Ideally, looking for a list of such corruption strategies that include an ELI5 description, pictures, and sample implementation(s).
Thanks -wg
Ideally, looking for a list of such corruption strategies that include an ELI5 description, pictures, and sample implementation(s).
Thanks -wg
Hi,
Yes, the T5 paper explored different corruption strategies. See table 3 on page 21.