Search Results for author: Sayar Karmakar

Found 7 papers, 1 papers with code

GARHCX-NoVaS: A Model-free Approach to Incorporate Exogenous Variables

no code implementations25 Aug 2023 Kejin Wu, Sayar Karmakar

In this work, we further explore the forecasting ability of a recently proposed normalizing and variance-stabilizing (NoVaS) transformation after wrapping exogenous variables.

Econometrics

Towards Size-Independent Generalization Bounds for Deep Operator Nets

no code implementations23 May 2022 Pulkit Gopalani, Sayar Karmakar, Dibyakanti Kumar, Anirbit Mukherjee

In recent times machine learning methods have made significant advances in becoming a useful tool for analyzing physical systems.

BIG-bench Machine Learning Generalization Bounds +1

An Empirical Study of the Occurrence of Heavy-Tails in Training a ReLU Gate

no code implementations26 Apr 2022 Sayar Karmakar, Anirbit Mukherjee

while training a $\relu$ gate (in the realizable and in the binary classification setup) and for a variant of S. G. D.

Binary Classification

Long-term prediction intervals with many covariates

no code implementations15 Dec 2020 Sayar Karmakar, Marek Chudy, Wei Biao Wu

After validating our approach using simulations we also propose a novel bootstrap based method that can boost the coverage of the theoretical intervals.

Prediction Intervals Time Series Analysis Methodology Econometrics Statistics Theory Statistics Theory

Provable Training of a ReLU Gate with an Iterative Non-Gradient Algorithm

no code implementations8 May 2020 Sayar Karmakar, Anirbit Mukherjee

In this work, we demonstrate provable guarantees on the training of a single ReLU gate in hitherto unexplored regimes.

Data Poisoning

Depth-2 Neural Networks Under a Data-Poisoning Attack

1 code implementation4 May 2020 Sayar Karmakar, Anirbit Mukherjee, Theodore Papamarkou

In this class of networks, we attempt to learn the network weights in the presence of a malicious oracle doing stochastic, bounded and additive adversarial distortions on the true output during training.

Adversarial Attack Data Poisoning

Cannot find the paper you are looking for? You can Submit a new open access paper.