Alert button
Picture for Chris Finlay

Chris Finlay

Alert button

Multi-Resolution Continuous Normalizing Flows

Add code
Bookmark button
Alert button
Jun 22, 2021
Vikram Voleti, Chris Finlay, Adam Oberman, Christopher Pal

Figure 1 for Multi-Resolution Continuous Normalizing Flows
Figure 2 for Multi-Resolution Continuous Normalizing Flows
Figure 3 for Multi-Resolution Continuous Normalizing Flows
Figure 4 for Multi-Resolution Continuous Normalizing Flows
Viaarxiv icon

Adversarial Boot Camp: label free certified robustness in one epoch

Add code
Bookmark button
Alert button
Oct 05, 2020
Ryan Campbell, Chris Finlay, Adam M Oberman

Figure 1 for Adversarial Boot Camp: label free certified robustness in one epoch
Figure 2 for Adversarial Boot Camp: label free certified robustness in one epoch
Figure 3 for Adversarial Boot Camp: label free certified robustness in one epoch
Figure 4 for Adversarial Boot Camp: label free certified robustness in one epoch
Viaarxiv icon

Deterministic Gaussian Averaged Neural Networks

Add code
Bookmark button
Alert button
Jun 10, 2020
Ryan Campbell, Chris Finlay, Adam M Oberman

Figure 1 for Deterministic Gaussian Averaged Neural Networks
Figure 2 for Deterministic Gaussian Averaged Neural Networks
Figure 3 for Deterministic Gaussian Averaged Neural Networks
Figure 4 for Deterministic Gaussian Averaged Neural Networks
Viaarxiv icon

Learning normalizing flows from Entropy-Kantorovich potentials

Add code
Bookmark button
Alert button
Jun 10, 2020
Chris Finlay, Augusto Gerolin, Adam M Oberman, Aram-Alexandre Pooladian

Figure 1 for Learning normalizing flows from Entropy-Kantorovich potentials
Figure 2 for Learning normalizing flows from Entropy-Kantorovich potentials
Figure 3 for Learning normalizing flows from Entropy-Kantorovich potentials
Viaarxiv icon

How to train your neural ODE

Add code
Bookmark button
Alert button
Feb 07, 2020
Chris Finlay, Jörn-Henrik Jacobsen, Levon Nurbekyan, Adam M Oberman

Figure 1 for How to train your neural ODE
Figure 2 for How to train your neural ODE
Figure 3 for How to train your neural ODE
Figure 4 for How to train your neural ODE
Viaarxiv icon

Farkas layers: don't shift the data, fix the geometry

Add code
Bookmark button
Alert button
Oct 04, 2019
Aram-Alexandre Pooladian, Chris Finlay, Adam M Oberman

Figure 1 for Farkas layers: don't shift the data, fix the geometry
Figure 2 for Farkas layers: don't shift the data, fix the geometry
Figure 3 for Farkas layers: don't shift the data, fix the geometry
Figure 4 for Farkas layers: don't shift the data, fix the geometry
Viaarxiv icon

A principled approach for generating adversarial images under non-smooth dissimilarity metrics

Add code
Bookmark button
Alert button
Aug 05, 2019
Aram-Alexandre Pooladian, Chris Finlay, Tim Hoheisel, Adam Oberman

Figure 1 for A principled approach for generating adversarial images under non-smooth dissimilarity metrics
Figure 2 for A principled approach for generating adversarial images under non-smooth dissimilarity metrics
Figure 3 for A principled approach for generating adversarial images under non-smooth dissimilarity metrics
Figure 4 for A principled approach for generating adversarial images under non-smooth dissimilarity metrics
Viaarxiv icon

Scaleable input gradient regularization for adversarial robustness

Add code
Bookmark button
Alert button
May 27, 2019
Chris Finlay, Adam M Oberman

Figure 1 for Scaleable input gradient regularization for adversarial robustness
Figure 2 for Scaleable input gradient regularization for adversarial robustness
Figure 3 for Scaleable input gradient regularization for adversarial robustness
Figure 4 for Scaleable input gradient regularization for adversarial robustness
Viaarxiv icon

The LogBarrier adversarial attack: making effective use of decision boundary information

Add code
Bookmark button
Alert button
Mar 25, 2019
Chris Finlay, Aram-Alexandre Pooladian, Adam M. Oberman

Figure 1 for The LogBarrier adversarial attack: making effective use of decision boundary information
Figure 2 for The LogBarrier adversarial attack: making effective use of decision boundary information
Figure 3 for The LogBarrier adversarial attack: making effective use of decision boundary information
Figure 4 for The LogBarrier adversarial attack: making effective use of decision boundary information
Viaarxiv icon