• PICARO

  • Referenced in 16 articles [sw21867]
  • with the problem of constructing an efficient masking scheme for existing block ciphers. We take ... reverse approach: that is, given a proven masking scheme (Rivain and Prouff, CHES ... block cipher that fits well the masking constraints. The difficulty of implementing efficient masking...
  • XLNet

  • Referenced in 13 articles [sw31118]
  • However, relying on corrupting the input with masks, BERT neglects dependency between the masked positions...
  • MADE

  • Referenced in 12 articles [sw36209]
  • MADE: Masked Autoencoder for Distribution Estimation. There has been a lot of recent interest ... that yields powerful generative models. Our method masks the autoencoder’s parameters to respect autoregressive...
  • RoBERTa

  • Referenced in 16 articles [sw32571]
  • longer sequences; and dynamically changing the masking pattern applied to the training data...
  • DeconvNet

  • Referenced in 13 articles [sw36333]
  • pixel-wise class labels and predict segmentation masks. We apply the trained network to each...
  • RepeatMasker

  • Referenced in 7 articles [sw17266]
  • which all the annotated repeats have been masked (default: replaced by Ns). Currently over ... human genomic sequence is identified and masked by the program. Sequence comparisons in RepeatMasker...
  • Charlotte

  • Referenced in 10 articles [sw30253]
  • Load balancing and fault masking are transparently provided by the runtime system...
  • BSS Eval

  • Referenced in 9 articles [sw14919]
  • algorithm (beamforming, ICA, time-frequency masking, etc). For audio data, the resulting energy ratio criteria...
  • COVID-ABS

  • Referenced in 5 articles [sw41716]
  • partial isolation, (6) use of face masks, and (7) use of face masks together with ... economy, scenarios combining the use of face masks and partial isolation can be the more...
  • CAPTools

  • Referenced in 8 articles [sw17993]
  • automatic code partition, execution control mask generation and communication call insertion. In this, the first...
  • PSICOV

  • Referenced in 7 articles [sw17010]
  • covariation signal in the MSA is often masked by biases from many ancillary indirect-coupling...
  • Detectron

  • Referenced in 6 articles [sw30742]
  • object detection algorithms, including Mask R-CNN. It is written in Python and powered...
  • BSMAP

  • Referenced in 5 articles [sw23515]
  • issues. BSMAP combines genome hashing and bitwise masking to achieve fast and accurate bisulfite mapping...
  • Libra

  • Referenced in 5 articles [sw41699]
  • protocol to zero-knowledge using small masking polynomials. Not only does Libra have excellent asymptotics...
  • SpanBERT

  • Referenced in 3 articles [sw32570]
  • text. Our approach extends BERT by (1) masking contiguous random spans, rather than random tokens ... predict the entire content of the masked span, without relying on the individual token representations...
  • LVIS

  • Referenced in 3 articles [sw34918]
  • scenes and from bounding boxes to segmentation masks. In this work, we introduce LVIS (pronounced ... collect  2 million high-quality instance segmentation masks for over 1000 entry-level object categories...
  • SpecAugment

  • Referenced in 3 articles [sw37168]
  • augmentation policy consists of warping the features, masking blocks of frequency channels, and masking blocks...
  • Tornado

  • Referenced in 3 articles [sw40715]
  • Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model ... publication: Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations...
  • TasNet

  • Referenced in 2 articles [sw31221]
  • Conv-TasNet: Surpassing Ideal Time-Frequency Magnitude Masking for Speech Separation. Single-channel, speaker-independent ... applying a set of weighting functions (masks) to the encoder output. The modified encoder representations ... waveforms using a linear decoder. The masks are found using a temporal convolutional network ... TasNet system significantly outperforms previous time-frequency masking methods in separating two- and three-speaker...
  • ELECTRA

  • Referenced in 2 articles [sw37747]
  • Text Encoders as Discriminators Rather Than Generators. Masked language modeling (MLM) pre-training methods such ... input by replacing some tokens with [MASK] and then train a model to reconstruct ... task called replaced token detection. Instead of masking the input, our approach corrupts ... than just the small subset that was masked out. As a result, the contextual representations...