Picture for Aaron Tuor

Aaron Tuor

Constrained Block Nonlinear Neural Dynamical Models

Add code
Jan 06, 2021
Figure 1 for Constrained Block Nonlinear Neural Dynamical Models
Figure 2 for Constrained Block Nonlinear Neural Dynamical Models
Figure 3 for Constrained Block Nonlinear Neural Dynamical Models
Figure 4 for Constrained Block Nonlinear Neural Dynamical Models
Viaarxiv icon

Physics-Informed Neural State Space Models via Learning and Evolution

Add code
Nov 26, 2020
Figure 1 for Physics-Informed Neural State Space Models via Learning and Evolution
Figure 2 for Physics-Informed Neural State Space Models via Learning and Evolution
Figure 3 for Physics-Informed Neural State Space Models via Learning and Evolution
Figure 4 for Physics-Informed Neural State Space Models via Learning and Evolution
Viaarxiv icon

Spectral Analysis and Stability of Deep Neural Dynamics

Add code
Nov 26, 2020
Figure 1 for Spectral Analysis and Stability of Deep Neural Dynamics
Figure 2 for Spectral Analysis and Stability of Deep Neural Dynamics
Figure 3 for Spectral Analysis and Stability of Deep Neural Dynamics
Figure 4 for Spectral Analysis and Stability of Deep Neural Dynamics
Viaarxiv icon

Fuzzy Simplicial Networks: A Topology-Inspired Model to Improve Task Generalization in Few-shot Learning

Add code
Sep 23, 2020
Figure 1 for Fuzzy Simplicial Networks: A Topology-Inspired Model to Improve Task Generalization in Few-shot Learning
Figure 2 for Fuzzy Simplicial Networks: A Topology-Inspired Model to Improve Task Generalization in Few-shot Learning
Figure 3 for Fuzzy Simplicial Networks: A Topology-Inspired Model to Improve Task Generalization in Few-shot Learning
Figure 4 for Fuzzy Simplicial Networks: A Topology-Inspired Model to Improve Task Generalization in Few-shot Learning
Viaarxiv icon

Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers

Add code
Apr 24, 2020
Figure 1 for Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers
Figure 2 for Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers
Figure 3 for Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers
Figure 4 for Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers
Viaarxiv icon

Constrained Physics-Informed Deep Learning for Stable System Identification and Control of Unknown Linear Systems

Add code
Apr 24, 2020
Figure 1 for Constrained Physics-Informed Deep Learning for Stable System Identification and Control of Unknown Linear Systems
Figure 2 for Constrained Physics-Informed Deep Learning for Stable System Identification and Control of Unknown Linear Systems
Figure 3 for Constrained Physics-Informed Deep Learning for Stable System Identification and Control of Unknown Linear Systems
Figure 4 for Constrained Physics-Informed Deep Learning for Stable System Identification and Control of Unknown Linear Systems
Viaarxiv icon

Constrained Neural Ordinary Differential Equations with Stability Guarantees

Add code
Apr 22, 2020
Figure 1 for Constrained Neural Ordinary Differential Equations with Stability Guarantees
Figure 2 for Constrained Neural Ordinary Differential Equations with Stability Guarantees
Figure 3 for Constrained Neural Ordinary Differential Equations with Stability Guarantees
Figure 4 for Constrained Neural Ordinary Differential Equations with Stability Guarantees
Viaarxiv icon

Multiple Document Representations from News Alerts for Automated Bio-surveillance Event Detection

Add code
Feb 17, 2019
Figure 1 for Multiple Document Representations from News Alerts for Automated Bio-surveillance Event Detection
Figure 2 for Multiple Document Representations from News Alerts for Automated Bio-surveillance Event Detection
Figure 3 for Multiple Document Representations from News Alerts for Automated Bio-surveillance Event Detection
Figure 4 for Multiple Document Representations from News Alerts for Automated Bio-surveillance Event Detection
Viaarxiv icon

Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection

Add code
Mar 13, 2018
Figure 1 for Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection
Figure 2 for Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection
Figure 3 for Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection
Figure 4 for Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection
Viaarxiv icon

Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams

Add code
Dec 15, 2017
Figure 1 for Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams
Figure 2 for Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams
Figure 3 for Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams
Figure 4 for Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams
Viaarxiv icon