1 code implementation • 30 Nov 2023 • Liangcai Su, Fan Yan, Jieming Zhu, Xi Xiao, Haoyi Duan, Zhou Zhao, Zhenhua Dong, Ruiming Tang
Two-tower models are a prevalent matching framework for recommendation, which have been widely deployed in industrial applications.
2 code implementations • 22 Sep 2023 • Qidong Liu, Fan Yan, Xiangyu Zhao, Zhaocheng Du, Huifeng Guo, Ruiming Tang, Feng Tian
However, sequential recommendation often faces the problem of data sparsity, which widely exists in recommender systems.
2 code implementations • 12 Sep 2023 • Xiaopeng Li, Fan Yan, Xiangyu Zhao, Yichao Wang, Bo Chen, Huifeng Guo, Ruiming Tang
Secondly, due to the distribution differences among domains, the utilization of static parameters in existing methods limits their flexibility to adapt to diverse domains.
no code implementations • 5 Jun 2023 • Fan Yan, Xumeng Wang, Ketian Mao, Wei zhang, Wei Chen
A non-fungible token (NFT) is a data unit stored on the blockchain.
2 code implementations • CVPR 2022 • Fan Yan, Ming Nie, Xinyue Cai, Jianhua Han, Hang Xu, Zhen Yang, Chaoqiang Ye, Yanwei Fu, Michael Bi Mi, Li Zhang
We present ONCE-3DLanes, a real-world autonomous driving dataset with lane layout annotation in 3D space.
1 code implementation • 7 Jun 2021 • Jian-Wei Zhang, Wei Chen, K. Ina Ly, Xubin Zhang, Fan Yan, Justin Jordan, Gordon Harris, Scott Plotkin, Pengyi Hao, Wenli Cai
In this study, we propose deep interactive networks (DINs) to address the above limitations.
no code implementations • 16 Apr 2021 • Peilun Wu, Fan Yan, Hui Guo
Email threat is a serious issue for enterprise security, which consists of various malicious scenarios, such as phishing, fraud, blackmail and malvertisement.