PVDM
☆41May 9, 2018Updated 8 years ago
Alternatives and similar repositories for fasttext-PVDM
Users that are interested in fasttext-PVDM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PVDM, PVDBOW, doc2vec, sentence2vec, "Distributed Representations of Sentences and Documents ICML'14".☆21May 9, 2018Updated 8 years ago
- ☆12May 2, 2022Updated 4 years ago
- pairwise learning to rank with logistic regression☆19Apr 24, 2016Updated 10 years ago
- ☆16Nov 17, 2023Updated 2 years ago
- Click-Through Rate Estimation for Rare Events in Online Advertising☆14Oct 17, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Course Website for PRML Spring 2019 at Fudan University☆19Jun 11, 2019Updated 6 years ago
- ☆11Nov 13, 2023Updated 2 years ago
- Research Artifact For Our Submission To VLDB☆11Oct 27, 2021Updated 4 years ago
- ☆13Jul 21, 2023Updated 2 years ago
- ☆13May 19, 2017Updated 9 years ago
- ☆14Jan 24, 2024Updated 2 years ago
- GAKE: Graph Aware Knowledge Embedding(COLING2016)☆27Jan 19, 2019Updated 7 years ago
- [SDM'23] ML4C: Seeing Causality Through Latent Vicinity☆14Nov 9, 2022Updated 3 years ago
- A blog engine. Code for roselia.moe/blog☆10Apr 18, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables☆14Aug 27, 2024Updated last year
- Official repository of "SeGA: Preference-Aware Self-Contrastive Learning with Prompts for Anomalous User Detection on Twitter" @ AAAI 202…☆10Nov 30, 2024Updated last year
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆13Dec 17, 2023Updated 2 years ago
- Research Artifact of USENIX Security 2023 Paper: Precise and Generalized Robustness Certification for Neural Networks☆13Jun 20, 2023Updated 2 years ago
- CC: Causality-Aware Coverage Criterion for Deep Neural Networks☆12Feb 15, 2023Updated 3 years ago
- My first IEEE conference paper on Computer Vision.☆11Jul 15, 2016Updated 9 years ago
- ☆11Oct 13, 2020Updated 5 years ago
- ☆219Mar 15, 2025Updated last year
- A test suite (a.k.a., dataset) with ~20k moral situations for understanding LLMs' behaviors.☆16May 5, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Using Centroids of Word Embeddings and Word Mover's Distance for Biomedical Document Retrieval in Question Answering.☆15Jul 13, 2017Updated 8 years ago
- Code for "On the Complexity of Opinions and Online Discussions", WSDM 2019☆12Mar 25, 2019Updated 7 years ago
- 定时爬取arXiv每日论文☆13May 22, 2023Updated 2 years ago
- 将deepwalk、node2vector和阿里的文章:Billion-scale Commodity Embedding for E-commerce Recommendation in Alibaba 用代码实现☆55Oct 26, 2019Updated 6 years ago
- Reconstructing the content of image based on paper "Understanding Deep Image Representations by Inverting Them"☆11Jul 30, 2018Updated 7 years ago
- OBsan: An Out-Of-Bound Sanitizer to Harden DNN Executables☆17Feb 28, 2023Updated 3 years ago
- A tensorflow implementation of a series of deep learning methods to predict CTR, including FM, FNN, NFM, Attention-based NFM, Attention-b…☆11Jul 29, 2019Updated 6 years ago
- Extracting Cultural Commonsense Knowledge at Scale (WWW 2023)☆11Feb 15, 2024Updated 2 years ago
- ☆12Oct 30, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A simple version of DeepRank & MatchPyramid implemented in PyTorch.☆34Jul 2, 2020Updated 5 years ago
- Things that a CS student at UIUC should know☆12Apr 19, 2023Updated 3 years ago
- Security Weaknesses in Machine Learning☆15Aug 14, 2023Updated 2 years ago
- using FM latent vectors as embedding features☆14Sep 7, 2017Updated 8 years ago
- Name Disambiguation using Network Embedding☆17Dec 11, 2017Updated 8 years ago
- My master thesis — work on this has begun in February 2010, and continued until June 2011! Subject: "Web Performance Optimization: Analy…☆12Jul 25, 2011Updated 14 years ago
- ☆14Jul 14, 2019Updated 6 years ago