Picture for Angus Galloway

Angus Galloway

Bounding generalization error with input compression: An empirical study with infinite-width networks

Jul 19, 2022
Figure 1 for Bounding generalization error with input compression: An empirical study with infinite-width networks
Figure 2 for Bounding generalization error with input compression: An empirical study with infinite-width networks
Figure 3 for Bounding generalization error with input compression: An empirical study with infinite-width networks
Figure 4 for Bounding generalization error with input compression: An empirical study with infinite-width networks
Viaarxiv icon

Monitoring Shortcut Learning using Mutual Information

Jun 27, 2022
Figure 1 for Monitoring Shortcut Learning using Mutual Information
Figure 2 for Monitoring Shortcut Learning using Mutual Information
Figure 3 for Monitoring Shortcut Learning using Mutual Information
Figure 4 for Monitoring Shortcut Learning using Mutual Information
Viaarxiv icon

Batch Normalization is a Cause of Adversarial Vulnerability

Add code
May 29, 2019
Figure 1 for Batch Normalization is a Cause of Adversarial Vulnerability
Figure 2 for Batch Normalization is a Cause of Adversarial Vulnerability
Figure 3 for Batch Normalization is a Cause of Adversarial Vulnerability
Figure 4 for Batch Normalization is a Cause of Adversarial Vulnerability
Viaarxiv icon

Adversarial Examples as an Input-Fault Tolerance Problem

Add code
Nov 30, 2018
Figure 1 for Adversarial Examples as an Input-Fault Tolerance Problem
Figure 2 for Adversarial Examples as an Input-Fault Tolerance Problem
Figure 3 for Adversarial Examples as an Input-Fault Tolerance Problem
Figure 4 for Adversarial Examples as an Input-Fault Tolerance Problem
Viaarxiv icon

Adversarial Training Versus Weight Decay

Add code
Jul 23, 2018
Figure 1 for Adversarial Training Versus Weight Decay
Figure 2 for Adversarial Training Versus Weight Decay
Figure 3 for Adversarial Training Versus Weight Decay
Figure 4 for Adversarial Training Versus Weight Decay
Viaarxiv icon

Predicting Adversarial Examples with High Confidence

Add code
Feb 13, 2018
Figure 1 for Predicting Adversarial Examples with High Confidence
Figure 2 for Predicting Adversarial Examples with High Confidence
Figure 3 for Predicting Adversarial Examples with High Confidence
Figure 4 for Predicting Adversarial Examples with High Confidence
Viaarxiv icon

Attacking Binarized Neural Networks

Add code
Jan 31, 2018
Figure 1 for Attacking Binarized Neural Networks
Figure 2 for Attacking Binarized Neural Networks
Figure 3 for Attacking Binarized Neural Networks
Figure 4 for Attacking Binarized Neural Networks
Viaarxiv icon

The Ciona17 Dataset for Semantic Segmentation of Invasive Species in a Marine Aquaculture Environment

Add code
Feb 18, 2017
Figure 1 for The Ciona17 Dataset for Semantic Segmentation of Invasive Species in a Marine Aquaculture Environment
Figure 2 for The Ciona17 Dataset for Semantic Segmentation of Invasive Species in a Marine Aquaculture Environment
Figure 3 for The Ciona17 Dataset for Semantic Segmentation of Invasive Species in a Marine Aquaculture Environment
Figure 4 for The Ciona17 Dataset for Semantic Segmentation of Invasive Species in a Marine Aquaculture Environment
Viaarxiv icon