Alert button
Picture for Po-Ling Loh

Po-Ling Loh

Alert button

Extracting robust and accurate features via a robust information bottleneck

Add code
Bookmark button
Alert button
Oct 15, 2019
Ankit Pensia, Varun Jog, Po-Ling Loh

Figure 1 for Extracting robust and accurate features via a robust information bottleneck
Figure 2 for Extracting robust and accurate features via a robust information bottleneck
Figure 3 for Extracting robust and accurate features via a robust information bottleneck
Figure 4 for Extracting robust and accurate features via a robust information bottleneck
Viaarxiv icon

Robustifying deep networks for image segmentation

Add code
Bookmark button
Alert button
Aug 01, 2019
Zheng Liu, Jinnian Zhang, Varun Jog, Po-Ling Loh, Alan B McMillan

Viaarxiv icon

Estimating location parameters in entangled single-sample distributions

Add code
Bookmark button
Alert button
Jul 06, 2019
Ankit Pensia, Varun Jog, Po-Ling Loh

Figure 1 for Estimating location parameters in entangled single-sample distributions
Figure 2 for Estimating location parameters in entangled single-sample distributions
Figure 3 for Estimating location parameters in entangled single-sample distributions
Figure 4 for Estimating location parameters in entangled single-sample distributions
Viaarxiv icon

Does Data Augmentation Lead to Positive Margin?

Add code
Bookmark button
Alert button
May 08, 2019
Shashank Rajput, Zhili Feng, Zachary Charles, Po-Ling Loh, Dimitris Papailiopoulos

Figure 1 for Does Data Augmentation Lead to Positive Margin?
Figure 2 for Does Data Augmentation Lead to Positive Margin?
Figure 3 for Does Data Augmentation Lead to Positive Margin?
Figure 4 for Does Data Augmentation Lead to Positive Margin?
Viaarxiv icon

Scale calibration for high-dimensional robust regression

Add code
Bookmark button
Alert button
Nov 06, 2018
Po-Ling Loh

Figure 1 for Scale calibration for high-dimensional robust regression
Figure 2 for Scale calibration for high-dimensional robust regression
Figure 3 for Scale calibration for high-dimensional robust regression
Viaarxiv icon

Adversarial Risk Bounds for Binary Classification via Function Transformation

Add code
Bookmark button
Alert button
Oct 22, 2018
Justin Khim, Po-Ling Loh

Figure 1 for Adversarial Risk Bounds for Binary Classification via Function Transformation
Figure 2 for Adversarial Risk Bounds for Binary Classification via Function Transformation
Figure 3 for Adversarial Risk Bounds for Binary Classification via Function Transformation
Viaarxiv icon

Online learning with graph-structured feedback against adaptive adversaries

Add code
Bookmark button
Alert button
Apr 01, 2018
Zhili Feng, Po-Ling Loh

Figure 1 for Online learning with graph-structured feedback against adaptive adversaries
Figure 2 for Online learning with graph-structured feedback against adaptive adversaries
Figure 3 for Online learning with graph-structured feedback against adaptive adversaries
Figure 4 for Online learning with graph-structured feedback against adaptive adversaries
Viaarxiv icon

Graph-Based Ascent Algorithms for Function Maximization

Add code
Bookmark button
Alert button
Feb 13, 2018
Muni Sreenivas Pydi, Varun Jog, Po-Ling Loh

Figure 1 for Graph-Based Ascent Algorithms for Function Maximization
Figure 2 for Graph-Based Ascent Algorithms for Function Maximization
Figure 3 for Graph-Based Ascent Algorithms for Function Maximization
Figure 4 for Graph-Based Ascent Algorithms for Function Maximization
Viaarxiv icon

Generalization Error Bounds for Noisy, Iterative Algorithms

Add code
Bookmark button
Alert button
Jan 12, 2018
Ankit Pensia, Varun Jog, Po-Ling Loh

Figure 1 for Generalization Error Bounds for Noisy, Iterative Algorithms
Viaarxiv icon

Computationally Efficient Influence Maximization in Stochastic and Adversarial Models: Algorithms and Analysis

Add code
Bookmark button
Alert button
Nov 01, 2016
Justin Khim, Varun Jog, Po-Ling Loh

Figure 1 for Computationally Efficient Influence Maximization in Stochastic and Adversarial Models: Algorithms and Analysis
Figure 2 for Computationally Efficient Influence Maximization in Stochastic and Adversarial Models: Algorithms and Analysis
Figure 3 for Computationally Efficient Influence Maximization in Stochastic and Adversarial Models: Algorithms and Analysis
Viaarxiv icon