Hamilton Scott Clouse
YOU?
Author Swipe
View article: The Safe Trusted Autonomy for Responsible Space Program
The Safe Trusted Autonomy for Responsible Space Program Open
The Safe Trusted Autonomy for Responsible Space (STARS) program aims to advance autonomy technologies for space by leveraging machine learning technologies while mitigating barriers to trust, such as uncertainty, opaqueness, brittleness, a…
View article: Static Seeding and Clustering of LSTM Embeddings to Learn From Loosely Time-Decoupled Events
Static Seeding and Clustering of LSTM Embeddings to Learn From Loosely Time-Decoupled Events Open
Humans learn from the occurrence of events at different places and times to predict similar trajectories of events. We define loosely decoupled time (LDT) phenomena as two or more events that could occur in different places and across diff…
View article: Static Seeding and Clustering of LSTM Embeddings to Learn from Loosely Time-Decoupled Events
Static Seeding and Clustering of LSTM Embeddings to Learn from Loosely Time-Decoupled Events Open
Humans learn from the occurrence of events in a different place and time to predict similar trajectories of events. We define Loosely Decoupled Timeseries (LDT) phenomena as two or more events that could happen in different places and acro…
View article: Disentangling Categorization in Multi-agent Emergent Communication
Disentangling Categorization in Multi-agent Emergent Communication Open
The emergence of language between artificial agents is a recent focus of computational linguistics, as it offers a synthetic substrate for reasoning about human language evolution. From the perspective of cognitive science, sophisticated c…
View article: Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples
Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples Open
Designing deep networks robust to adversarial examples remains an open problem. Likewise, recent zeroth order hard-label attacks on image classification models have shown comparable performance to their first-order, gradient-level alternat…
View article: Intrusion Detection and Ubiquitous Host to Host Encryption
Intrusion Detection and Ubiquitous Host to Host Encryption Open
Growing concern for individual privacy, driven by an increased public awareness of the degree to which many of our electronic activities are tracked by interested third parties (e.g. Google knows what I am thinking before I finish entering…