Skip to main content

Showing 1–3 of 3 results for author: Eyono, R H

.
  1. arXiv:2111.03555  [pdf, other

    cs.LG

    AUTOKD: Automatic Knowledge Distillation Into A Student Architecture Family

    Authors: Roy Henha Eyono, Fabio Maria Carlucci, Pedro M Esperança, Binxin Ru, Phillip Torr

    Abstract: State-of-the-art results in deep learning have been improving steadily, in good part due to the use of larger models. However, widespread use is constrained by device hardware limitations, resulting in a substantial performance gap between state-of-the-art models and those that can be effectively deployed on small devices. While Knowledge Distillation (KD) theoretically enables small student model… ▽ More

    Submitted 5 November, 2021; originally announced November 2021.

    Comments: 12 pages, 8 figures

  2. arXiv:2105.05382  [pdf

    q-bio.NC cs.AI

    Current State and Future Directions for Learning in Biological Recurrent Neural Networks: A Perspective Piece

    Authors: Luke Y. Prince, Roy Henha Eyono, Ellen Boven, Arna Ghosh, Joe Pemberton, Franz Scherr, Claudia Clopath, Rui Ponte Costa, Wolfgang Maass, Blake A. Richards, Cristina Savin, Katharina Anna Wilmes

    Abstract: We provide a brief review of the common assumptions about biological learning with findings from experimental neuroscience and contrast them with the efficiency of gradient-based learning in recurrent neural networks. The key issues discussed in this review include: synaptic plasticity, neural circuits, theory-experiment divide, and objective functions. We conclude with recommendations for both th… ▽ More

    Submitted 5 January, 2022; v1 submitted 11 May, 2021; originally announced May 2021.

  3. arXiv:1801.02332  [pdf

    cs.CR

    Behavioural Analytics: Beyond Risk-based MFA

    Authors: Roy Henha Eyono

    Abstract: This paper investigates how to effectively stop an attacker from using compromised user credentials to gain authorized entry to systems that they are otherwise not authorised to access. The proposed solution extends previous work to move beyond a risk-based multi-factor authentication system. It adds a behavioural analytics component that uses keystroke dynamics to grant or deny users access. Give… ▽ More

    Submitted 8 January, 2018; originally announced January 2018.