Picture for Yimo Ren

Yimo Ren

A Novel Framework for Multimodal Named Entity Recognition with Multi-level Alignments

Add code
May 15, 2023
Viaarxiv icon

Improving the Modality Representation with Multi-View Contrastive Learning for Multimodal Sentiment Analysis

Add code
Oct 28, 2022
Figure 1 for Improving the Modality Representation with Multi-View Contrastive Learning for Multimodal Sentiment Analysis
Figure 2 for Improving the Modality Representation with Multi-View Contrastive Learning for Multimodal Sentiment Analysis
Figure 3 for Improving the Modality Representation with Multi-View Contrastive Learning for Multimodal Sentiment Analysis
Viaarxiv icon

CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises

Add code
Oct 19, 2022
Figure 1 for CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises
Figure 2 for CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises
Figure 3 for CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises
Figure 4 for CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises
Viaarxiv icon

Multi-features based Semantic Augmentation Networks for Named Entity Recognition in Threat Intelligence

Add code
Jul 01, 2022
Figure 1 for Multi-features based Semantic Augmentation Networks for Named Entity Recognition in Threat Intelligence
Figure 2 for Multi-features based Semantic Augmentation Networks for Named Entity Recognition in Threat Intelligence
Figure 3 for Multi-features based Semantic Augmentation Networks for Named Entity Recognition in Threat Intelligence
Figure 4 for Multi-features based Semantic Augmentation Networks for Named Entity Recognition in Threat Intelligence
Viaarxiv icon

Threat Detection for General Social Engineering Attack Using Machine Learning Techniques

Add code
Mar 17, 2022
Figure 1 for Threat Detection for General Social Engineering Attack Using Machine Learning Techniques
Figure 2 for Threat Detection for General Social Engineering Attack Using Machine Learning Techniques
Figure 3 for Threat Detection for General Social Engineering Attack Using Machine Learning Techniques
Figure 4 for Threat Detection for General Social Engineering Attack Using Machine Learning Techniques
Viaarxiv icon