首页
技术日记
编程
旅游
数码
登录
标签
论文
【论文阅读】An LSTM-Based Deep Learning Approach for Classifying Malicious Traffic at the Packet Level
原文标题:An LSTM-Based Deep Learning Approach for Classifying Malicious Traffic at the Packet Level原文作者ÿ
论文
deep
learning
Based
Approach
admin
4月前
45
0
【读论文】A Unified Approach to Interpreting Model Predictions
目录1. 这篇文章主要做了什么?2. Additive Feature Attribution Methods 加性特征归因方法2.1 LIME2.2 DeepLIFT2.3 Layer-Wise Relevance
论文
Unified
Approach
Predictions
Model
admin
4月前
60
0
[论文阅读笔记09]A Frustratingly Easy Approach for Joint Entity and Relation Extraction
一,题目 A Frustratingly Easy Approach for Joint Entity and Relation Extraction 一种简单易行的联合实体和关系提取方法 二࿰
笔记
论文
Frustratingly
easy
Extraction
admin
4月前
34
0
【论文阅读】(2019)SimGNN:A Neural Network Approach to Fast Graph Similarity Computation
文章目录一、摘要二、要完成的任务分析三、图模型提取全局与局部特征四、NTN模块的作用与效果五、点之间的对应关系计算论文来源:(2019)SimGNN:A Neural Net
论文
SimGNN
Neural
Network
Computation
admin
4月前
43
0
论文阅读 | Rethinking Coarse-to-Fine Approach in Single Image Deblurring
前言:ICCV2021图像单帧运动去糊论文 论文地址:【here】 代码地址:【here】 Rethinking Coarse-to-Fine Approach in Single Image Deblurring 引言 图像去糊来自
论文
Coarse
Rethinking
Fine
Deblurring
admin
4月前
43
0
【论文笔记】深度学习 Lips Don’t Lie: A Generalisable and Robust Approach to Face Forgery Detection
* Lips Don’t Lie: A Generalisable and Robust Approach to Face Forgery Detection嘴唇不撒谎:一种泛化的和鲁棒的人脸伪造检测方法1.概述语义信
深度
笔记
论文
Lie
Lips
admin
4月前
38
0
论文阅读——RoBERTa A Robustly Optimized BERT Pretraining Approach
RoBERTa A Robustly Optimized BERT Pretraining Approach Abstract Devlin等人在 BERT Pre-training of Deep Bidirectional Tran
论文
Robustly
Roberta
optimized
Pretraining
admin
4月前
44
0
《MixMatch: A Holistic Approach to Semi-Supervised Learning》论文阅读报告
1. 算法核心思想 1.1 基本思想 现有的半监督学习方法主要有三种:自洽正则化(Consistency Regularization),最小化熵(Entropy Minimization)和传统正则化(Traditional Regu
报告
论文
Approach
Holistic
MixMatch
admin
4月前
77
0
论文复现:Style Injection in Diffusion: A Training-free Approach for Adapting Large-scale Diffusion Model
最近需要做一个风格迁移的工作,看到了这篇文章,感觉效果还不错,所以尝试进行复现,记录遇到的问题和解决方法。 代码链接:https
论文
Diffusion
Training
Injection
Free
admin
4月前
45
0
加密流量分类-论文2:Deep Packet: A Novel Approach For Encrypted Traffic Classification Using Deep Learning
加密流量分类-论文2:Deep Packet: A Novel Approach For Encrypted Traffic Classification Using Deep Learning 0、摘要 1、介绍 2、相关工作 3、深度学
流量
论文
Packet
deep
Approach
admin
4月前
46
0
图像融合论文阅读:DenseFuse: A Fusion Approach to Infrared and Visible Images
一、创新点:1. 提出了一种用于红外和可见图像融合问题的新型深度学习架构。与传统的卷积网络相比,我们的编码网络由卷积层、融合层和密集块组合而成2. 一些基于CNN的图像融合方法࿰
图像
论文
DenseFuse
fusion
images
admin
4月前
47
0
深度学习论文: KeepAugment: A Simple Information-Preserving Data Augmentation Approach及其PyTorch实现
深度学习论文: KeepAugment: A Simple Information-Preserving Data Augmentation Approach及其PyTorch实现 KeepAugment: A Simple Informa
深度
论文
simple
KeepAugment
information
admin
4月前
35
0
大模型剪枝(一)解读Wanda论文: A Simple and Effective Pruning Approach for Large Language Models
来自2023年的新论文,提出了Wanda这一无需再训练和权重更新的低成本剪枝方法。 论文链接:https:arxivpdf2306.11695v2 代码链接:GitHub - locuslabwanda: A simple a
模型
论文
simple
Effective
Wanda
admin
4月前
39
0
【论文阅读】CLIP the Gap: A Single Domain Generalization Approach for Object Detection (CVPR‘23)
paper:CLIP the Gap: A Single Domain Generalization Approach for Object Detection code:https:githubvidit09domaingen
论文
Single
Domain
gap
generalization
admin
4月前
46
0
DWA局部路径规划算法论文阅读 The dynamic window approach to collision avoidance
Fox D., Burgard W., Thrun S.. (1997). The dynamic window approach to collision avoidance. IEEE Robotics & Automation
算法
局部
路径
论文
dwa
admin
4月前
52
0
【论文笔记】A Transformer-based Approach for Source Code Summarization
A Transformer-based Approach for Source Code Summarization1. Introduction2. Approach2.1 ArchitectureSelf-AttentionCopy A
笔记
论文
Transformer
Based
Summarization
admin
4月前
45
0
图像融合论文阅读:(DeFusion)Fusion from decomposition: A self-supervised decomposition approach for image fus
inproceedings{liang2022fusion, title{Fusion from decomposition: A self-supervised decomposition approach for image fusio
图像
论文
fusion
DeFusion
decomposition
admin
4月前
54
0
【论文阅读】Magneto: A Step-Wise Approach to Exploit Vulnerabilities in Dependent Libraries via LLM-Empowe
Magneto: A Step-Wise Approach to Exploit Vulnerabilities in Dependent Libraries via LLM-Empowered Directed Fuzzing 来源出处
论文
wise
Approach
step
Exploit
admin
4月前
55
0
Learning to Rank: From Pairwise Approach to Listwise Approach论文笔记
【ICML2007】Learning to Rank: From Pairwise Approach to Listwise Approach 原文链接 目录 Abstract intro probability models Permu
笔记
论文
rank
learning
Pairwise
admin
4月前
59
0
信息系统项目管理--论文分析笔记
信息系统项目管理–论文分析(1)整体管理制定项目章程1.项目发起人发布了这个文件,项目启动了,我被授权了2.项目章程的内容(6个项目&#x
信息系统
项目管理
笔记
论文
admin
4月前
55
0
«
1 ...
3
4
5
6
7
8
9
...26
»