-
## 論文リンク
https://www.aclweb.org/anthology/P19-1425/
## 公開日(yyyy/mm/dd)
2019/07
## 概要
encoder への入力と decode への入力の両方で adversarial training を適用して機械翻訳の性能を高めたという論文。
単語置き換えをベースに adversarial trainin…
-
This seems like a very important finding mentioned in your [blog](https://huggingface.co/blog/leaderboard-decodingtrust) and something deserving of further exposition.
Submitting your paper to Gemi…
-
https://devblogs.nvidia.com/parallelforall/photo-editing-generative-adversarial-networks-2/
基于nvidia-digits的实现
https://github.com/gheinrich/DIGITS-GAN/blob/DIGITS-GAN-v0.1/examples/gan/README.md
-
Using the data provided, it is not possible to compare the efficacy of different attacks across models. Imagine we would like to decide whether LLC or ILLC was the stronger attack on the CIFAR-10 data…
-
It is a basic observation that when given strictly more power, the adversary should never do worse. However, in Table VII the paper reports that MNIST adversarial examples with their l_infinity norm c…
-
## 0. 論文
[Attacking Visual Language Grounding with Adversarial Examples: A Case Study on Neural Image Captioning](https://arxiv.org/abs/1712.02051v2)
Hongge Chen, Huan Zhang, Pin-Yu Chen, Jinfeng Yi…
-
@cgreene suggested that we improve our adversarial training definition in the [imaging applications](https://greenelab.github.io/deep-review/#imaging-applications-in-healthcare) section. See Ian Good…
-
Since the current documentation lacks some important details for users and might make using foolbox harder than it has to be, we should improve this.
Let us collect suggestions for what to improve by…
-
Hi,
I want to say I'm still a beginner to all things machine learning, so I may need some things to be dumbed down.
I am trying to simply recreate your code in Google Colaboratory using Python 3…
-
Just as a quick link list, here is a list of ICLR Submissions using the keyword "Domain Adaptation". I guess waiting for the reviews makes sense before including them in the reading list.
# Unsup…