József Tiborcz

@tibjoz

Security, machine learning and other things

Vrijeme pridruživanja: studeni 2011.

Tweetovi

Blokirali ste korisnika/cu @tibjoz

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @tibjoz

  1. 14. stu 2019.
    Poništi
  2. proslijedio/la je Tweet

    A researcher found full Source Code for CARBANAK banking —yes, this time for real—and some of its previously unseen plugins on the that were uploaded two years ago but went unnoticed. by

    Poništi
  3. proslijedio/la je Tweet
    5. tra 2019.

    1. I’m a supporter of making more efficient use of information. But something about this piece bothers me. Thread. Machine Learning in Medicine | NEJM

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    5. tra 2019.

    Hackers Can Add, Remove Cancer From CT Scans: Researchers -

    Poništi
  5. proslijedio/la je Tweet
    3. lis 2018.

    Excellent article! So many important points here, particularly about the fundamental limits of "function fitting" (read: supervised deep learning) in any important application (e.g. health care) where causal inferences are critical.

    Poništi
  6. proslijedio/la je Tweet
    24. ruj 2018.

    new notebook on linear regression and a DIY implementation of gradient descent

    Poništi
  7. proslijedio/la je Tweet
    8. kol 2018.

    Slides from our Introductory Overview Lecture on The Deep Learning Revolution with

    Poništi
  8. proslijedio/la je Tweet

    Welcome back, gradients! This method is orders of magnitude faster than state-of-the-art non-differentiable techniques. DARTS: Differentiable Architecture Search by Hanxiao Liu, Karen Simonyan, and Yiming Yang. Paper: Code:

    Poništi
  9. proslijedio/la je Tweet
    27. lip 2018.

    I made this years ago, even before , but I never published it because I never finished it and stuff happened... Somehow it got on Hacker News, so here it is: Backpropagation explained via scrollytelling:

    Poništi
  10. 25. lip 2018.
    Poništi
  11. 19. lip 2018.
    Poništi
  12. 17. lip 2018.
    Poništi
  13. 15. lip 2018.
    Poništi
  14. proslijedio/la je Tweet

    Trojanized update of a popular client was responsible for last week’s malware outbreak—Microsoft finds. 'Supply chain' attack helped attackers infect over 400,000 computers with mining malware in just 12-hours.

    Poništi
  15. proslijedio/la je Tweet

    Our neural network based system learned to "clone" a voice with less than a minute of audio data from the speaker. Check out our paper to find out more about this latest breakthrough in speech synthesis.

    Poništi
  16. proslijedio/la je Tweet
    Poništi
  17. proslijedio/la je Tweet
    18. velj 2018.

    Our paper on using variational autoencoder as a powerful recommender system is up! Code available at

    Poništi
  18. proslijedio/la je Tweet
    15. velj 2018.

    Convnet-specific "blindspots": suggests that convnets are not a drop-in replacement for more "classical" techniques?

    Poništi
  19. proslijedio/la je Tweet
    15. velj 2018.

    PyTorch implementation of "Efficient Neural Architecture Search via Parameters Sharing" from Google Brain

    Poništi
  20. proslijedio/la je Tweet
    13. velj 2018.

    Fifty things that trip up new Go developers. “Go is a simple and fun language, but, like any other language, it has a few gotchas. The information here will save you hours debugging your code.”

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·