Picture for Supriyo Chakraborty

Supriyo Chakraborty

IBM Research

MYCROFT: Towards Effective and Efficient External Data Augmentation

Add code
Oct 11, 2024
Figure 1 for MYCROFT: Towards Effective and Efficient External Data Augmentation
Figure 2 for MYCROFT: Towards Effective and Efficient External Data Augmentation
Figure 3 for MYCROFT: Towards Effective and Efficient External Data Augmentation
Figure 4 for MYCROFT: Towards Effective and Efficient External Data Augmentation
Viaarxiv icon

Quantum Inverse Contextual Vision Transformers (Q-ICVT): A New Frontier in 3D Object Detection for AVs

Add code
Aug 20, 2024
Figure 1 for Quantum Inverse Contextual Vision Transformers (Q-ICVT): A New Frontier in 3D Object Detection for AVs
Figure 2 for Quantum Inverse Contextual Vision Transformers (Q-ICVT): A New Frontier in 3D Object Detection for AVs
Figure 3 for Quantum Inverse Contextual Vision Transformers (Q-ICVT): A New Frontier in 3D Object Detection for AVs
Figure 4 for Quantum Inverse Contextual Vision Transformers (Q-ICVT): A New Frontier in 3D Object Detection for AVs
Viaarxiv icon

AYDIV: Adaptable Yielding 3D Object Detection via Integrated Contextual Vision Transformer

Add code
Feb 12, 2024
Viaarxiv icon

OrthoSeisnet: Seismic Inversion through Orthogonal Multi-scale Frequency Domain U-Net for Geophysical Exploration

Add code
Jan 09, 2024
Viaarxiv icon

Knowledge from Uncertainty in Evidential Deep Learning

Add code
Oct 19, 2023
Viaarxiv icon

On the amplification of security and privacy risks by post-hoc explanations in machine learning models

Add code
Jun 28, 2022
Figure 1 for On the amplification of security and privacy risks by post-hoc explanations in machine learning models
Figure 2 for On the amplification of security and privacy risks by post-hoc explanations in machine learning models
Figure 3 for On the amplification of security and privacy risks by post-hoc explanations in machine learning models
Figure 4 for On the amplification of security and privacy risks by post-hoc explanations in machine learning models
Viaarxiv icon

SparseFed: Mitigating Model Poisoning Attacks in Federated Learning with Sparsification

Add code
Dec 12, 2021
Figure 1 for SparseFed: Mitigating Model Poisoning Attacks in Federated Learning with Sparsification
Figure 2 for SparseFed: Mitigating Model Poisoning Attacks in Federated Learning with Sparsification
Figure 3 for SparseFed: Mitigating Model Poisoning Attacks in Federated Learning with Sparsification
Figure 4 for SparseFed: Mitigating Model Poisoning Attacks in Federated Learning with Sparsification
Viaarxiv icon

Adversarial training in communication constrained federated learning

Add code
Mar 01, 2021
Figure 1 for Adversarial training in communication constrained federated learning
Figure 2 for Adversarial training in communication constrained federated learning
Figure 3 for Adversarial training in communication constrained federated learning
Figure 4 for Adversarial training in communication constrained federated learning
Viaarxiv icon

IBM Federated Learning: an Enterprise Framework White Paper V0.1

Add code
Jul 22, 2020
Figure 1 for IBM Federated Learning: an Enterprise Framework White Paper V0.1
Figure 2 for IBM Federated Learning: an Enterprise Framework White Paper V0.1
Figure 3 for IBM Federated Learning: an Enterprise Framework White Paper V0.1
Figure 4 for IBM Federated Learning: an Enterprise Framework White Paper V0.1
Viaarxiv icon

Explaining Motion Relevance for Activity Recognition in Video Deep Learning Models

Add code
Mar 31, 2020
Figure 1 for Explaining Motion Relevance for Activity Recognition in Video Deep Learning Models
Figure 2 for Explaining Motion Relevance for Activity Recognition in Video Deep Learning Models
Figure 3 for Explaining Motion Relevance for Activity Recognition in Video Deep Learning Models
Figure 4 for Explaining Motion Relevance for Activity Recognition in Video Deep Learning Models
Viaarxiv icon