Medijski sadržaj
- Tweetovi
- Tweetovi i odgovori
- Medijski sadržaj, trenutna stranica.
-
I turned 27 today and am feeling pretty good about it :) I have been celebrating on a mountain in Norway with some favorite people. 2020 is gonna be a good year :)pic.twitter.com/66fOTipryq
-
My band is presenting a poster at NeurIPS today :) also we will be playing a set at the banquet at 7:30. Come check it and other great artistic applications of machine learning out at the ml creativity workshop :)pic.twitter.com/qhEaUSC1At
-
This actually makes me feel sweet :) I am really excited to get more music out soon :) also side note Spotify has super nice statistics for musicians. I bet there a ton of opportunities for ML there.pic.twitter.com/zyjZeEU32K
-
So my band
@goodkidband is coming to@NeurIPSConf ! We will be playing a set at the banquet on Saturday and presenting a paper at the Creativity Workshop! These two worlds don't normally collide like this for me, so i am really excited to merge some ML stuff with music!pic.twitter.com/QYUyIBgZQd
-
I'm gonna tell my kids this was Artificial Intelligence.pic.twitter.com/g7UuZ7eCHk
-
It's been great working with
@YaoQinUCSD these past few months! She completed 2 papers over the course of her summer internship and we are very excited to release them!pic.twitter.com/DNpYfbKG1U
-
This is true even with an epsilon of 0.1, as is standard in the literature! Below are randomly sampled successful and unsuccessful targeted R-PGD attacks against a capsule network. Note how many resemble the target class 6/7pic.twitter.com/etpAxtcYwF
Prikaži ovu nit -
however, the reconstruction error is differentiable; we can make a stronger attack by taking this into account. We call this attack R(econstruction)-PGD. It can trick our detection, but the results are not really adversarial, they resemble members of the target class! 5/7pic.twitter.com/PEMRzIhygB
Prikaži ovu nit -
With this strategy we are able to accurately detect many types of adversarial attacks on MNIST, fashionMNIST, and SVHN. We are also able to use this mechanism as a general outlier detection strategy 4/7pic.twitter.com/ovBMLPIg2I
Prikaži ovu nit -
We can create a detection algorithm by defining a threshold for reconstruction error, and flag inputs as adversarial if the reconstruction error exceeds this threshold. This strategy can be extended to CNNs as well, though it does not work as well 3/7pic.twitter.com/B2htBOhOkK
Prikaži ovu nit -
The problem with adversarial examples is that they dont look like what they are classified as. Capsule networks output both a classification and a reconstruction of the input conditioned on the classification. A reconstruction of an adversarial looks different from the input 2/7pic.twitter.com/W6pUztK5Rx
Prikaži ovu nit -
-
-
For a city that has never held a championship parade before, I think we are doing a pretty damn good job.
#WeTheNorth
pic.twitter.com/IudNz0cSR1
Prikaži ovu nit -
Our poster session at ICML went well and the raptors won the championship. Pretty good night if you ask me :)pic.twitter.com/kalS7deWXA
-
If you are at
#icml2019 and want to learn about a wierd loss function and all the stuff you can do with it, come to Hall A at 12:05. I will be giving a 5 minute overview of my work with@NicolasPapernot and@geoffreyhinton . Drop by the poster session tonight for more info :)pic.twitter.com/VWuYETXEUy
-
@NicolasPapernot and I wrote a blog explaining and demoing the DKNN method and how it can be used in conjunction with Soft Nearest Neighbor Loss to detect adversarial examples and outlier data. It even has some little in browser neural networks :) http://www.cleverhans.io/security/2019/05/20/dknn.html …pic.twitter.com/s4WB92TpCF -
This is my experience in the United States most of the timehttps://youtu.be/5FEW5mh7iAI
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.