628,
0.6256922483444214,
-0.2076803296804428,
-0.5629614591598511,
-0.7733018398284912,
-0.033109985291957855,
1.693839192390442,
0.6696349382400513,
0.748411953449249... | [
-0.053489331156015396,
0.17427144944667816,
-0.5994115471839905,
0.037278156727552414,
-0.6367288827896118,
-0.4074082374572754,
0.7449285984039307,
-0.5846668481826782,
-0.12098873406648636,
-0.2830100953578949,
0.4161391854286194,
0.6126777529716492,
0.08596952259540558,
-0.0364826694130... |
2301.00345v1 | http://arxiv.org/abs/2301.00345v1 | http://arxiv.org/pdf/2301.00345v1 | null | 2023-01-01T00:00:00 | 2023-01-01 | MTNeuro: A Benchmark for Evaluating Representations of Brain Structure Across Multiple Levels of Abstraction | Jorge Quesada; Lakshmi Sathidevi; Ran Liu; Nauman Ahad; Joy M. Jackson; Mehdi Azabou; Jingyun Xiao; Christopher Liding; Matthew Jin; Carolina Urzay; William Gray-Roncal; Erik C. Johnson; Eva L. Dyer | null | There are multiple scales of abstraction from which we can describe the same image, depending on whether we are focusing on fine-grained details or a more global attribute of the image. In brain mapping, learning to automatically parse images to build representations of both small-scale features (e.g., the presence of ... | cs.CV; cs.LG | cs.CV | 10 pages, 4 figures, Accepted at NeurIPS 2022 | null | 1 | Accepted | [
0.06660590320825577,
0.3973568379878998,
0.8219935894012451,
-0.3296922743320465,
0.15434010326862335,
-0.09616462141275406,
1.2492843866348267,
-0.30200573801994324,
-0.548157811164856,
0.1111501008272171,
-0.6060495376586914,
0.3130576014518738,
0.3184674084186554,
-0.13289548456668854,
... | [
0.6027758121490479,
0.6406773328781128,
0.04011093080043793,
-0.15535911917686462,
-0.33522728085517883,
0.30084818601608276,
0.2561160922050476,
-0.3858625590801239,
-0.3861663341522217,
-0.1930323839187622,
0.384927362203598,
0.5501001477241516,
0.07443217188119888,
0.12703706324100494,
... |
2301.00429v1 | http://arxiv.org/abs/2301.00429v1 | http://arxiv.org/pdf/2301.00429v1 | null | 2023-01-01T00:00:00 | 2023-01-01 | "Integrating Semantic Information into Sketchy Reading Module of Retro-Reader for Vietnamese Machi(...TRUNCATED) | Hang Thi-Thu Le; Viet-Duc Ho; Duc-Vu Nguyen; Ngan Luu-Thuy Nguyen | null | "Machine Reading Comprehension has become one of the most advanced and popular research topics in th(...TRUNCATED) | cs.CL | cs.CL | In Proceedings of the 9th NAFOSTED Conference on Information and Computer Science (NICS 2022) | null | 0 | Random | [-0.741712212562561,0.616409957408905,0.7550923228263855,-1.3214318752288818,0.7090908885002136,-0.4(...TRUNCATED) | [0.11741513758897781,1.011696696281433,-0.17807281017303467,-0.4733656644821167,-0.2507184147834778,(...TRUNCATED) |
2301.01143v1 | http://arxiv.org/abs/2301.01143v1 | http://arxiv.org/pdf/2301.01143v1 | null | 2023-01-01T00:00:00 | 2023-01-01 | Asymmetric Co-teaching with Multi-view Consensus for Noisy Label Learning | Fengbei Liu; Yuanhong Chen; Chong Wang; Yu Tain; Gustavo Carneiro | null | "Learning with noisy-labels has become an important research topic in computer vision where state-of(...TRUNCATED) | cs.CV | cs.CV | null | null | 0 | Random | [-0.6067773103713989,-0.6639298796653748,-0.007478766143321991,-0.3101578652858734,-0.55225896835327(...TRUNCATED) | [0.17487922310829163,0.5665837526321411,-0.4335457384586334,-0.26730039715766907,-0.7572511434555054(...TRUNCATED) |
2301.00346v1 | http://arxiv.org/abs/2301.00346v1 | http://arxiv.org/pdf/2301.00346v1 | null | 2023-01-01T00:00:00 | 2023-01-01 | An Adaptive Kernel Approach to Federated Learning of Heterogeneous Causal Effects | Thanh Vinh Vo; Arnab Bhattacharyya; Young Lee; Tze-Yun Leong | null | "We propose a new causal inference framework to learn causal effects from multiple, decentralized da(...TRUNCATED) | cs.LG; cs.AI; stat.ME; stat.ML | cs.LG | NeurIPS 2022 | null | 1 | Accepted | [-1.5719794034957886,-0.6084272861480713,-1.0499109029769897,-0.8661954402923584,-1.476027488708496,(...TRUNCATED) | [0.30771827697753906,0.28745752573013306,-0.8301564455032349,0.1310075968503952,-0.7442911267280579,(...TRUNCATED) |
2301.00442v1 | http://arxiv.org/abs/2301.00442v1 | http://arxiv.org/pdf/2301.00442v1 | 10.1145/3407023.3407026 | 2023-01-01T00:00:00 | 2023-01-01 | An Overview of Limitations and Approaches in Identity Management | Daniela Pöhn; Wolfgang Hommel | null | "Identity and access management (I&AM) is the umbrella term for managing users and their permissions(...TRUNCATED) | cs.CR; cs.SE; cs.SY; eess.SY | cs.CR | "The 15th International Conference on Availability, Reliability and Security (ARES 2020), August 2(...TRUNCATED) | null | 0 | Random | [-1.5291080474853516,-0.13225285708904266,-0.7900806665420532,-1.0844886302947998,0.6214520335197449(...TRUNCATED) | [-0.15094700455665588,0.46172070503234863,-0.779064953327179,0.46088409423828125,0.04571940377354622(...TRUNCATED) |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 3