Alert button
Picture for Tim Oates

Tim Oates

Alert button

Holographic Global Convolutional Networks for Long-Range Prediction Tasks in Malware Detection

Add code
Bookmark button
Alert button
Mar 23, 2024
Mohammad Mahmudul Alam, Edward Raff, Stella Biderman, Tim Oates, James Holt

Viaarxiv icon

Advancing Security in AI Systems: A Novel Approach to Detecting Backdoors in Deep Neural Networks

Add code
Bookmark button
Alert button
Mar 13, 2024
Khondoker Murad Hossain, Tim Oates

Figure 1 for Advancing Security in AI Systems: A Novel Approach to Detecting Backdoors in Deep Neural Networks
Figure 2 for Advancing Security in AI Systems: A Novel Approach to Detecting Backdoors in Deep Neural Networks
Figure 3 for Advancing Security in AI Systems: A Novel Approach to Detecting Backdoors in Deep Neural Networks
Figure 4 for Advancing Security in AI Systems: A Novel Approach to Detecting Backdoors in Deep Neural Networks
Viaarxiv icon

TEN-GUARD: Tensor Decomposition for Backdoor Attack Detection in Deep Neural Networks

Add code
Bookmark button
Alert button
Jan 06, 2024
Khondoker Murad Hossain, Tim Oates

Viaarxiv icon

Towards Generalization in Subitizing with Neuro-Symbolic Loss using Holographic Reduced Representations

Add code
Bookmark button
Alert button
Dec 23, 2023
Mohammad Mahmudul Alam, Edward Raff, Tim Oates

Viaarxiv icon

DDxT: Deep Generative Transformer Models for Differential Diagnosis

Add code
Bookmark button
Alert button
Dec 02, 2023
Mohammad Mahmudul Alam, Edward Raff, Tim Oates, Cynthia Matuszek

Figure 1 for DDxT: Deep Generative Transformer Models for Differential Diagnosis
Figure 2 for DDxT: Deep Generative Transformer Models for Differential Diagnosis
Figure 3 for DDxT: Deep Generative Transformer Models for Differential Diagnosis
Figure 4 for DDxT: Deep Generative Transformer Models for Differential Diagnosis
Viaarxiv icon

LLM Augmented Hierarchical Agents

Add code
Bookmark button
Alert button
Nov 09, 2023
Bharat Prakash, Tim Oates, Tinoosh Mohsenin

Viaarxiv icon

cuSLINK: Single-linkage Agglomerative Clustering on the GPU

Add code
Bookmark button
Alert button
Jun 28, 2023
Corey J. Nolet, Divye Gala, Alex Fender, Mahesh Doijade, Joe Eaton, Edward Raff, John Zedlewski, Brad Rees, Tim Oates

Figure 1 for cuSLINK: Single-linkage Agglomerative Clustering on the GPU
Figure 2 for cuSLINK: Single-linkage Agglomerative Clustering on the GPU
Figure 3 for cuSLINK: Single-linkage Agglomerative Clustering on the GPU
Figure 4 for cuSLINK: Single-linkage Agglomerative Clustering on the GPU
Viaarxiv icon

Recasting Self-Attention with Holographic Reduced Representations

Add code
Bookmark button
Alert button
May 31, 2023
Mohammad Mahmudul Alam, Edward Raff, Stella Biderman, Tim Oates, James Holt

Figure 1 for Recasting Self-Attention with Holographic Reduced Representations
Figure 2 for Recasting Self-Attention with Holographic Reduced Representations
Figure 3 for Recasting Self-Attention with Holographic Reduced Representations
Figure 4 for Recasting Self-Attention with Holographic Reduced Representations
Viaarxiv icon

RFC-Net: Learning High Resolution Global Features for Medical Image Segmentation on a Computational Budget

Add code
Bookmark button
Alert button
Feb 13, 2023
Sourajit Saha, Shaswati Saha, Md Osman Gani, Tim Oates, David Chapman

Figure 1 for RFC-Net: Learning High Resolution Global Features for Medical Image Segmentation on a Computational Budget
Figure 2 for RFC-Net: Learning High Resolution Global Features for Medical Image Segmentation on a Computational Budget
Viaarxiv icon

Backdoor Attack Detection in Computer Vision by Applying Matrix Factorization on the Weights of Deep Networks

Add code
Bookmark button
Alert button
Dec 15, 2022
Khondoker Murad Hossain, Tim Oates

Figure 1 for Backdoor Attack Detection in Computer Vision by Applying Matrix Factorization on the Weights of Deep Networks
Figure 2 for Backdoor Attack Detection in Computer Vision by Applying Matrix Factorization on the Weights of Deep Networks
Figure 3 for Backdoor Attack Detection in Computer Vision by Applying Matrix Factorization on the Weights of Deep Networks
Figure 4 for Backdoor Attack Detection in Computer Vision by Applying Matrix Factorization on the Weights of Deep Networks
Viaarxiv icon