SkywardAI / paper_gallery

Papers gallery for using LLMs ability over dataset
MIT License
1 stars 0 forks source link
ai data data-science llm medicine neural-network research security

The papers gallery

This directory contains the papers that as reference for the project.

No Title Studio Lab Kaggle Colab Description Researcher
1 Text2SQL is Not Enough: Unifying AI and Databases with TAG Answering natural language questions over databases Bowen, Yuwei
2 LOTUS: Enabling Semantic Queries with LLMs Over Tables of Unstructured and Structured Data Answering natural language questions over databases Bowen, Yuwei

Medical

mimic-iv paper

No Title Studio Lab Kaggle Colab Description Researcher
1 MIMIC-Extract: A Data Extraction, Preprocessing, and Representation Pipeline for MIMIC-III Bowen, Yuwei
2 Democratizing EHR analyses with FIDDLE: a flexible data- driven preprocessing pipeline for structured clinical data Bowen, Yuwei
3 An Extensive Data Processing Pipeline for MIMIC-IV Basic structure of data extract pipeline Bowen, Yuwei
4 Event Stream GPT: A Data Pre-processing and Modeling Library for Generative, Pre-trained Transformers over Continuous-time Sequences of Complex Events Bowen, Yuwei
5 INTERPOLATION-PREDICTION NETWORKS FOR IRREGULARLY SAMPLED TIME SERIES Bowen, Yuwei
6 MULTI-TIME ATTENTION NETWORKS FOR IRREGULARLY SAMPLED TIME SERIES Bowen, Yuwei
7 Heteroscedastic Temporal Variational Autoencoder For Irregularly Sampled Time Series Bowen, Yuwei
8 Multitask learning and benchmarking with clinical time series data Bowen, Yuwei
9 Using Clinical Notes with Time Series Data for ICU Management Bowen, Yuwei
10 Predicting in-hospital mortality by combining clinical notes with time-series data Bowen, Yuwei

mimic-iv datasets

No Title List on Kaggle Huggingface Description Researcher
1 Raw MIMIC-IV v1.0 Kaggle Private Yuwei
2 Raw MIMIC-IV v2.0 Kaggle Public Yuwei
3 Raw MIMIC-IV v2.0 Huggingface Public Yuwei

Security

Machine unlearning

No Title Studio Lab Kaggle Colab Description Researcher
1 Machine Unlearning A mechanism that user can remove harmful data from llm in real time Arjuna
2 Does Refusal Training in LLMs Generalize to the Past Tense? LLM attack Tyson

References