Picture for Mung Chiang

Mung Chiang

From Federated Learning to Fog Learning: Towards Large-Scale Distributed Machine Learning in Heterogeneous Wireless Networks

Add code
Jun 07, 2020
Figure 1 for From Federated Learning to Fog Learning: Towards Large-Scale Distributed Machine Learning in Heterogeneous Wireless Networks
Figure 2 for From Federated Learning to Fog Learning: Towards Large-Scale Distributed Machine Learning in Heterogeneous Wireless Networks
Figure 3 for From Federated Learning to Fog Learning: Towards Large-Scale Distributed Machine Learning in Heterogeneous Wireless Networks
Figure 4 for From Federated Learning to Fog Learning: Towards Large-Scale Distributed Machine Learning in Heterogeneous Wireless Networks
Viaarxiv icon

AppStreamer: Reducing Storage Requirements of Mobile Games through Predictive Streaming

Add code
Dec 16, 2019
Figure 1 for AppStreamer: Reducing Storage Requirements of Mobile Games through Predictive Streaming
Figure 2 for AppStreamer: Reducing Storage Requirements of Mobile Games through Predictive Streaming
Figure 3 for AppStreamer: Reducing Storage Requirements of Mobile Games through Predictive Streaming
Figure 4 for AppStreamer: Reducing Storage Requirements of Mobile Games through Predictive Streaming
Viaarxiv icon

Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples

Add code
May 05, 2019
Figure 1 for Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples
Figure 2 for Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples
Figure 3 for Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples
Figure 4 for Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples
Viaarxiv icon

An Estimation and Analysis Framework for the Rasch Model

Add code
Jun 09, 2018
Figure 1 for An Estimation and Analysis Framework for the Rasch Model
Figure 2 for An Estimation and Analysis Framework for the Rasch Model
Viaarxiv icon

DARTS: Deceiving Autonomous Cars with Toxic Signs

Add code
May 31, 2018
Figure 1 for DARTS: Deceiving Autonomous Cars with Toxic Signs
Figure 2 for DARTS: Deceiving Autonomous Cars with Toxic Signs
Figure 3 for DARTS: Deceiving Autonomous Cars with Toxic Signs
Figure 4 for DARTS: Deceiving Autonomous Cars with Toxic Signs
Viaarxiv icon

Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos

Add code
Mar 26, 2018
Figure 1 for Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos
Figure 2 for Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos
Figure 3 for Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos
Figure 4 for Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos
Viaarxiv icon

Linearized Binary Regression

Add code
Feb 01, 2018
Figure 1 for Linearized Binary Regression
Figure 2 for Linearized Binary Regression
Figure 3 for Linearized Binary Regression
Viaarxiv icon

Stock Market Prediction from WSJ: Text Mining via Sparse Matrix Factorization

Add code
Jun 27, 2014
Figure 1 for Stock Market Prediction from WSJ: Text Mining via Sparse Matrix Factorization
Figure 2 for Stock Market Prediction from WSJ: Text Mining via Sparse Matrix Factorization
Figure 3 for Stock Market Prediction from WSJ: Text Mining via Sparse Matrix Factorization
Figure 4 for Stock Market Prediction from WSJ: Text Mining via Sparse Matrix Factorization
Viaarxiv icon