Picture for Duen Horng Chau

Duen Horng Chau

Dodrio: Exploring Transformer Models with Interactive Visualization

Add code
Apr 12, 2021
Figure 1 for Dodrio: Exploring Transformer Models with Interactive Visualization
Figure 2 for Dodrio: Exploring Transformer Models with Interactive Visualization
Figure 3 for Dodrio: Exploring Transformer Models with Interactive Visualization
Figure 4 for Dodrio: Exploring Transformer Models with Interactive Visualization
Viaarxiv icon

EnergyVis: Interactively Tracking and Exploring Energy Consumption for ML Models

Add code
Mar 30, 2021
Figure 1 for EnergyVis: Interactively Tracking and Exploring Energy Consumption for ML Models
Figure 2 for EnergyVis: Interactively Tracking and Exploring Energy Consumption for ML Models
Figure 3 for EnergyVis: Interactively Tracking and Exploring Energy Consumption for ML Models
Figure 4 for EnergyVis: Interactively Tracking and Exploring Energy Consumption for ML Models
Viaarxiv icon

Best of Both Worlds: Robust Accented Speech Recognition with Adversarial Transfer Learning

Add code
Mar 10, 2021
Figure 1 for Best of Both Worlds: Robust Accented Speech Recognition with Adversarial Transfer Learning
Figure 2 for Best of Both Worlds: Robust Accented Speech Recognition with Adversarial Transfer Learning
Figure 3 for Best of Both Worlds: Robust Accented Speech Recognition with Adversarial Transfer Learning
Figure 4 for Best of Both Worlds: Robust Accented Speech Recognition with Adversarial Transfer Learning
Viaarxiv icon

RECAST: Enabling User Recourse and Interpretability of Toxicity Detection Models with Interactive Visualization

Add code
Feb 10, 2021
Figure 1 for RECAST: Enabling User Recourse and Interpretability of Toxicity Detection Models with Interactive Visualization
Figure 2 for RECAST: Enabling User Recourse and Interpretability of Toxicity Detection Models with Interactive Visualization
Figure 3 for RECAST: Enabling User Recourse and Interpretability of Toxicity Detection Models with Interactive Visualization
Figure 4 for RECAST: Enabling User Recourse and Interpretability of Toxicity Detection Models with Interactive Visualization
Viaarxiv icon

MalNet: A Large-Scale Cybersecurity Image Database of Malicious Software

Add code
Jan 31, 2021
Figure 1 for MalNet: A Large-Scale Cybersecurity Image Database of Malicious Software
Figure 2 for MalNet: A Large-Scale Cybersecurity Image Database of Malicious Software
Figure 3 for MalNet: A Large-Scale Cybersecurity Image Database of Malicious Software
Figure 4 for MalNet: A Large-Scale Cybersecurity Image Database of Malicious Software
Viaarxiv icon

SkeletonVis: Interactive Visualization for Understanding Adversarial Attacks on Human Action Recognition Models

Add code
Jan 26, 2021
Figure 1 for SkeletonVis: Interactive Visualization for Understanding Adversarial Attacks on Human Action Recognition Models
Viaarxiv icon

A Large-Scale Database for Graph Representation Learning

Add code
Nov 16, 2020
Figure 1 for A Large-Scale Database for Graph Representation Learning
Figure 2 for A Large-Scale Database for Graph Representation Learning
Figure 3 for A Large-Scale Database for Graph Representation Learning
Figure 4 for A Large-Scale Database for Graph Representation Learning
Viaarxiv icon

Examining the Ordering of Rhetorical Strategies in Persuasive Requests

Add code
Oct 12, 2020
Figure 1 for Examining the Ordering of Rhetorical Strategies in Persuasive Requests
Figure 2 for Examining the Ordering of Rhetorical Strategies in Persuasive Requests
Figure 3 for Examining the Ordering of Rhetorical Strategies in Persuasive Requests
Figure 4 for Examining the Ordering of Rhetorical Strategies in Persuasive Requests
Viaarxiv icon

Should We Trust AI? Design Dimensions for Structured Experimental Evaluations

Add code
Sep 14, 2020
Figure 1 for Should We Trust AI? Design Dimensions for Structured Experimental Evaluations
Figure 2 for Should We Trust AI? Design Dimensions for Structured Experimental Evaluations
Figure 3 for Should We Trust AI? Design Dimensions for Structured Experimental Evaluations
Figure 4 for Should We Trust AI? Design Dimensions for Structured Experimental Evaluations
Viaarxiv icon

Bluff: Interactively Deciphering Adversarial Attacks on Deep Neural Networks

Add code
Sep 08, 2020
Figure 1 for Bluff: Interactively Deciphering Adversarial Attacks on Deep Neural Networks
Figure 2 for Bluff: Interactively Deciphering Adversarial Attacks on Deep Neural Networks
Figure 3 for Bluff: Interactively Deciphering Adversarial Attacks on Deep Neural Networks
Viaarxiv icon