Facebook Recruiting IV
The ‘Facebook Recruiting IV: Human or bot?’ competition just ended on Kaggle. For those unfamiliar with the competition, participants downloaded a table of a...
The ‘Facebook Recruiting IV: Human or bot?’ competition just ended on Kaggle. For those unfamiliar with the competition, participants downloaded a table of a...
The ‘Facebook Recruiting IV: Human or bot?’ competition just ended on Kaggle. For those unfamiliar with the competition, participants downloaded a table of a...
An overview of semi-supervised learning and other techniques I applied to a recent Kaggle competition.
This post is a brief update to my previous post about using a neural network to detect the beats per minute (BPM) in short sections of audio.
I have always wondered whether it would be possible to detect the tempo (or beats per minute, or BPM) of a piece of music using a neural network-based approa...
This is the first post in the In Raw Numpy series. This series is an attempt to provide readers (and myself) with an understanding of some of the most freque...
Tensorboard’s embeddings visualiser is great. You can use it to visualise and explore any set of high dimensional vectors (say, the activations of a hidden l...
This is the first post in the In Raw Numpy series. This series is an attempt to provide readers (and myself) with an understanding of some of the most freque...
An overview of semi-supervised learning and other techniques I applied to a recent Kaggle competition.
The ‘Facebook Recruiting IV: Human or bot?’ competition just ended on Kaggle. For those unfamiliar with the competition, participants downloaded a table of a...
An overview of semi-supervised learning and other techniques I applied to a recent Kaggle competition.
Using a GAN and a ConvLSTM to go from minimap from to champion coordinates: This post was originally published on Medium.
Tensorboard’s embeddings visualiser is great. You can use it to visualise and explore any set of high dimensional vectors (say, the activations of a hidden l...
Last week I read Abadi and Andersen’s recent paper [1], Learning to Protect Communications with Adversarial Neural Cryptography. I thought the idea seemed pr...
This post is a brief update to my previous post about using a neural network to detect the beats per minute (BPM) in short sections of audio.
I have always wondered whether it would be possible to detect the tempo (or beats per minute, or BPM) of a piece of music using a neural network-based approa...
This is the first post in the In Raw Numpy series. This series is an attempt to provide readers (and myself) with an understanding of some of the most freque...
Using a GAN and a ConvLSTM to go from minimap from to champion coordinates: This post was originally published on Medium.
Using a GAN and a ConvLSTM to go from minimap from to champion coordinates: This post was originally published on Medium.
This is the first post in the In Raw Numpy series. This series is an attempt to provide readers (and myself) with an understanding of some of the most freque...
Tensorboard’s embeddings visualiser is great. You can use it to visualise and explore any set of high dimensional vectors (say, the activations of a hidden l...
Last week I read Abadi and Andersen’s recent paper [1], Learning to Protect Communications with Adversarial Neural Cryptography. I thought the idea seemed pr...
This post is a brief update to my previous post about using a neural network to detect the beats per minute (BPM) in short sections of audio.
I have always wondered whether it would be possible to detect the tempo (or beats per minute, or BPM) of a piece of music using a neural network-based approa...
An overview of semi-supervised learning and other techniques I applied to a recent Kaggle competition.
This is the first post in the In Raw Numpy series. This series is an attempt to provide readers (and myself) with an understanding of some of the most freque...
Tensorboard’s embeddings visualiser is great. You can use it to visualise and explore any set of high dimensional vectors (say, the activations of a hidden l...
Last week I read Abadi and Andersen’s recent paper [1], Learning to Protect Communications with Adversarial Neural Cryptography. I thought the idea seemed pr...