Building adversarial attacks and defenses on neural networks in PyTorch Computer Science |
- Building adversarial attacks and defenses on neural networks in PyTorch
- Real World User Verification
- Good Resources for learning Formal Languages and Automata Theory (FLAT)?
- Comparisons for insertion sort in reverse
- Python Interview Questions Cheat Sheet
- What are The Best Data Analytics Platforms?
- Are old books okay for studying computer architecture and operating systems?
- Does anyone know if I can apply for the Cyber Corps Scholarship if my institution is not participated?
- How to Create a Machine Learning Model?
- (free browser extension) ML/AI Code Implementation Finder
- Cheat Sheet: Data Visualisation in Python
- What exactly does Application Programming Interface (API) mean?
- It's always said a good computer scientist is someone who is expert on Googling, how to be a better Googler
- [x-post /r/computerscience] question about parallel programming
- [R] Virginia Tech & Facebook Video Completion Algorithm Achieves SOTA Results
- Apple, ARM, and Raspberry Pi
- Basic Research Problem about Database
Building adversarial attacks and defenses on neural networks in PyTorch Posted: 08 Sep 2020 10:02 AM PDT I recently started doing research on adversarial attacks and defenses of neural networks. I thought it would be interesting to share with you one of the earliest yet effective attacks (FGSM) and how to defend it through adversarial training, implemented in PyTorch: [link] [comments] |
Posted: 08 Sep 2020 04:33 PM PDT Hi all, I am researching user real world verification for a project and am trying to get an idea of where to start. I have seen examples including cryptocurrency exchange sites requiring photo ID in order to make trades and software providing student discounts if the user can provide a university email address, but I have been unable to find much theory or research on the subject matter. For example if you have a machine learning forum, I would like to be able to verify a user's level of expertise: industry professional, PhD, etc. Is there a commonly used term for this process of verifying a users real world identity? Is there any research that has been done on best practices? Long term I am also looking to understand ways of verifying user identity with some layer of anonymity. Any suggestions as far as where to start or what some of the common terms are would be greatly appreciated! [link] [comments] |
Good Resources for learning Formal Languages and Automata Theory (FLAT)? Posted: 08 Sep 2020 11:05 PM PDT |
Comparisons for insertion sort in reverse Posted: 09 Sep 2020 04:10 AM PDT How many key comparisons does insertion sort make to sort a list of 20 items if the list is given in reverse order? So if my understanding is right, insertion sort of a list in reverse will take the maximum comparisons (being the worst case), but for this question how can I figure out how many comparisons it would be? If I was given a list I could do it by hand/via code but is there a way to do this without that? [link] [comments] |
Python Interview Questions Cheat Sheet Posted: 09 Sep 2020 03:51 AM PDT |
What are The Best Data Analytics Platforms? Posted: 09 Sep 2020 12:06 AM PDT |
Are old books okay for studying computer architecture and operating systems? Posted: 08 Sep 2020 05:33 AM PDT Hi! I am an university student and I am going to study these subjects, are the 4th edition(1999) of Tanenbaum's Computer Structured Organization and the 6th(2004) of Silberschatz's Operating System good for 2020 or too old? [link] [comments] |
Posted: 08 Sep 2020 11:09 PM PDT |
How to Create a Machine Learning Model? Posted: 08 Sep 2020 09:25 PM PDT |
(free browser extension) ML/AI Code Implementation Finder Posted: 08 Sep 2020 04:58 PM PDT |
Cheat Sheet: Data Visualisation in Python Posted: 08 Sep 2020 08:44 PM PDT |
What exactly does Application Programming Interface (API) mean? Posted: 08 Sep 2020 02:43 PM PDT The more I read up about it, the more confusing I find it. Can anyone explain it please? [link] [comments] |
Posted: 08 Sep 2020 06:15 AM PDT Basically I agree with this but maybe I am missing a key point that I should know. What's your way of Googling? [link] [comments] |
[x-post /r/computerscience] question about parallel programming Posted: 08 Sep 2020 01:02 PM PDT |
[R] Virginia Tech & Facebook Video Completion Algorithm Achieves SOTA Results Posted: 08 Sep 2020 12:55 PM PDT https://i.redd.it/txwne0t4bzl51.gif Researchers from Virginia Tech and Facebook have introduced a novel flow-based video completion algorithm that compares favourably with the state-of-the-art in the field. Here is a quick read: Virginia Tech & Facebook Video Completion Algorithm Achieves SOTA Results The paper Flow-edge Guided Video Completion is on arXiv. Visit the project page here. [link] [comments] |
Posted: 08 Sep 2020 11:40 AM PDT I recently heard from a friend about Apple's switch to ARM64. This raised a few questions, and I did some Google surfing for a bit. Here's the big question that I have... Would it be possible to take an ARM64 Apple iso and put it onto an ARM64 device such as the Raspberry Pi? I assume there will be a few roadblocks in the way, such as the OS being locked to Apple hardware, but I was wondering if anyone had any input beyond that. [link] [comments] |
Basic Research Problem about Database Posted: 08 Sep 2020 06:56 AM PDT This semester, we are asked to have research about anything covered by database. Trying to think about my current knowledge about it, I don't think I have wide options to choose from. Honestly, I don't even know if there are still options for me. I am only introduced to database last semester and because of the pandemic, we barely finished the topic. I know its surface idea and SQL, but that's it. This semester is only good for research proposal, and will be continued on the following semester for its process and publication. So, I am thinking there are still time for me to study about conducting my research problem, but it also has to be aligned on what I somewhat know now. I have more than a week to submit the problem, but I also think I need to study whatever that problem is, so I really have to look for one now. I know the research problem must be of my interest, so I can have fun doing this, but I hope you guys can give me guidance on where or what to look regarding this matter. Thank you. [link] [comments] |
You are subscribed to email updates from Computer Science: Theory and Application. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment