Picture for Ehsan Kazemi

Ehsan Kazemi

MarineFormer: A Transformer-based Navigation Policy Model for Collision Avoidance in Marine Environment

Add code
Oct 17, 2024
Figure 1 for MarineFormer: A Transformer-based Navigation Policy Model for Collision Avoidance in Marine Environment
Figure 2 for MarineFormer: A Transformer-based Navigation Policy Model for Collision Avoidance in Marine Environment
Figure 3 for MarineFormer: A Transformer-based Navigation Policy Model for Collision Avoidance in Marine Environment
Figure 4 for MarineFormer: A Transformer-based Navigation Policy Model for Collision Avoidance in Marine Environment
Viaarxiv icon

Complementing Semi-Supervised Learning with Uncertainty Quantification

Add code
Jul 22, 2022
Figure 1 for Complementing Semi-Supervised Learning with Uncertainty Quantification
Figure 2 for Complementing Semi-Supervised Learning with Uncertainty Quantification
Figure 3 for Complementing Semi-Supervised Learning with Uncertainty Quantification
Figure 4 for Complementing Semi-Supervised Learning with Uncertainty Quantification
Viaarxiv icon

CTIN: Robust Contextual Transformer Network for Inertial Navigation

Add code
Dec 20, 2021
Figure 1 for CTIN: Robust Contextual Transformer Network for Inertial Navigation
Figure 2 for CTIN: Robust Contextual Transformer Network for Inertial Navigation
Figure 3 for CTIN: Robust Contextual Transformer Network for Inertial Navigation
Figure 4 for CTIN: Robust Contextual Transformer Network for Inertial Navigation
Viaarxiv icon

The Power of Subsampling in Submodular Maximization

Add code
Apr 06, 2021
Figure 1 for The Power of Subsampling in Submodular Maximization
Figure 2 for The Power of Subsampling in Submodular Maximization
Figure 3 for The Power of Subsampling in Submodular Maximization
Figure 4 for The Power of Subsampling in Submodular Maximization
Viaarxiv icon

Generating Structured Adversarial Attacks Using Frank-Wolfe Method

Add code
Feb 15, 2021
Figure 1 for Generating Structured Adversarial Attacks Using Frank-Wolfe Method
Figure 2 for Generating Structured Adversarial Attacks Using Frank-Wolfe Method
Figure 3 for Generating Structured Adversarial Attacks Using Frank-Wolfe Method
Figure 4 for Generating Structured Adversarial Attacks Using Frank-Wolfe Method
Viaarxiv icon

Trace-Norm Adversarial Examples

Add code
Jul 02, 2020
Figure 1 for Trace-Norm Adversarial Examples
Figure 2 for Trace-Norm Adversarial Examples
Figure 3 for Trace-Norm Adversarial Examples
Figure 4 for Trace-Norm Adversarial Examples
Viaarxiv icon

On Adversarial Bias and the Robustness of Fair Machine Learning

Add code
Jun 15, 2020
Figure 1 for On Adversarial Bias and the Robustness of Fair Machine Learning
Figure 2 for On Adversarial Bias and the Robustness of Fair Machine Learning
Figure 3 for On Adversarial Bias and the Robustness of Fair Machine Learning
Figure 4 for On Adversarial Bias and the Robustness of Fair Machine Learning
Viaarxiv icon

Submodular Maximization Through Barrier Functions

Add code
Feb 10, 2020
Figure 1 for Submodular Maximization Through Barrier Functions
Figure 2 for Submodular Maximization Through Barrier Functions
Figure 3 for Submodular Maximization Through Barrier Functions
Figure 4 for Submodular Maximization Through Barrier Functions
Viaarxiv icon

Regularized Submodular Maximization at Scale

Add code
Feb 10, 2020
Figure 1 for Regularized Submodular Maximization at Scale
Figure 2 for Regularized Submodular Maximization at Scale
Figure 3 for Regularized Submodular Maximization at Scale
Figure 4 for Regularized Submodular Maximization at Scale
Viaarxiv icon

Streaming Submodular Maximization under a $k$-Set System Constraint

Add code
Feb 09, 2020
Figure 1 for Streaming Submodular Maximization under a $k$-Set System Constraint
Figure 2 for Streaming Submodular Maximization under a $k$-Set System Constraint
Figure 3 for Streaming Submodular Maximization under a $k$-Set System Constraint
Figure 4 for Streaming Submodular Maximization under a $k$-Set System Constraint
Viaarxiv icon