2018 International Conference on Fuzzy Theory and Its Applications (iFUZZY) 2018
DOI: 10.1109/ifuzzy.2018.8751687
|View full text |Cite
|
Sign up to set email alerts
|

Embedding for Out of Vocabulary Words Considering Contextual and Morphosyntactic Information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…Second, we use the extracted intermediate feature set as the observed data of the Gaussian process regression-based detector. The observed dataset for fitting the Gaussian process regression-based detector is as follows: (11) In the application process for the real model, the intermediate feature is extracted through a pre-learned model for a given input image, and the result of the Gaussian process regression is obtained when the extracted value is input. Fig.…”
Section: Gaussian Process Regression-based Detectormentioning
confidence: 99%
See 1 more Smart Citation
“…Second, we use the extracted intermediate feature set as the observed data of the Gaussian process regression-based detector. The observed dataset for fitting the Gaussian process regression-based detector is as follows: (11) In the application process for the real model, the intermediate feature is extracted through a pre-learned model for a given input image, and the result of the Gaussian process regression is obtained when the extracted value is input. Fig.…”
Section: Gaussian Process Regression-based Detectormentioning
confidence: 99%
“…In recent years, the development of machine learning, especially deep learning, and its applications have been actively studied [1]- [5]. The deep learning model has been applied to various fields, such as image classification [6]- [10], natural language processing [11]- [14], semantic analysis [15] [16], and object detection [17] [18] and shows high performance as a state-of-the-art technique. Although deep learning is applied in many areas, the adversarial attacks that have recently been proposed raise questions about the reliability of the deep learning model.…”
Section: Introductionmentioning
confidence: 99%