Picture for Richard Harang

Richard Harang

ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation

Add code
Mar 13, 2019
Figure 1 for ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation
Figure 2 for ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation
Figure 3 for ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation
Figure 4 for ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation
Viaarxiv icon

Principled Uncertainty Estimation for Deep Neural Networks

Add code
Oct 29, 2018
Figure 1 for Principled Uncertainty Estimation for Deep Neural Networks
Figure 2 for Principled Uncertainty Estimation for Deep Neural Networks
Figure 3 for Principled Uncertainty Estimation for Deep Neural Networks
Figure 4 for Principled Uncertainty Estimation for Deep Neural Networks
Viaarxiv icon

A Deep Learning Approach to Fast, Format-Agnostic Detection of Malicious Web Content

Add code
Apr 13, 2018
Figure 1 for A Deep Learning Approach to Fast, Format-Agnostic Detection of Malicious Web Content
Figure 2 for A Deep Learning Approach to Fast, Format-Agnostic Detection of Malicious Web Content
Figure 3 for A Deep Learning Approach to Fast, Format-Agnostic Detection of Malicious Web Content
Figure 4 for A Deep Learning Approach to Fast, Format-Agnostic Detection of Malicious Web Content
Viaarxiv icon

Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments

Add code
Mar 16, 2017
Figure 1 for Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments
Figure 2 for Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments
Figure 3 for Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments
Figure 4 for Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments
Viaarxiv icon

Crafting Adversarial Input Sequences for Recurrent Neural Networks

Add code
Apr 28, 2016
Figure 1 for Crafting Adversarial Input Sequences for Recurrent Neural Networks
Figure 2 for Crafting Adversarial Input Sequences for Recurrent Neural Networks
Figure 3 for Crafting Adversarial Input Sequences for Recurrent Neural Networks
Figure 4 for Crafting Adversarial Input Sequences for Recurrent Neural Networks
Viaarxiv icon