Generating synthetic variants of a document is often posed as text-to-te...
Domain adaptation is an important and widely studied problem in natural
...
Security vulnerability repair is a difficult task that is in dire need o...
The most recent large language models such as ChatGPT and GPT-4 have gar...
Counterfactual explanations utilize feature perturbations to analyze the...
This paper tackles the challenging problem of automating code updates to...
With the recent advance in large pre-trained language models, researcher...
This paper presents our submission for the SMM4H 2022-Shared Task on the...
Online learning of Hawkes processes has received increasing attention in...
Graph neural networks have gained prominence due to their excellent
perf...
Retrieving relevant documents from a corpus is typically based on the
se...
Analyzing the layout of a document to identify headers, sections, tables...
Matching companies and investors is usually considered a highly speciali...
Organizations around the world face an array of risks impacting their
op...
The sheer volume of financial statements makes it difficult for humans t...
Many methods for debiasing classifiers have been proposed, but their
eff...
Many business applications involve adversarial relationships in which bo...
Task specific fine-tuning of a pre-trained neural language model using a...
A word embedding is a low-dimensional, dense and real- valued vector
rep...