no code implementations • EMNLP (sdp) 2020 • Lei LI, Yang Xie, Wei Liu, Yinan Liu, Yafei Jiang, Siya Qi, Xingyuan Li
In the LongSumm shared task, we integrate both the extractive and abstractive summarization ways.
no code implementations • 8 Dec 2023 • Debo Cheng, Yang Xie, Ziqi Xu, Jiuyong Li, Lin Liu, Jixue Liu, Yinghao Zhang, Zaiwen Feng
To address this problem with co-occurring M-bias and confounding bias, we propose a novel Disentangled Latent Representation learning framework for learning latent representations from proxy variables for unbiased Causal effect Estimation (DLRCE) from observational data.
no code implementations • 31 May 2023 • Wenting Ye, Chen Li, Yang Xie, Wen Zhang, Hong-Yu Zhang, Bowen Wang, Debo Cheng, Zaiwen Feng
Identifying and discovering drug-target interactions(DTIs) are vital steps in drug discovery and development.
no code implementations • 6 Apr 2021 • Olawale Onabola, Zhuang Ma, Yang Xie, Benjamin Akera, Abdulrahman Ibraheem, Jia Xue, Dianbo Liu, Yoshua Bengio
In this work, we present hBERT, where we modify certain layers of the pretrained BERT model with the new Hopfield Layer.
no code implementations • 7 Jan 2021 • Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava
(3) Our experiments show that SAS and RSAS exhibit better SAT resilience than SFLL and have similar effectiveness.
Cryptography and Security Hardware Architecture Formal Languages and Automata Theory
no code implementations • 3 Oct 2017 • Yuntao Liu, Yang Xie, Ankur Srivastava
In many cases, it is more practical to use a neural network intellectual property (IP) that an IP vendor has already trained.
Cryptography and Security