Skip to main content

Showing 1–4 of 4 results for author: Jaeckle, F

.
  1. arXiv:2308.13304  [pdf, other

    eess.IV cs.CV cs.LG q-bio.QM

    Rapid Artefact Removal and H&E-Stained Tissue Segmentation

    Authors: B. A. Schreiber, J. Denholm, F. Jaeckle, M. J. Arends, K. M. Branson, C. -B. Schönlieb, E. J. Soilleux

    Abstract: We present an innovative method for rapidly segmenting hematoxylin and eosin (H&E)-stained tissue in whole-slide images (WSIs) that eliminates a wide range of undesirable artefacts such as pen marks and scanning artefacts. Our method involves taking a single-channel representation of a lowmagnification RGB overview of the WSI in which the pixel values are bimodally distributed such that H&E-staine… ▽ More

    Submitted 19 December, 2023; v1 submitted 25 August, 2023; originally announced August 2023.

    Comments: 7 pages, 3 figures

  2. arXiv:2303.04766  [pdf, other

    cs.CV cs.IR cs.LG

    FastFill: Efficient Compatible Model Update

    Authors: Florian Jaeckle, Fartash Faghri, Ali Farhadi, Oncel Tuzel, Hadi Pouransari

    Abstract: In many retrieval systems the original high dimensional data (e.g., images) is mapped to a lower dimensional feature through a learned embedding model. The task of retrieving the most similar data from a gallery set to a given query data is performed through a similarity comparison on features. When the embedding model is updated, it might produce features that are not comparable/compatible with f… ▽ More

    Submitted 8 March, 2023; originally announced March 2023.

    Comments: To appear in The Eleventh International Conference on Learning Representations

  3. arXiv:2107.12855  [pdf, other

    cs.LG cs.AI

    Neural Network Branch-and-Bound for Neural Network Verification

    Authors: Florian Jaeckle, **gyue Lu, M. Pawan Kumar

    Abstract: Many available formal verification methods have been shown to be instances of a unified Branch-and-Bound (BaB) formulation. We propose a novel machine learning framework that can be used for designing an effective branching strategy as well as for computing better lower bounds. Specifically, we learn two graph neural networks (GNN) that both directly treat the network we want to verify as a graph… ▽ More

    Submitted 27 July, 2021; originally announced July 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:1912.01329

  4. arXiv:2105.14644  [pdf, other

    cs.LG cs.CR

    Generating Adversarial Examples with Graph Neural Networks

    Authors: Florian Jaeckle, M. Pawan Kumar

    Abstract: Recent years have witnessed the deployment of adversarial attacks to evaluate the robustness of Neural Networks. Past work in this field has relied on traditional optimization algorithms that ignore the inherent structure of the problem and data, or generative methods that rely purely on learning and often fail to generate adversarial examples where they are hard to find. To alleviate these defici… ▽ More

    Submitted 30 May, 2021; originally announced May 2021.

    Comments: To be published in UAI 2021