Search Results for author: Loc Truong

Found 4 papers, 1 papers with code

Fiber Bundle Morphisms as a Framework for Modeling Many-to-Many Maps

no code implementations15 Mar 2022 Elizabeth Coda, Nico Courts, Colby Wight, Loc Truong, Woongjo Choi, Charles Godfrey, Tegan Emerson, Keerti Kappagantula, Henry Kvinge

That is, a single input can potentially yield many different outputs (whether due to noise, imperfect measurement, or intrinsic stochasticity in the process) and many different inputs can yield the same output (that is, the map is not injective).

Benchmarking Sentiment Analysis

Differential Property Prediction: A Machine Learning Approach to Experimental Design in Advanced Manufacturing

no code implementations3 Dec 2021 Loc Truong, Woongjo Choi, Colby Wight, Lizzy Coda, Tegan Emerson, Keerti Kappagantula, Henry Kvinge

We show that by focusing on the experimenter's need to choose between multiple candidate experimental parameters, we can reframe the challenging regression task of predicting material properties from processing parameters, into a classification task on which machine learning models can achieve good performance.

BIG-bench Machine Learning Experimental Design +1

CooGAN: A Memory-Efficient Framework for High-Resolution Facial Attribute Editing

1 code implementation ECCV 2020 Xuanhong Chen, Bingbing Ni, Naiyuan Liu, Ziang Liu, Yiliu Jiang, Loc Truong, Qi Tian

In contrast to great success of memory-consuming face editing methods at a low resolution, to manipulate high-resolution (HR) facial images, i. e., typically larger than 7682 pixels, with very limited memory is still challenging.

Attribute Image Generation +2

Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers

no code implementations24 Apr 2020 Loc Truong, Chace Jones, Brian Hutchinson, Andrew August, Brenda Praggastis, Robert Jasper, Nicole Nichols, Aaron Tuor

First, the success rate of backdoor poisoning attacks varies widely, depending on several factors, including model architecture, trigger pattern and regularization technique.

Data Poisoning

Cannot find the paper you are looking for? You can Submit a new open access paper.