Picture for Duen Horng Chau

Duen Horng Chau

Examining the Ordering of Rhetorical Strategies in Persuasive Requests

Add code
Oct 12, 2020
Figure 1 for Examining the Ordering of Rhetorical Strategies in Persuasive Requests
Figure 2 for Examining the Ordering of Rhetorical Strategies in Persuasive Requests
Figure 3 for Examining the Ordering of Rhetorical Strategies in Persuasive Requests
Figure 4 for Examining the Ordering of Rhetorical Strategies in Persuasive Requests
Viaarxiv icon

Should We Trust AI? Design Dimensions for Structured Experimental Evaluations

Add code
Sep 14, 2020
Figure 1 for Should We Trust AI? Design Dimensions for Structured Experimental Evaluations
Figure 2 for Should We Trust AI? Design Dimensions for Structured Experimental Evaluations
Figure 3 for Should We Trust AI? Design Dimensions for Structured Experimental Evaluations
Figure 4 for Should We Trust AI? Design Dimensions for Structured Experimental Evaluations
Viaarxiv icon

Bluff: Interactively Deciphering Adversarial Attacks on Deep Neural Networks

Add code
Sep 08, 2020
Figure 1 for Bluff: Interactively Deciphering Adversarial Attacks on Deep Neural Networks
Figure 2 for Bluff: Interactively Deciphering Adversarial Attacks on Deep Neural Networks
Figure 3 for Bluff: Interactively Deciphering Adversarial Attacks on Deep Neural Networks
Viaarxiv icon

Mapping Researchers with PeopleMap

Add code
Aug 31, 2020
Viaarxiv icon

PeopleMap: Visualization Tool for Mapping Out Researchers using Natural Language Processing

Add code
Jun 10, 2020
Figure 1 for PeopleMap: Visualization Tool for Mapping Out Researchers using Natural Language Processing
Figure 2 for PeopleMap: Visualization Tool for Mapping Out Researchers using Natural Language Processing
Viaarxiv icon

Evaluating Graph Vulnerability and Robustness using TIGER

Add code
Jun 10, 2020
Figure 1 for Evaluating Graph Vulnerability and Robustness using TIGER
Figure 2 for Evaluating Graph Vulnerability and Robustness using TIGER
Figure 3 for Evaluating Graph Vulnerability and Robustness using TIGER
Figure 4 for Evaluating Graph Vulnerability and Robustness using TIGER
Viaarxiv icon

CNN Explainer: Learning Convolutional Neural Networks with Interactive Visualization

Add code
May 01, 2020
Figure 1 for CNN Explainer: Learning Convolutional Neural Networks with Interactive Visualization
Figure 2 for CNN Explainer: Learning Convolutional Neural Networks with Interactive Visualization
Figure 3 for CNN Explainer: Learning Convolutional Neural Networks with Interactive Visualization
Figure 4 for CNN Explainer: Learning Convolutional Neural Networks with Interactive Visualization
Viaarxiv icon

UnMask: Adversarial Detection and Defense Through Robust Feature Alignment

Add code
Feb 21, 2020
Figure 1 for UnMask: Adversarial Detection and Defense Through Robust Feature Alignment
Figure 2 for UnMask: Adversarial Detection and Defense Through Robust Feature Alignment
Figure 3 for UnMask: Adversarial Detection and Defense Through Robust Feature Alignment
Figure 4 for UnMask: Adversarial Detection and Defense Through Robust Feature Alignment
Viaarxiv icon

CNN 101: Interactive Visual Learning for Convolutional Neural Networks

Add code
Feb 19, 2020
Figure 1 for CNN 101: Interactive Visual Learning for Convolutional Neural Networks
Figure 2 for CNN 101: Interactive Visual Learning for Convolutional Neural Networks
Viaarxiv icon

Massif: Interactive Interpretation of Adversarial Attacks on Deep Learning

Add code
Feb 16, 2020
Figure 1 for Massif: Interactive Interpretation of Adversarial Attacks on Deep Learning
Figure 2 for Massif: Interactive Interpretation of Adversarial Attacks on Deep Learning
Figure 3 for Massif: Interactive Interpretation of Adversarial Attacks on Deep Learning
Figure 4 for Massif: Interactive Interpretation of Adversarial Attacks on Deep Learning
Viaarxiv icon