Picture for Tomas Pevny

Tomas Pevny

Malicious Internet Entity Detection Using Local Graph Inference

Add code
Aug 07, 2024
Viaarxiv icon

Generating Likely Counterfactuals Using Sum-Product Networks

Add code
Jan 25, 2024
Viaarxiv icon

Improving the Validity of Decision Trees as Explanations

Add code
Jun 13, 2023
Figure 1 for Improving the Validity of Decision Trees as Explanations
Figure 2 for Improving the Validity of Decision Trees as Explanations
Figure 3 for Improving the Validity of Decision Trees as Explanations
Figure 4 for Improving the Validity of Decision Trees as Explanations
Viaarxiv icon

A Differentiable Loss Function for Learning Heuristics in A*

Add code
Sep 12, 2022
Figure 1 for A Differentiable Loss Function for Learning Heuristics in A*
Figure 2 for A Differentiable Loss Function for Learning Heuristics in A*
Figure 3 for A Differentiable Loss Function for Learning Heuristics in A*
Figure 4 for A Differentiable Loss Function for Learning Heuristics in A*
Viaarxiv icon

Heuristic Search Planning with Deep Neural Networks using Imitation, Attention and Curriculum Learning

Add code
Dec 03, 2021
Figure 1 for Heuristic Search Planning with Deep Neural Networks using Imitation, Attention and Curriculum Learning
Figure 2 for Heuristic Search Planning with Deep Neural Networks using Imitation, Attention and Curriculum Learning
Figure 3 for Heuristic Search Planning with Deep Neural Networks using Imitation, Attention and Curriculum Learning
Figure 4 for Heuristic Search Planning with Deep Neural Networks using Imitation, Attention and Curriculum Learning
Viaarxiv icon

When Should You Defend Your Classifier -- A Game-theoretical Analysis of Countermeasures against Adversarial Examples

Add code
Aug 17, 2021
Figure 1 for When Should You Defend Your Classifier -- A Game-theoretical Analysis of Countermeasures against Adversarial Examples
Figure 2 for When Should You Defend Your Classifier -- A Game-theoretical Analysis of Countermeasures against Adversarial Examples
Figure 3 for When Should You Defend Your Classifier -- A Game-theoretical Analysis of Countermeasures against Adversarial Examples
Figure 4 for When Should You Defend Your Classifier -- A Game-theoretical Analysis of Countermeasures against Adversarial Examples
Viaarxiv icon

Mill.jl and JsonGrinder.jl: automated differentiable feature extraction for learning from raw JSON data

Add code
May 19, 2021
Figure 1 for Mill.jl and JsonGrinder.jl: automated differentiable feature extraction for learning from raw JSON data
Figure 2 for Mill.jl and JsonGrinder.jl: automated differentiable feature extraction for learning from raw JSON data
Viaarxiv icon

Sum-Product-Transform Networks: Exploiting Symmetries using Invertible Transformations

Add code
May 04, 2020
Figure 1 for Sum-Product-Transform Networks: Exploiting Symmetries using Invertible Transformations
Figure 2 for Sum-Product-Transform Networks: Exploiting Symmetries using Invertible Transformations
Figure 3 for Sum-Product-Transform Networks: Exploiting Symmetries using Invertible Transformations
Figure 4 for Sum-Product-Transform Networks: Exploiting Symmetries using Invertible Transformations
Viaarxiv icon

Joint Detection of Malicious Domains and Infected Clients

Add code
Jun 21, 2019
Figure 1 for Joint Detection of Malicious Domains and Infected Clients
Figure 2 for Joint Detection of Malicious Domains and Infected Clients
Figure 3 for Joint Detection of Malicious Domains and Infected Clients
Figure 4 for Joint Detection of Malicious Domains and Infected Clients
Viaarxiv icon

Approximation capability of neural networks on spaces of probability measures and tree-structured domains

Add code
Jun 03, 2019
Figure 1 for Approximation capability of neural networks on spaces of probability measures and tree-structured domains
Viaarxiv icon