Alert button
Picture for Sandra Gómez-Canaval

Sandra Gómez-Canaval

Alert button

Dynamics of Fourier Modes in Torus Generative Adversarial Networks

Add code
Bookmark button
Alert button
Sep 05, 2022
Ángel González-Prieto, Alberto Mozo, Edgar Talavera, Sandra Gómez-Canaval

Figure 1 for Dynamics of Fourier Modes in Torus Generative Adversarial Networks
Figure 2 for Dynamics of Fourier Modes in Torus Generative Adversarial Networks
Figure 3 for Dynamics of Fourier Modes in Torus Generative Adversarial Networks
Figure 4 for Dynamics of Fourier Modes in Torus Generative Adversarial Networks
Viaarxiv icon

Data Augmentation techniques in time series domain: A survey and taxonomy

Add code
Bookmark button
Alert button
Jun 25, 2022
Edgar Talavera, Guillermo Iglesias, Ángel González-Prieto, Alberto Mozo, Sandra Gómez-Canaval

Figure 1 for Data Augmentation techniques in time series domain: A survey and taxonomy
Figure 2 for Data Augmentation techniques in time series domain: A survey and taxonomy
Figure 3 for Data Augmentation techniques in time series domain: A survey and taxonomy
Figure 4 for Data Augmentation techniques in time series domain: A survey and taxonomy
Viaarxiv icon

Improving the quality of generative models through Smirnov transformation

Add code
Bookmark button
Alert button
Oct 29, 2021
Ángel González-Prieto, Alberto Mozo, Sandra Gómez-Canaval, Edgar Talavera

Figure 1 for Improving the quality of generative models through Smirnov transformation
Figure 2 for Improving the quality of generative models through Smirnov transformation
Figure 3 for Improving the quality of generative models through Smirnov transformation
Figure 4 for Improving the quality of generative models through Smirnov transformation
Viaarxiv icon

Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks

Add code
Bookmark button
Alert button
Jul 30, 2021
Alberto Mozo, Ángel González-Prieto, Antonio Pastor, Sandra Gómez-Canaval, Edgar Talavera

Figure 1 for Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks
Figure 2 for Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks
Figure 3 for Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks
Figure 4 for Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks
Viaarxiv icon