Search Results

Applications of Deep Neural Networks with Keras

2 code implementations11 Sep 2020

Through a combination of advanced training techniques and neural network architectural components, it is now possible to create neural networks that can handle tabular data, images, text, and audio as both input and output.

Time Series Time Series Analysis

GIMP-ML: Python Plugins for using Computer Vision Models in GIMP

1 code implementation27 Apr 2020

Apart from these, several image manipulation techniques using these plugins have been compiled and demonstrated in the YouTube channel (https://youtube. com/user/kritiksoman) with the objective of demonstrating the use-cases for machine learning based image modification.

Clustering Colorization +10

Generative Moment Matching Networks

3 code implementations10 Feb 2015

We consider the problem of learning deep generative models from data.

Generative Adversarial Network Two-sample testing

Contrastive Code Representation Learning

1 code implementation EMNLP 2021

Recent work learns contextual representations of source code by reconstructing tokens from their context.

Clone Detection Contrastive Learning +4

Symbolic Execution for Deep Neural Networks

1 code implementation27 Jul 2018

Deep Neural Networks (DNN) are increasingly used in a variety of applications, many of them with substantial safety and security concerns.

Software Engineering Cryptography and Security

A Variational Inequality Perspective on Generative Adversarial Networks

1 code implementation ICLR 2019

Generative adversarial networks (GANs) form a generative modeling approach known for producing appealing samples, but they are notably difficult to train.

Misconceptions

Efficient and Accurate Estimation of Lipschitz Constants for Deep Neural Networks

1 code implementation NeurIPS 2019

The resulting SDP can be adapted to increase either the estimation accuracy (by capturing the interaction between activation functions of different layers) or scalability (by decomposition and parallel implementation).

Broken Neural Scaling Laws

1 code implementation26 Oct 2022

Moreover, this functional form accurately models and extrapolates scaling behavior that other functional forms are incapable of expressing such as the non-monotonic transitions present in the scaling behavior of phenomena such as double descent and the delayed, sharp inflection points present in the scaling behavior of tasks such as arithmetic.

Adversarial Robustness Continual Learning +8

Ptolemy: Architecture Support for Robust Deep Learning

1 code implementation23 Aug 2020

We propose Ptolemy, an algorithm-architecture co-designed system that detects adversarial attacks at inference time with low overhead and high accuracy. We exploit the synergies between DNN inference and imperative program execution: an input to a DNN uniquely activates a set of neurons that contribute significantly to the inference output, analogous to the sequence of basic blocks exercised by an input in a conventional program.

Hardware Architecture Signal Processing

Sparse Adversarial Attack via Perturbation Factorization

1 code implementation ECCV 2020

Based on this factorization, we formulate the sparse attack problem as a mixed integer programming (MIP) to jointly optimize the binary selection factors and continuous perturbation magnitudes of all pixels, with a cardinality constraint on selection factors to explicitly control the degree of sparsity.

Adversarial Attack