Alert button
Picture for Rangeet Pan

Rangeet Pan

Alert button

Decomposing a Recurrent Neural Network into Modules for Enabling Reusability and Replacement

Add code
Bookmark button
Alert button
Dec 15, 2022
Sayem Mohammad Imtiaz, Fraol Batole, Astha Singh, Rangeet Pan, Breno Dantas Cruz, Hridesh Rajan

Figure 1 for Decomposing a Recurrent Neural Network into Modules for Enabling Reusability and Replacement
Figure 2 for Decomposing a Recurrent Neural Network into Modules for Enabling Reusability and Replacement
Figure 3 for Decomposing a Recurrent Neural Network into Modules for Enabling Reusability and Replacement
Figure 4 for Decomposing a Recurrent Neural Network into Modules for Enabling Reusability and Replacement
Viaarxiv icon

Manas: Mining Software Repositories to Assist AutoML

Add code
Bookmark button
Alert button
Dec 06, 2021
Giang Nguyen, Johir Islam, Rangeet Pan, Hridesh Rajan

Figure 1 for Manas: Mining Software Repositories to Assist AutoML
Figure 2 for Manas: Mining Software Repositories to Assist AutoML
Figure 3 for Manas: Mining Software Repositories to Assist AutoML
Figure 4 for Manas: Mining Software Repositories to Assist AutoML
Viaarxiv icon

Decomposing Convolutional Neural Networks into Reusable and Replaceable Modules

Add code
Bookmark button
Alert button
Oct 11, 2021
Rangeet Pan, Hridesh Rajan

Figure 1 for Decomposing Convolutional Neural Networks into Reusable and Replaceable Modules
Figure 2 for Decomposing Convolutional Neural Networks into Reusable and Replaceable Modules
Figure 3 for Decomposing Convolutional Neural Networks into Reusable and Replaceable Modules
Figure 4 for Decomposing Convolutional Neural Networks into Reusable and Replaceable Modules
Viaarxiv icon

A Comprehensive Study on Deep Learning Bug Characteristics

Add code
Bookmark button
Alert button
Jun 03, 2019
Md Johirul Islam, Giang Nguyen, Rangeet Pan, Hridesh Rajan

Figure 1 for A Comprehensive Study on Deep Learning Bug Characteristics
Figure 2 for A Comprehensive Study on Deep Learning Bug Characteristics
Figure 3 for A Comprehensive Study on Deep Learning Bug Characteristics
Figure 4 for A Comprehensive Study on Deep Learning Bug Characteristics
Viaarxiv icon

Identifying Classes Susceptible to Adversarial Attacks

Add code
Bookmark button
Alert button
May 30, 2019
Rangeet Pan, Md Johirul Islam, Shibbir Ahmed, Hridesh Rajan

Figure 1 for Identifying Classes Susceptible to Adversarial Attacks
Figure 2 for Identifying Classes Susceptible to Adversarial Attacks
Figure 3 for Identifying Classes Susceptible to Adversarial Attacks
Figure 4 for Identifying Classes Susceptible to Adversarial Attacks
Viaarxiv icon