Picture for Jessy Lin

Jessy Lin

Learning to Model the World with Language

Add code
Jul 31, 2023
Viaarxiv icon

Decision-Oriented Dialogue for Human-AI Collaboration

Add code
Jun 01, 2023
Viaarxiv icon

UniMASK: Unified Inference in Sequential Decision Problems

Add code
Nov 20, 2022
Viaarxiv icon

Automatic Correction of Human Translations

Add code
Jun 17, 2022
Figure 1 for Automatic Correction of Human Translations
Figure 2 for Automatic Correction of Human Translations
Figure 3 for Automatic Correction of Human Translations
Figure 4 for Automatic Correction of Human Translations
Viaarxiv icon

Towards Flexible Inference in Sequential Decision Problems via Bidirectional Transformers

Add code
Apr 28, 2022
Figure 1 for Towards Flexible Inference in Sequential Decision Problems via Bidirectional Transformers
Figure 2 for Towards Flexible Inference in Sequential Decision Problems via Bidirectional Transformers
Figure 3 for Towards Flexible Inference in Sequential Decision Problems via Bidirectional Transformers
Figure 4 for Towards Flexible Inference in Sequential Decision Problems via Bidirectional Transformers
Viaarxiv icon

InCoder: A Generative Model for Code Infilling and Synthesis

Add code
Apr 17, 2022
Figure 1 for InCoder: A Generative Model for Code Infilling and Synthesis
Figure 2 for InCoder: A Generative Model for Code Infilling and Synthesis
Figure 3 for InCoder: A Generative Model for Code Infilling and Synthesis
Figure 4 for InCoder: A Generative Model for Code Infilling and Synthesis
Viaarxiv icon

Inferring Rewards from Language in Context

Add code
Apr 05, 2022
Figure 1 for Inferring Rewards from Language in Context
Figure 2 for Inferring Rewards from Language in Context
Figure 3 for Inferring Rewards from Language in Context
Figure 4 for Inferring Rewards from Language in Context
Viaarxiv icon

Black-box Adversarial Attacks with Limited Queries and Information

Add code
Jul 11, 2018
Figure 1 for Black-box Adversarial Attacks with Limited Queries and Information
Figure 2 for Black-box Adversarial Attacks with Limited Queries and Information
Figure 3 for Black-box Adversarial Attacks with Limited Queries and Information
Figure 4 for Black-box Adversarial Attacks with Limited Queries and Information
Viaarxiv icon

Query-Efficient Black-box Adversarial Examples (superceded)

Add code
Apr 06, 2018
Figure 1 for Query-Efficient Black-box Adversarial Examples (superceded)
Figure 2 for Query-Efficient Black-box Adversarial Examples (superceded)
Figure 3 for Query-Efficient Black-box Adversarial Examples (superceded)
Figure 4 for Query-Efficient Black-box Adversarial Examples (superceded)
Viaarxiv icon