Do very high accuracies of deep networks suggest pride of effective AI or are
deep networks prejudiced? Do they suffer from in-group biases (own-race-bias
and own-age-bias), and mimic the human behavi
We consider training models with differential privacy (dp) using mini-batch gradients.
The existing state-of-the-art, differentially private stochasticgradient descent (dp-sgd) requires privacy amplification by sampling or shuffling to obtain the best privacy/accuracy/computation trade-offs.
Deep learning (DL) techniques are on the rise in the software engineering
research community. More and more approaches have been developed on top of DL
models, also due to the unprecedented amount of
Most classifiers operate by selecting the maximum of an estimate of the
conditional distribution $p(y|x)$ where $x$ stands for the features of the
instance to be classified and $y$ denotes its label.
How does a 110-layer ResNet learn a high-complexity classifier using
relatively few training examples and short training time? We present a theory
towards explaining this in terms of hierarchical lear
We empirically evaluate common assumptions about neural networks that are
widely held by practitioners and theorists alike. In this work, we: (1) prove
the widespread existence of suboptimal local min
This paper investigates the problem of forecasting multivariate aggregated human mobility while preserving the privacy of the individuals concerned.
Differentially privacy, a state-of-the-art formal notion, has been used as the privacy guarantee in two different and independent steps when training deeplearning models.
Detecting Graphical User Interface (GUI) elements in GUI images is a
domain-specific object detection task. It supports many software engineering
tasks, such as GUI animation and testing, GUI search a
We present a neural network based calibration method that performs the
calibration task within a few milliseconds for the full implied volatility
surface. The framework is consistently applicable thro
Advance in deep learning algorithms overshadows their security risk in
software implementations. This paper discloses a set of vulnerabilities in
popular deep learning frameworks including Caffe, Tens
Neural networks have a reputation for being better at solving statistical or
approximate problems than at performing calculations or working with symbolic
data. In this paper, we show that they can be
We propose a paradigm to deep-learn the ever-expanding databases which have
emerged in mathematical physics and particle phenomenology, as diverse as the
statistics of string vacua or combinatorial an
In this paper i have come up with a novel approach to replicate the portrait mode from dslr using any smartphone to generate high quality portrait images.
A portrait is a painting, drawing, photograph, or engraving of a person, especially one depicting only the face or head and shoulders.
Over the past few years, deep learning has risen to the foreground as a topic
of massive interest, mainly as a result of successes obtained in solving
large-scale image processing tasks. There are mul
The medical field is creating large amount of data that physicians are unable
to decipher and use efficiently. Moreover, rule-based expert systems are
inefficient in solving complicated medical tasks
Signal processing, communications, and control have traditionally relied on
classical statistical modeling techniques. Such model-based methods utilize
mathematical formulations that represent the und
Prior studies have unveiled the vulnerability of the deep neural networks in the context of adversarial machine learning, leading to great recent attention into this area. One interesting question tha
Recent approximations to backpropagation (BP) have mitigated many of BP's
computational inefficiencies and incompatibilities with biology, but important
limitations still remain. Moreover, the approxi
It is difficult for humans to distinguish the true and false of rumors, but
current deep learning models can surpass humans and achieve excellent accuracy
on many rumor datasets. In this paper, we inv
In recent years, there has been an increasing interest in exploiting
logically specified background knowledge in order to obtain neural models (i)
with a better performance, (ii) able to learn from le