Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Josh Kalin"'
Autor:
Josh Kalin
Simplify next-generation deep learning by implementing powerful generative models using Python, TensorFlow and KerasKey FeaturesUnderstand the common architecture of different types of GANsTrain, optimize, and deploy GAN applications using TensorFlow
Publikováno v:
AIAA AVIATION 2021 FORUM.
Publikováno v:
Computer Science & Information Technology (CS & IT).
Machine learning models present a risk of adversarial attack when deployed in production. Quantifying the contributing factors and uncertainties using empirical measures could assist the industry with assessing the risk of downloading and deploying c
Image classification is a common step in image recognition for machine learning in overhead applications. When applying popular model architectures like MobileNetV2, known vulnerabilities expose the model to counter-attacks, either mislabeling a know
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fd5593213e145c9736111a09c74817d6
http://arxiv.org/abs/2103.15897
http://arxiv.org/abs/2103.15897
Taking advantage of computationally lightweight, but high-quality translators prompt consideration of new applications that address neglected languages. For projects with protected or personal data, translators for less popular or low-resource langua
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1ae2700bdcc7ea6cc0b7435b8f1ba797
http://arxiv.org/abs/2101.01628
http://arxiv.org/abs/2101.01628
Publikováno v:
AI4I
This work applies natural language modeling to generate plausible strategic moves in the ancient game of Go. We train the Generative Pretrained Transformer (GPT-2) to mimic the style of Go champions as archived in Smart Game Format (SGF), which offer
Publikováno v:
Computer Science & Information Technology.
This work proposes a structured approach to baselining a model, identifying attack vectors, and securing the machine learning models after deployment. This method for securing each model post deployment is called the BAD (Build, Attack, and Defend) A
Publikováno v:
Automatic Target Recognition XXX.
Single Image Super Resolution (SISR) is the process of mapping a low-resolution image to a high resolution image. This inherently has applications in remote sensing as a way to increase the spatial resolution in satellite imagery. This suggests a pos