no code implementations • 21 Aug 2023 • Xi Li, Songhe Wang, Ruiquan Huang, Mahanth Gowda, George Kesidis
Although there are extensive studies on backdoor attacks against image data, the susceptibility of video-based systems under backdoor attacks remains largely unexplored.
2 code implementations • IJCNLP 2019 • Yixin Nie, Songhe Wang, Mohit Bansal
In this work, we give general guidelines on system design for MRS by proposing a simple yet effective pipeline system with special consideration on hierarchical semantic retrieval at both paragraph and sentence level, and their potential effects on the downstream task.
Ranked #44 on Question Answering on HotpotQA