Picture for Michael T. Smith

Michael T. Smith

Shallow and Deep Nonparametric Convolutions for Gaussian Processes

Add code
Jun 17, 2022
Figure 1 for Shallow and Deep Nonparametric Convolutions for Gaussian Processes
Figure 2 for Shallow and Deep Nonparametric Convolutions for Gaussian Processes
Figure 3 for Shallow and Deep Nonparametric Convolutions for Gaussian Processes
Figure 4 for Shallow and Deep Nonparametric Convolutions for Gaussian Processes
Viaarxiv icon

Learning Nonparametric Volterra Kernels with Gaussian Processes

Add code
Jun 10, 2021
Figure 1 for Learning Nonparametric Volterra Kernels with Gaussian Processes
Figure 2 for Learning Nonparametric Volterra Kernels with Gaussian Processes
Figure 3 for Learning Nonparametric Volterra Kernels with Gaussian Processes
Figure 4 for Learning Nonparametric Volterra Kernels with Gaussian Processes
Viaarxiv icon

Machine Learning for a Low-cost Air Pollution Network

Add code
Nov 28, 2019
Figure 1 for Machine Learning for a Low-cost Air Pollution Network
Figure 2 for Machine Learning for a Low-cost Air Pollution Network
Figure 3 for Machine Learning for a Low-cost Air Pollution Network
Figure 4 for Machine Learning for a Low-cost Air Pollution Network
Viaarxiv icon

The Limitations of Model Uncertainty in Adversarial Settings

Add code
Dec 06, 2018
Figure 1 for The Limitations of Model Uncertainty in Adversarial Settings
Figure 2 for The Limitations of Model Uncertainty in Adversarial Settings
Figure 3 for The Limitations of Model Uncertainty in Adversarial Settings
Figure 4 for The Limitations of Model Uncertainty in Adversarial Settings
Viaarxiv icon

Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification

Add code
Jun 06, 2018
Figure 1 for Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification
Figure 2 for Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification
Figure 3 for Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification
Figure 4 for Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification
Viaarxiv icon