Understanding Identity Mappings in Deep Residual Networks

Follow Up Recommendations