Alert button

"Time": models, code, and papers
Alert button

Deep Learning of Conjugate Mappings

Add code
Bookmark button
Alert button
Apr 01, 2021
Jason J. Bramburger, Steven L. Brunton, J. Nathan Kutz

Figure 1 for Deep Learning of Conjugate Mappings
Figure 2 for Deep Learning of Conjugate Mappings
Figure 3 for Deep Learning of Conjugate Mappings
Figure 4 for Deep Learning of Conjugate Mappings
Viaarxiv icon

Locally Differentially Private Federated Learning: Efficient Algorithms with Tight Risk Bounds

Add code
Bookmark button
Alert button
Jun 17, 2021
Andrew Lowy, Meisam Razaviyayn

Figure 1 for Locally Differentially Private Federated Learning: Efficient Algorithms with Tight Risk Bounds
Figure 2 for Locally Differentially Private Federated Learning: Efficient Algorithms with Tight Risk Bounds
Figure 3 for Locally Differentially Private Federated Learning: Efficient Algorithms with Tight Risk Bounds
Figure 4 for Locally Differentially Private Federated Learning: Efficient Algorithms with Tight Risk Bounds
Viaarxiv icon

Navigation Turing Test (NTT): Learning to Evaluate Human-Like Navigation

Add code
Bookmark button
Alert button
May 20, 2021
Sam Devlin, Raluca Georgescu, Ida Momennejad, Jaroslaw Rzepecki, Evelyn Zuniga, Gavin Costello, Guy Leroy, Ali Shaw, Katja Hofmann

Figure 1 for Navigation Turing Test (NTT): Learning to Evaluate Human-Like Navigation
Figure 2 for Navigation Turing Test (NTT): Learning to Evaluate Human-Like Navigation
Figure 3 for Navigation Turing Test (NTT): Learning to Evaluate Human-Like Navigation
Figure 4 for Navigation Turing Test (NTT): Learning to Evaluate Human-Like Navigation
Viaarxiv icon

Nonlinear Hawkes Process with Gaussian Process Self Effects

Add code
Bookmark button
Alert button
May 20, 2021
Noa Malem-Shinitski, Cesar Ojeda, Manfred Opper

Figure 1 for Nonlinear Hawkes Process with Gaussian Process Self Effects
Figure 2 for Nonlinear Hawkes Process with Gaussian Process Self Effects
Figure 3 for Nonlinear Hawkes Process with Gaussian Process Self Effects
Figure 4 for Nonlinear Hawkes Process with Gaussian Process Self Effects
Viaarxiv icon

Adversarial training in communication constrained federated learning

Mar 01, 2021
Devansh Shah, Parijat Dube, Supriyo Chakraborty, Ashish Verma

Figure 1 for Adversarial training in communication constrained federated learning
Figure 2 for Adversarial training in communication constrained federated learning
Figure 3 for Adversarial training in communication constrained federated learning
Figure 4 for Adversarial training in communication constrained federated learning
Viaarxiv icon

Automated Generation of Robotic Planning Domains from Observations

May 28, 2021
Maximilian Diehl, Chris Paxton, Karinne Ramirez-Amaro

Figure 1 for Automated Generation of Robotic Planning Domains from Observations
Figure 2 for Automated Generation of Robotic Planning Domains from Observations
Figure 3 for Automated Generation of Robotic Planning Domains from Observations
Figure 4 for Automated Generation of Robotic Planning Domains from Observations
Viaarxiv icon

A Consistent Method for Learning OOMs from Asymptotically Stationary Time Series Data Containing Missing Values

Oct 19, 2018
Tianlin Liu

Figure 1 for A Consistent Method for Learning OOMs from Asymptotically Stationary Time Series Data Containing Missing Values
Figure 2 for A Consistent Method for Learning OOMs from Asymptotically Stationary Time Series Data Containing Missing Values
Viaarxiv icon

Dynamic Graph-Based Anomaly Detection in the Electrical Grid

Add code
Bookmark button
Alert button
Jan 01, 2021
Shimiao Li, Amritanshu Pandey, Bryan Hooi, Christos Faloutsos, Larry Pileggi

Figure 1 for Dynamic Graph-Based Anomaly Detection in the Electrical Grid
Figure 2 for Dynamic Graph-Based Anomaly Detection in the Electrical Grid
Figure 3 for Dynamic Graph-Based Anomaly Detection in the Electrical Grid
Figure 4 for Dynamic Graph-Based Anomaly Detection in the Electrical Grid
Viaarxiv icon

A Comprehensive Review of Image Analysis Methods for Microorganism Counting: From Classical Image Processing to Deep Learning Approaches

Mar 25, 2021
Chen Li, Jiawei Zhang, Md Mamunur Rahaman, Yudong Yao, Pingli Ma, Jinghua Zhang, Xin Zhao, Tao Jiang, Marcin Grzegorzek

Figure 1 for A Comprehensive Review of Image Analysis Methods for Microorganism Counting: From Classical Image Processing to Deep Learning Approaches
Figure 2 for A Comprehensive Review of Image Analysis Methods for Microorganism Counting: From Classical Image Processing to Deep Learning Approaches
Figure 3 for A Comprehensive Review of Image Analysis Methods for Microorganism Counting: From Classical Image Processing to Deep Learning Approaches
Figure 4 for A Comprehensive Review of Image Analysis Methods for Microorganism Counting: From Classical Image Processing to Deep Learning Approaches
Viaarxiv icon

Manipulating SGD with Data Ordering Attacks

Add code
Bookmark button
Alert button
Apr 19, 2021
Ilia Shumailov, Zakhar Shumaylov, Dmitry Kazhdan, Yiren Zhao, Nicolas Papernot, Murat A. Erdogdu, Ross Anderson

Figure 1 for Manipulating SGD with Data Ordering Attacks
Figure 2 for Manipulating SGD with Data Ordering Attacks
Figure 3 for Manipulating SGD with Data Ordering Attacks
Figure 4 for Manipulating SGD with Data Ordering Attacks
Viaarxiv icon