Alert button
Picture for Nathan Drenkow

Nathan Drenkow

Alert button

From Generalization to Precision: Exploring SAM for Tool Segmentation in Surgical Environments

Add code
Bookmark button
Alert button
Feb 28, 2024
Kanyifeechukwu J. Oguine, Roger D. Soberanis-Mukul, Nathan Drenkow, Mathias Unberath

Viaarxiv icon

RobustCLEVR: A Benchmark and Framework for Evaluating Robustness in Object-centric Learning

Add code
Bookmark button
Alert button
Aug 28, 2023
Nathan Drenkow, Mathias Unberath

Viaarxiv icon

Exploiting Large Neuroimaging Datasets to Create Connectome-Constrained Approaches for more Robust, Efficient, and Adaptable Artificial Intelligence

Add code
Bookmark button
Alert button
May 26, 2023
Erik C. Johnson, Brian S. Robinson, Gautam K. Vallabha, Justin Joyce, Jordan K. Matelsky, Raphael Norman-Tenazas, Isaac Western, Marisel Villafañe-Delgado, Martha Cervantes, Michael S. Robinette, Arun V. Reddy, Lindsey Kitchell, Patricia K. Rivlin, Elizabeth P. Reilly, Nathan Drenkow, Matthew J. Roos, I-Jeng Wang, Brock A. Wester, William R. Gray-Roncal, Joan A. Hoffmann

Figure 1 for Exploiting Large Neuroimaging Datasets to Create Connectome-Constrained Approaches for more Robust, Efficient, and Adaptable Artificial Intelligence
Figure 2 for Exploiting Large Neuroimaging Datasets to Create Connectome-Constrained Approaches for more Robust, Efficient, and Adaptable Artificial Intelligence
Figure 3 for Exploiting Large Neuroimaging Datasets to Create Connectome-Constrained Approaches for more Robust, Efficient, and Adaptable Artificial Intelligence
Figure 4 for Exploiting Large Neuroimaging Datasets to Create Connectome-Constrained Approaches for more Robust, Efficient, and Adaptable Artificial Intelligence
Viaarxiv icon

Data AUDIT: Identifying Attribute Utility- and Detectability-Induced Bias in Task Models

Add code
Bookmark button
Alert button
Apr 06, 2023
Mitchell Pavlak, Nathan Drenkow, Nicholas Petrick, Mohammad Mehdi Farhangi, Mathias Unberath

Figure 1 for Data AUDIT: Identifying Attribute Utility- and Detectability-Induced Bias in Task Models
Figure 2 for Data AUDIT: Identifying Attribute Utility- and Detectability-Induced Bias in Task Models
Figure 3 for Data AUDIT: Identifying Attribute Utility- and Detectability-Induced Bias in Task Models
Figure 4 for Data AUDIT: Identifying Attribute Utility- and Detectability-Induced Bias in Task Models
Viaarxiv icon

Context-Adaptive Deep Neural Networks via Bridge-Mode Connectivity

Add code
Bookmark button
Alert button
Nov 28, 2022
Nathan Drenkow, Alvin Tan, Chace Ashcraft, Kiran Karra

Figure 1 for Context-Adaptive Deep Neural Networks via Bridge-Mode Connectivity
Figure 2 for Context-Adaptive Deep Neural Networks via Bridge-Mode Connectivity
Figure 3 for Context-Adaptive Deep Neural Networks via Bridge-Mode Connectivity
Figure 4 for Context-Adaptive Deep Neural Networks via Bridge-Mode Connectivity
Viaarxiv icon

Robustness in Deep Learning for Computer Vision: Mind the gap?

Add code
Bookmark button
Alert button
Dec 01, 2021
Nathan Drenkow, Numair Sani, Ilya Shpitser, Mathias Unberath

Figure 1 for Robustness in Deep Learning for Computer Vision: Mind the gap?
Figure 2 for Robustness in Deep Learning for Computer Vision: Mind the gap?
Figure 3 for Robustness in Deep Learning for Computer Vision: Mind the gap?
Figure 4 for Robustness in Deep Learning for Computer Vision: Mind the gap?
Viaarxiv icon

On the Sins of Image Synthesis Loss for Self-supervised Depth Estimation

Add code
Bookmark button
Alert button
Sep 13, 2021
Zhaoshuo Li, Nathan Drenkow, Hao Ding, Andy S. Ding, Alexander Lu, Francis X. Creighton, Russell H. Taylor, Mathias Unberath

Figure 1 for On the Sins of Image Synthesis Loss for Self-supervised Depth Estimation
Figure 2 for On the Sins of Image Synthesis Loss for Self-supervised Depth Estimation
Figure 3 for On the Sins of Image Synthesis Loss for Self-supervised Depth Estimation
Figure 4 for On the Sins of Image Synthesis Loss for Self-supervised Depth Estimation
Viaarxiv icon

Patch Attack Invariance: How Sensitive are Patch Attacks to 3D Pose?

Add code
Bookmark button
Alert button
Aug 16, 2021
Max Lennon, Nathan Drenkow, Philippe Burlina

Figure 1 for Patch Attack Invariance: How Sensitive are Patch Attacks to 3D Pose?
Figure 2 for Patch Attack Invariance: How Sensitive are Patch Attacks to 3D Pose?
Figure 3 for Patch Attack Invariance: How Sensitive are Patch Attacks to 3D Pose?
Figure 4 for Patch Attack Invariance: How Sensitive are Patch Attacks to 3D Pose?
Viaarxiv icon

Objectness-Guided Open Set Visual Search and Closed Set Detection

Add code
Bookmark button
Alert button
Dec 11, 2020
Nathan Drenkow, Philippe Burlina, Neil Fendley, Kachi Odoemene, Jared Markowitz

Figure 1 for Objectness-Guided Open Set Visual Search and Closed Set Detection
Figure 2 for Objectness-Guided Open Set Visual Search and Closed Set Detection
Figure 3 for Objectness-Guided Open Set Visual Search and Closed Set Detection
Figure 4 for Objectness-Guided Open Set Visual Search and Closed Set Detection
Viaarxiv icon

Random Projections for Adversarial Attack Detection

Add code
Bookmark button
Alert button
Dec 11, 2020
Nathan Drenkow, Neil Fendley, Philippe Burlina

Figure 1 for Random Projections for Adversarial Attack Detection
Figure 2 for Random Projections for Adversarial Attack Detection
Figure 3 for Random Projections for Adversarial Attack Detection
Figure 4 for Random Projections for Adversarial Attack Detection
Viaarxiv icon