Picture for Jared Sylvester

Jared Sylvester

Engineering a Simplified 0-Bit Consistent Weighted Sampling

Add code
Oct 23, 2018
Figure 1 for Engineering a Simplified 0-Bit Consistent Weighted Sampling
Figure 2 for Engineering a Simplified 0-Bit Consistent Weighted Sampling
Figure 3 for Engineering a Simplified 0-Bit Consistent Weighted Sampling
Figure 4 for Engineering a Simplified 0-Bit Consistent Weighted Sampling
Viaarxiv icon

Gradient Reversal Against Discrimination

Add code
Jul 01, 2018
Figure 1 for Gradient Reversal Against Discrimination
Figure 2 for Gradient Reversal Against Discrimination
Figure 3 for Gradient Reversal Against Discrimination
Figure 4 for Gradient Reversal Against Discrimination
Viaarxiv icon

Non-Negative Networks Against Adversarial Attacks

Add code
Jun 15, 2018
Figure 1 for Non-Negative Networks Against Adversarial Attacks
Figure 2 for Non-Negative Networks Against Adversarial Attacks
Figure 3 for Non-Negative Networks Against Adversarial Attacks
Figure 4 for Non-Negative Networks Against Adversarial Attacks
Viaarxiv icon

What About Applied Fairness?

Add code
Jun 13, 2018
Viaarxiv icon

Fair Forests: Regularized Tree Induction to Minimize Model Bias

Add code
Dec 21, 2017
Figure 1 for Fair Forests: Regularized Tree Induction to Minimize Model Bias
Figure 2 for Fair Forests: Regularized Tree Induction to Minimize Model Bias
Figure 3 for Fair Forests: Regularized Tree Induction to Minimize Model Bias
Figure 4 for Fair Forests: Regularized Tree Induction to Minimize Model Bias
Viaarxiv icon

Learning the PE Header, Malware Detection with Minimal Domain Knowledge

Add code
Nov 11, 2017
Figure 1 for Learning the PE Header, Malware Detection with Minimal Domain Knowledge
Figure 2 for Learning the PE Header, Malware Detection with Minimal Domain Knowledge
Figure 3 for Learning the PE Header, Malware Detection with Minimal Domain Knowledge
Figure 4 for Learning the PE Header, Malware Detection with Minimal Domain Knowledge
Viaarxiv icon

Malware Detection by Eating a Whole EXE

Add code
Oct 25, 2017
Figure 1 for Malware Detection by Eating a Whole EXE
Figure 2 for Malware Detection by Eating a Whole EXE
Figure 3 for Malware Detection by Eating a Whole EXE
Figure 4 for Malware Detection by Eating a Whole EXE
Viaarxiv icon

Understanding the Predictive Power of Computational Mechanics and Echo State Networks in Social Media

Add code
Aug 23, 2013
Figure 1 for Understanding the Predictive Power of Computational Mechanics and Echo State Networks in Social Media
Figure 2 for Understanding the Predictive Power of Computational Mechanics and Echo State Networks in Social Media
Figure 3 for Understanding the Predictive Power of Computational Mechanics and Echo State Networks in Social Media
Figure 4 for Understanding the Predictive Power of Computational Mechanics and Echo State Networks in Social Media
Viaarxiv icon