Picture for Fady Alajaji

Fady Alajaji

A Unifying Generator Loss Function for Generative Adversarial Networks

Add code
Aug 14, 2023
Viaarxiv icon

Evaluating Trade-offs in Computer Vision Between Attribute Privacy, Fairness and Utility

Add code
Feb 15, 2023
Viaarxiv icon

On the Rényi Cross-Entropy

Add code
Jun 30, 2022
Figure 1 for On the Rényi Cross-Entropy
Viaarxiv icon

Achieving Utility, Fairness, and Compactness via Tunable Information Bottleneck Measures

Add code
Jun 20, 2022
Figure 1 for Achieving Utility, Fairness, and Compactness via Tunable Information Bottleneck Measures
Figure 2 for Achieving Utility, Fairness, and Compactness via Tunable Information Bottleneck Measures
Figure 3 for Achieving Utility, Fairness, and Compactness via Tunable Information Bottleneck Measures
Figure 4 for Achieving Utility, Fairness, and Compactness via Tunable Information Bottleneck Measures
Viaarxiv icon

Renyi Fair Information Bottleneck for Image Classification

Add code
Mar 09, 2022
Figure 1 for Renyi Fair Information Bottleneck for Image Classification
Figure 2 for Renyi Fair Information Bottleneck for Image Classification
Viaarxiv icon

Rényi Generative Adversarial Networks

Add code
Jun 03, 2020
Figure 1 for Rényi Generative Adversarial Networks
Figure 2 for Rényi Generative Adversarial Networks
Figure 3 for Rényi Generative Adversarial Networks
Figure 4 for Rényi Generative Adversarial Networks
Viaarxiv icon

Unsupervised Semantic Attribute Discovery and Control in Generative Models

Add code
Feb 25, 2020
Figure 1 for Unsupervised Semantic Attribute Discovery and Control in Generative Models
Figure 2 for Unsupervised Semantic Attribute Discovery and Control in Generative Models
Figure 3 for Unsupervised Semantic Attribute Discovery and Control in Generative Models
Figure 4 for Unsupervised Semantic Attribute Discovery and Control in Generative Models
Viaarxiv icon

Information Extraction Under Privacy Constraints

Add code
Jan 17, 2016
Figure 1 for Information Extraction Under Privacy Constraints
Figure 2 for Information Extraction Under Privacy Constraints
Figure 3 for Information Extraction Under Privacy Constraints
Figure 4 for Information Extraction Under Privacy Constraints
Viaarxiv icon