Picture for Yigit Alparslan

Yigit Alparslan

ATRAS: Adversarially Trained Robust Architecture Search

Add code
Jun 13, 2021
Figure 1 for ATRAS: Adversarially Trained Robust Architecture Search
Figure 2 for ATRAS: Adversarially Trained Robust Architecture Search
Figure 3 for ATRAS: Adversarially Trained Robust Architecture Search
Figure 4 for ATRAS: Adversarially Trained Robust Architecture Search
Viaarxiv icon

Functional Protein Structure Annotation Using a Deep Convolutional Generative Adversarial Network

Add code
Apr 18, 2021
Figure 1 for Functional Protein Structure Annotation Using a Deep Convolutional Generative Adversarial Network
Figure 2 for Functional Protein Structure Annotation Using a Deep Convolutional Generative Adversarial Network
Figure 3 for Functional Protein Structure Annotation Using a Deep Convolutional Generative Adversarial Network
Figure 4 for Functional Protein Structure Annotation Using a Deep Convolutional Generative Adversarial Network
Viaarxiv icon

Extreme Volatility Prediction in Stock Market: When GameStop meets Long Short-Term Memory Networks

Add code
Mar 09, 2021
Figure 1 for Extreme Volatility Prediction in Stock Market: When GameStop meets Long Short-Term Memory Networks
Figure 2 for Extreme Volatility Prediction in Stock Market: When GameStop meets Long Short-Term Memory Networks
Figure 3 for Extreme Volatility Prediction in Stock Market: When GameStop meets Long Short-Term Memory Networks
Figure 4 for Extreme Volatility Prediction in Stock Market: When GameStop meets Long Short-Term Memory Networks
Viaarxiv icon

Robust SleepNets

Add code
Feb 24, 2021
Figure 1 for Robust SleepNets
Figure 2 for Robust SleepNets
Figure 3 for Robust SleepNets
Figure 4 for Robust SleepNets
Viaarxiv icon

Evaluating Online and Offline Accuracy Traversal Algorithms for k-Complete Neural Network Architectures

Add code
Jan 16, 2021
Figure 1 for Evaluating Online and Offline Accuracy Traversal Algorithms for k-Complete Neural Network Architectures
Figure 2 for Evaluating Online and Offline Accuracy Traversal Algorithms for k-Complete Neural Network Architectures
Figure 3 for Evaluating Online and Offline Accuracy Traversal Algorithms for k-Complete Neural Network Architectures
Figure 4 for Evaluating Online and Offline Accuracy Traversal Algorithms for k-Complete Neural Network Architectures
Viaarxiv icon

Towards Searching Efficient and Accurate Neural Network Architectures in Binary Classification Problems

Add code
Jan 16, 2021
Figure 1 for Towards Searching Efficient and Accurate Neural Network Architectures in Binary Classification Problems
Figure 2 for Towards Searching Efficient and Accurate Neural Network Architectures in Binary Classification Problems
Figure 3 for Towards Searching Efficient and Accurate Neural Network Architectures in Binary Classification Problems
Figure 4 for Towards Searching Efficient and Accurate Neural Network Architectures in Binary Classification Problems
Viaarxiv icon

Towards Evaluating Driver Fatigue with Robust Deep Learning Models

Add code
Jul 16, 2020
Figure 1 for Towards Evaluating Driver Fatigue with Robust Deep Learning Models
Figure 2 for Towards Evaluating Driver Fatigue with Robust Deep Learning Models
Figure 3 for Towards Evaluating Driver Fatigue with Robust Deep Learning Models
Figure 4 for Towards Evaluating Driver Fatigue with Robust Deep Learning Models
Viaarxiv icon

Adversarial Attacks against Neural Networks in Audio Domain: Exploiting Principal Components

Add code
Jul 14, 2020
Figure 1 for Adversarial Attacks against Neural Networks in Audio Domain: Exploiting Principal Components
Figure 2 for Adversarial Attacks against Neural Networks in Audio Domain: Exploiting Principal Components
Figure 3 for Adversarial Attacks against Neural Networks in Audio Domain: Exploiting Principal Components
Figure 4 for Adversarial Attacks against Neural Networks in Audio Domain: Exploiting Principal Components
Viaarxiv icon

Towards Evaluating Gaussian Blurring in Perceptual Hashing as a Facial Image Filter

Add code
Feb 01, 2020
Figure 1 for Towards Evaluating Gaussian Blurring in Perceptual Hashing as a Facial Image Filter
Figure 2 for Towards Evaluating Gaussian Blurring in Perceptual Hashing as a Facial Image Filter
Figure 3 for Towards Evaluating Gaussian Blurring in Perceptual Hashing as a Facial Image Filter
Figure 4 for Towards Evaluating Gaussian Blurring in Perceptual Hashing as a Facial Image Filter
Viaarxiv icon

Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain

Add code
Jan 30, 2020
Figure 1 for Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain
Figure 2 for Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain
Figure 3 for Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain
Figure 4 for Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain
Viaarxiv icon