Picture for Ayan Chakrabarti

Ayan Chakrabarti

Analyzing Similarity Metrics for Data Selection for Language Model Pretraining

Add code
Feb 04, 2025
Figure 1 for Analyzing Similarity Metrics for Data Selection for Language Model Pretraining
Figure 2 for Analyzing Similarity Metrics for Data Selection for Language Model Pretraining
Figure 3 for Analyzing Similarity Metrics for Data Selection for Language Model Pretraining
Figure 4 for Analyzing Similarity Metrics for Data Selection for Language Model Pretraining
Viaarxiv icon

LatentCRF: Continuous CRF for Efficient Latent Diffusion

Add code
Dec 24, 2024
Figure 1 for LatentCRF: Continuous CRF for Efficient Latent Diffusion
Figure 2 for LatentCRF: Continuous CRF for Efficient Latent Diffusion
Figure 3 for LatentCRF: Continuous CRF for Efficient Latent Diffusion
Figure 4 for LatentCRF: Continuous CRF for Efficient Latent Diffusion
Viaarxiv icon

A Little Help Goes a Long Way: Efficient LLM Training by Leveraging Small LMs

Add code
Oct 24, 2024
Figure 1 for A Little Help Goes a Long Way: Efficient LLM Training by Leveraging Small LMs
Figure 2 for A Little Help Goes a Long Way: Efficient LLM Training by Leveraging Small LMs
Figure 3 for A Little Help Goes a Long Way: Efficient LLM Training by Leveraging Small LMs
Figure 4 for A Little Help Goes a Long Way: Efficient LLM Training by Leveraging Small LMs
Viaarxiv icon

SpacTor-T5: Pre-training T5 Models with Span Corruption and Replaced Token Detection

Add code
Jan 24, 2024
Viaarxiv icon

SPEGTI: Structured Prediction for Efficient Generative Text-to-Image Models

Add code
Aug 14, 2023
Viaarxiv icon

Substance or Style: What Does Your Image Embedding Know?

Add code
Jul 10, 2023
Viaarxiv icon

Benchmarking Robustness to Adversarial Image Obfuscations

Add code
Jan 30, 2023
Figure 1 for Benchmarking Robustness to Adversarial Image Obfuscations
Figure 2 for Benchmarking Robustness to Adversarial Image Obfuscations
Figure 3 for Benchmarking Robustness to Adversarial Image Obfuscations
Figure 4 for Benchmarking Robustness to Adversarial Image Obfuscations
Viaarxiv icon

Adaptive Edge Offloading for Image Classification Under Rate Limit

Add code
Jul 31, 2022
Figure 1 for Adaptive Edge Offloading for Image Classification Under Rate Limit
Figure 2 for Adaptive Edge Offloading for Image Classification Under Rate Limit
Figure 3 for Adaptive Edge Offloading for Image Classification Under Rate Limit
Figure 4 for Adaptive Edge Offloading for Image Classification Under Rate Limit
Viaarxiv icon

PROVES: Establishing Image Provenance using Semantic Signatures

Add code
Oct 21, 2021
Figure 1 for PROVES: Establishing Image Provenance using Semantic Signatures
Figure 2 for PROVES: Establishing Image Provenance using Semantic Signatures
Figure 3 for PROVES: Establishing Image Provenance using Semantic Signatures
Figure 4 for PROVES: Establishing Image Provenance using Semantic Signatures
Viaarxiv icon

Leveraging redundancy in attention with Reuse Transformers

Add code
Oct 13, 2021
Figure 1 for Leveraging redundancy in attention with Reuse Transformers
Figure 2 for Leveraging redundancy in attention with Reuse Transformers
Figure 3 for Leveraging redundancy in attention with Reuse Transformers
Figure 4 for Leveraging redundancy in attention with Reuse Transformers
Viaarxiv icon