Picture for Andre T. Nguyen

Andre T. Nguyen

Improving Out-of-Distribution Detection via Epistemic Uncertainty Adversarial Training

Add code
Sep 09, 2022
Figure 1 for Improving Out-of-Distribution Detection via Epistemic Uncertainty Adversarial Training
Figure 2 for Improving Out-of-Distribution Detection via Epistemic Uncertainty Adversarial Training
Figure 3 for Improving Out-of-Distribution Detection via Epistemic Uncertainty Adversarial Training
Figure 4 for Improving Out-of-Distribution Detection via Epistemic Uncertainty Adversarial Training
Viaarxiv icon

Out of Distribution Data Detection Using Dropout Bayesian Neural Networks

Add code
Feb 18, 2022
Figure 1 for Out of Distribution Data Detection Using Dropout Bayesian Neural Networks
Figure 2 for Out of Distribution Data Detection Using Dropout Bayesian Neural Networks
Figure 3 for Out of Distribution Data Detection Using Dropout Bayesian Neural Networks
Figure 4 for Out of Distribution Data Detection Using Dropout Bayesian Neural Networks
Viaarxiv icon

Leveraging Uncertainty for Improved Static Malware Detection Under Extreme False Positive Constraints

Add code
Aug 09, 2021
Figure 1 for Leveraging Uncertainty for Improved Static Malware Detection Under Extreme False Positive Constraints
Figure 2 for Leveraging Uncertainty for Improved Static Malware Detection Under Extreme False Positive Constraints
Figure 3 for Leveraging Uncertainty for Improved Static Malware Detection Under Extreme False Positive Constraints
Figure 4 for Leveraging Uncertainty for Improved Static Malware Detection Under Extreme False Positive Constraints
Viaarxiv icon

Practical Cross-modal Manifold Alignment for Grounded Language

Add code
Sep 01, 2020
Figure 1 for Practical Cross-modal Manifold Alignment for Grounded Language
Figure 2 for Practical Cross-modal Manifold Alignment for Grounded Language
Figure 3 for Practical Cross-modal Manifold Alignment for Grounded Language
Figure 4 for Practical Cross-modal Manifold Alignment for Grounded Language
Viaarxiv icon

Towards the Use of Neural Networks for Influenza Prediction at Multiple Spatial Resolutions

Add code
Nov 13, 2019
Figure 1 for Towards the Use of Neural Networks for Influenza Prediction at Multiple Spatial Resolutions
Figure 2 for Towards the Use of Neural Networks for Influenza Prediction at Multiple Spatial Resolutions
Figure 3 for Towards the Use of Neural Networks for Influenza Prediction at Multiple Spatial Resolutions
Viaarxiv icon

Robust Design of Deep Neural Networks against Adversarial Attacks based on Lyapunov Theory

Add code
Nov 12, 2019
Figure 1 for Robust Design of Deep Neural Networks against Adversarial Attacks based on Lyapunov Theory
Figure 2 for Robust Design of Deep Neural Networks against Adversarial Attacks based on Lyapunov Theory
Figure 3 for Robust Design of Deep Neural Networks against Adversarial Attacks based on Lyapunov Theory
Figure 4 for Robust Design of Deep Neural Networks against Adversarial Attacks based on Lyapunov Theory
Viaarxiv icon

Would a File by Any Other Name Seem as Malicious?

Add code
Oct 10, 2019
Figure 1 for Would a File by Any Other Name Seem as Malicious?
Figure 2 for Would a File by Any Other Name Seem as Malicious?
Figure 3 for Would a File by Any Other Name Seem as Malicious?
Figure 4 for Would a File by Any Other Name Seem as Malicious?
Viaarxiv icon

Heterogeneous Relational Kernel Learning

Add code
Aug 24, 2019
Figure 1 for Heterogeneous Relational Kernel Learning
Figure 2 for Heterogeneous Relational Kernel Learning
Figure 3 for Heterogeneous Relational Kernel Learning
Figure 4 for Heterogeneous Relational Kernel Learning
Viaarxiv icon

Connecting Lyapunov Control Theory to Adversarial Attacks

Add code
Jul 17, 2019
Figure 1 for Connecting Lyapunov Control Theory to Adversarial Attacks
Figure 2 for Connecting Lyapunov Control Theory to Adversarial Attacks
Figure 3 for Connecting Lyapunov Control Theory to Adversarial Attacks
Viaarxiv icon

Adversarial Attacks, Regression, and Numerical Stability Regularization

Add code
Dec 07, 2018
Figure 1 for Adversarial Attacks, Regression, and Numerical Stability Regularization
Figure 2 for Adversarial Attacks, Regression, and Numerical Stability Regularization
Figure 3 for Adversarial Attacks, Regression, and Numerical Stability Regularization
Figure 4 for Adversarial Attacks, Regression, and Numerical Stability Regularization
Viaarxiv icon