Search Results for author: Vikram Nitin

Found 8 papers, 5 papers with code

HyperGCN: A New Method of Training Graph Convolutional Networks on Hypergraphs

1 code implementation7 Sep 2018 Naganand Yadati, Madhav Nimishakavi, Prateek Yadav, Vikram Nitin, Anand Louis, Partha Talukdar

In many real-world network datasets such as co-authorship, co-citation, email communication, etc., relationships are complex and go beyond pairwise.

HyperGCN: A New Method For Training Graph Convolutional Networks on Hypergraphs

1 code implementation NeurIPS 2019 Naganand Yadati, Madhav Nimishakavi, Prateek Yadav, Vikram Nitin, Anand Louis, Partha Talukdar

In many real-world network datasets such as co-authorship, co-citation, email communication, etc., relationships are complex and go beyond pairwise.

InteractE: Improving Convolution-based Knowledge Graph Embeddings by Increasing Feature Interactions

1 code implementation1 Nov 2019 Shikhar Vashishth, Soumya Sanyal, Vikram Nitin, Nilesh Agrawal, Partha Talukdar

In this paper, we analyze how increasing the number of these interactions affects link prediction performance, and utilize our observations to propose InteractE.

Knowledge Graph Embeddings Knowledge Graphs +1

Multitask Learning Strengthens Adversarial Robustness

1 code implementation ECCV 2020 Chengzhi Mao, Amogh Gupta, Vikram Nitin, Baishakhi Ray, Shuran Song, Junfeng Yang, Carl Vondrick

Although deep networks achieve strong accuracy on a range of computer vision benchmarks, they remain vulnerable to adversarial attacks, where imperceptible input perturbations fool the network.

Adversarial Defense Adversarial Robustness

SGD on Neural Networks learns Robust Features before Non-Robust

no code implementations1 Jan 2021 Vikram Nitin

We present our findings in light of other recent results on the evolution of inductive biases learned by neural networks over the course of training.

DIRECT : A Transformer-based Model for Decompiled Identifier Renaming

no code implementations ACL (NLP4Prog) 2021 Vikram Nitin, Anthony Saieva, Baishakhi Ray, Gail Kaiser

Decompiling binary executables to high-level code is an important step in reverse engineering scenarios, such as malware analysis and legacy code maintenance.

Malware Analysis

Cannot find the paper you are looking for? You can Submit a new open access paper.