no code implementations • 3 Jun 2024 • Brian Lee, Nikolai Matni
We study the performance of risk-controlling prediction sets (RCPS), an empirical risk minimization-based formulation of conformal prediction, with a single trajectory of temporally correlated data from an unknown stochastic dynamical system.
no code implementations • 19 Feb 2024 • Jeffrey Lim, Po T. Wang, Wonjoon Sohn, Claudia Serrano-Amenos, Mina Ibrahim, Derrick Lin, Shravan Thaploo, Susan J. Shaw, Michelle Armacost, Hui Gong, Brian Lee, Darrin Lee, Richard A. Andersen, Payam Heydari, Charles Y. Liu, Zoran Nenadic, An H. Do
Current treatments for paraplegia induced by spinal cord injury (SCI) are often limited by the severity of the injury.
no code implementations • 7 Nov 2022 • Andrey Ignatov, Radu Timofte, Jin Zhang, Feng Zhang, Gaocheng Yu, Zhe Ma, Hongbin Wang, Minsu Kwon, Haotian Qian, Wentao Tong, Pan Mu, Ziping Wang, Guangjing Yan, Brian Lee, Lei Fei, Huaijin Chen, Hyebin Cho, Byeongjun Kwon, Munchurl Kim, Mingyang Qian, Huixin Ma, Yanan Li, Xiaotao Wang, Lei Lei
In this Mobile AI challenge, the target was to develop an efficient end-to-end AI-based bokeh effect rendering approach that can run on modern smartphone GPUs using TensorFlow Lite.
no code implementations • 25 Aug 2022 • Brian Lee, Fei Lei, Huaijin Chen, Alexis Baudron
We thus propose a network-based approach that is capable of rendering realistic monocular bokeh from single image inputs.
no code implementations • 24 Apr 2021 • Syed Sahil Abbas Zaidi, Mohammad Samar Ansari, Asra Aslam, Nadia Kanwal, Mamoona Asghar, Brian Lee
Concise overview of benchmark datasets and evaluation metrics used in detection is also provided along with some of the prominent backbone architectures used in recognition tasks.
1 code implementation • 13 Jan 2021 • Brian Lee, Brandi Dupervil, Nicholas P. Deputy, Wil Duck, Stephen Soroka, Lyndsay Bottichio, Benjamin Silk, Jason Price, Patricia Sweeney, Jennifer Fuld, Todd Weber, Dan Pollock
Practice Implications: Enriched understanding of the available public data, the methods used to create these data, and the algorithms used to protect privacy of de-identified individuals allow for improved data use.
Cryptography and Security Computers and Society
1 code implementation • NeurIPS 2020 • Benjamin Sanchez-Lengeling, Jennifer Wei, Brian Lee, Emily Reif, Peter Wang, Wesley Wei Qian, Kevin McCloskey, Lucy Colwell , Alexander Wiltschko
Interpretability of machine learning models is critical to scientific understanding, AI safety, as well as debugging.
no code implementations • 12 Aug 2020 • Yonghyun Nam, Jae-Seung Yun, Seung Mi Lee, Ji Won Park, Ziqi Chen, Brian Lee, Anurag Verma, Xia Ning, Li Shen, Dokyoon Kim
To reduce trial and error in finding treatments for COVID-19, we propose building a network-based drug repurposing framework to prioritize repurposable drugs.
no code implementations • 23 Dec 2019 • Muhammad Saif-ur-Rehman, Omair Ali, Robin Lienkaemper, Sussane Dyck, Marita Metzler, Yaroslav Parpaley, Joerg Wellmer, Charles Liu, Brian Lee, Spencer Kellis, Richard Andersen, Ioannis Iossifidis, Tobias Glasmachers, Christian Klaes
We proposed a novel spike sorting pipeline, based on a set of supervised and unsupervised learning algorithms.
1 code implementation • NeurIPS 2019 • Benyamin Allahgholizadeh Haghi, Spencer Kellis, Sahil Shah, Maitreyi Ashok, Luke Bashford, Daniel Kramer, Brian Lee, Charles Liu, Richard Andersen, Azita Emami
We feed the predictions of the network back to the input to improve prediction performance and robustness.
1 code implementation • 18 Apr 2019 • Javier Duarte, Philip Harris, Scott Hauck, Burt Holzman, Shih-Chieh Hsu, Sergo Jindariani, Suffian Khan, Benjamin Kreis, Brian Lee, Mia Liu, Vladimir Lončar, Jennifer Ngadiuba, Kevin Pedro, Brandon Perez, Maurizio Pierini, Dylan Rankin, Nhan Tran, Matthew Trahms, Aristeidis Tsaris, Colin Versteeg, Ted W. Way, Dustin Werran, Zhenbin Wu
New heterogeneous computing paradigms on dedicated hardware with increased parallelization, such as Field Programmable Gate Arrays (FPGAs), offer exciting solutions with large potential gains.
Data Analysis, Statistics and Probability High Energy Physics - Experiment Computational Physics Instrumentation and Detectors
no code implementations • 26 Oct 2017 • Brian Lee, Roman Vanickis, Franklin Rogelio, Paul Jacob
As the computing landscape evolves towards distributed architectures such as Internet of Things (IoT), enterprises are moving away from traditional perimeter based security models toward so called zero trust networking (ZTN) models that treat both the intranet and Internet as equally untrustworthy.
Cryptography and Security