goldblum / TruthOrBackpropagandaLinks
An empirical investigation of deep learning theory
☆16Updated 6 years ago
Alternatives and similar repositories for TruthOrBackpropaganda
Users that are interested in TruthOrBackpropaganda are comparing it to the libraries listed below
Sorting:
- Public Codebase for Rethinking Parameter Counting: Effective Dimensionality Revisited☆37Updated 3 years ago
- Geometric Certifications of Neural Nets☆42Updated 3 years ago
- Limitations of the Empirical Fisher Approximation☆49Updated 9 months ago
- Monotone operator equilibrium networks☆54Updated 5 years ago
- Computing the eigenvalues of Neural Tangent Kernel and Conjugate Kernel (aka NNGP kernel) over the boolean cube☆47Updated 6 years ago
- A fast and efficient way to compute a differentiable bound on the singular values of convolution layers☆12Updated 6 years ago
- Code for Unbiased Implicit Variational Inference (UIVI)☆15Updated 6 years ago
- The Full Spectrum of Deepnet Hessians at Scale: Dynamics with SGD Training and Sample Size☆19Updated 6 years ago
- ☆54Updated last year
- Learning perturbation sets for robust machine learning☆65Updated 4 years ago
- Codebase for Learning Invariances in Neural Networks☆96Updated 3 years ago
- Implementation of the models and datasets used in "An Information-theoretic Approach to Distribution Shifts"☆25Updated 4 years ago
- Experiments for Meta-Learning Symmetries by Reparameterization☆58Updated 4 years ago
- code for "Semi-Discrete Normalizing Flows through Differentiable Tessellation"☆27Updated 3 years ago
- ☆21Updated 5 years ago
- Implementation of Methods Proposed in Preventing Gradient Attenuation in Lipschitz Constrained Convolutional Networks (NeurIPS 2019)☆36Updated 5 years ago
- ☆37Updated 3 years ago
- Fine-grained ImageNet annotations☆30Updated 5 years ago
- Randomized Smoothing of All Shapes and Sizes (ICML 2020).☆51Updated 5 years ago
- ☆56Updated 5 years ago
- TensorFlow implementation of "noisy K-FAC" and "noisy EK-FAC".☆60Updated 6 years ago
- A powerful white-box adversarial attack that exploits knowledge about the geometry of neural networks to find minimal adversarial perturb…☆12Updated 5 years ago
- ☆50Updated 5 years ago
- ☆37Updated 2 years ago
- Hessian trace estimation using PyTorch and Hutch++☆20Updated 5 years ago
- CHOP: An optimization library based on PyTorch, with applications to adversarial examples and structured neural network training.☆78Updated last year
- Implementation of Information Dropout☆39Updated 8 years ago
- Contains code for the NeurIPS 2020 paper by Pan et al., "Continual Deep Learning by FunctionalRegularisation of Memorable Past"☆44Updated 5 years ago
- ☆30Updated 5 years ago
- Distributional and Outlier Robust Optimization (ICML 2021)☆28Updated 4 years ago