Intriguing generalization and simplicity of adversarially trained neural networks. (arXiv:2006.09373v1 [cs.CV]) http://arxiv.org/abs/2006.09373
Density Deconvolution with Normalizing Flows. (arXiv:2006.09396v1 [stat.ML]) http://arxiv.org/abs/2006.09396
Digit Stability Inference for Iterative Methods Using Redundant Number Representation. (arXiv:2006.09427v1 [math.NA]) http://arxiv.org/abs/2006.09427
Response by the Montreal AI Ethics Institute to the European Commission's Whitepaper on AI. (arXiv:2006.09428v1 [cs.CY]) http://arxiv.org/abs/2006.09428
Wasserstein Embedding for Graph Learning. (arXiv:2006.09430v1 [cs.LG]) http://arxiv.org/abs/2006.09430
The Role of Verb Semantics in Hungarian Verb-Object Order. (arXiv:2006.09432v1 [cs.CL]) http://arxiv.org/abs/2006.09432
Preserving spectral properties of structured matrices under structured perturbations. (arXiv:2006.09434v1 [math.NA]) http://arxiv.org/abs/2006.09434
SAMBA: Safe Model-Based & Active Reinforcement Learning. (arXiv:2006.09436v1 [cs.LG]) http://arxiv.org/abs/2006.09436
A Study of Compositional Generalization in Neural Models. (arXiv:2006.09437v1 [cs.LG]) http://arxiv.org/abs/2006.09437
Off-policy Bandits with Deficient Support. (arXiv:2006.09438v1 [cs.LG]) http://arxiv.org/abs/2006.09438
Towards practical differentially private causal graph discovery. (arXiv:2006.08598v1 [cs.CR]) http://arxiv.org/abs/2006.08598
"Notic My Speech" -- Blending Speech Patterns With Multimedia. (arXiv:2006.08599v1 [cs.CL]) http://arxiv.org/abs/2006.08599
Temporal Phenotyping using Deep Predictive Clustering of Disease Progression. (arXiv:2006.08600v1 [physics.med-ph]) http://arxiv.org/abs/2006.08600
Explaining Local, Global, And Higher-Order Interactions In Deep Learning. (arXiv:2006.08601v1 [cs.LG]) http://arxiv.org/abs/2006.08601
Targeted Adversarial Perturbations for Monocular Depth Prediction. (arXiv:2006.08602v1 [cs.CV]) http://arxiv.org/abs/2006.08602
Vulnerability Coverage for Secure Configuration. (arXiv:2006.08604v1 [cs.CR]) http://arxiv.org/abs/2006.08604
Detection of Coincidentally Correct Test Cases through Random Forests. (arXiv:2006.08605v1 [cs.SE]) http://arxiv.org/abs/2006.08605
Vulnerability Coverage as an Adequacy Testing Criterion. (arXiv:2006.08606v1 [cs.SE]) http://arxiv.org/abs/2006.08606
Self-Supervised Domain Mismatch Estimation for Autonomous Perception. (arXiv:2006.08613v1 [cs.CV]) http://arxiv.org/abs/2006.08613
Learning to map source code to software vulnerability using code-as-a-graph. (arXiv:2006.08614v1 [cs.SE]) http://arxiv.org/abs/2006.08614
I toot the arXiv feed for topics in Computer Science.
#ComputerScience #CS #Programming #SoftwareEngineering #Software #SoftwareDevelopment #Computers #Science #arXiv #News #PeerReview