Skip to main content

Showing 1–4 of 4 results for author: Dixon, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2110.07040  [pdf, other

    cs.CV cs.LG

    Data Incubation -- Synthesizing Missing Data for Handwriting Recognition

    Authors: Jen-Hao Rick Chang, Martin Bresler, Youssouf Chherawala, Adrien Delaye, Thomas Deselaers, Ryan Dixon, Oncel Tuzel

    Abstract: In this paper, we demonstrate how a generative model can be used to build a better recognizer through the control of content and style. We are building an online handwriting recognizer from a modest amount of training samples. By training our controllable handwriting synthesizer on the same data, we can synthesize handwriting with previously underrepresented content (e.g., URLs and email addresses… ▽ More

    Submitted 13 October, 2021; originally announced October 2021.

  2. Embedded Large-Scale Handwritten Chinese Character Recognition

    Authors: Youssouf Chherawala, Hans J. G. A. Dolfing, Ryan S. Dixon, Jerome R. Bellegarda

    Abstract: As handwriting input becomes more prevalent, the large symbol inventory required to support Chinese handwriting recognition poses unique challenges. This paper describes how the Apple deep learning recognition system can accurately handle up to 30,000 Chinese characters while running in real-time across a range of mobile devices. To achieve acceptable accuracy, we paid particular attention to data… ▽ More

    Submitted 13 April, 2020; originally announced April 2020.

    Comments: 5 pages, 7 figures

  3. arXiv:1712.07671  [pdf, other

    cs.CR

    Tracking Cyber Adversaries with Adaptive Indicators of Compromise

    Authors: Justin E. Doak, Joe B. Ingram, Sam A. Mulder, John H. Naegle, Jonathan A. Cox, James B. Aimone, Kevin R. Dixon, Conrad D. James, David R. Follett

    Abstract: A forensics investigation after a breach often uncovers network and host indicators of compromise (IOCs) that can be deployed to sensors to allow early detection of the adversary in the future. Over time, the adversary will change tactics, techniques, and procedures (TTPs), which will also change the data generated. If the IOCs are not kept up-to-date with the adversary's new TTPs, the adversary w… ▽ More

    Submitted 20 December, 2017; originally announced December 2017.

    Comments: This was presented at the 4th Annual Conf. on Computational Science & Computational Intelligence (CSCI'17) held Dec 14-16, 2017 in Las Vegas, Nevada, USA

    Report number: SAND2017-12402 C

    Journal ref: This will be in the proceedings of the 4th Annual Conf. on Computational Science & Computational Intelligence (CSCI'17) held Dec 14-16, 2017 in Las Vegas, Nevada, USA

  4. arXiv:1103.2068  [pdf, other

    cs.LG cs.DC stat.ML

    COMET: A Recipe for Learning and Using Large Ensembles on Massive Data

    Authors: Justin D. Basilico, M. Arthur Munson, Tamara G. Kolda, Kevin R. Dixon, W. Philip Kegelmeyer

    Abstract: COMET is a single-pass MapReduce algorithm for learning on large-scale data. It builds multiple random forest ensembles on distributed blocks of data and merges them into a mega-ensemble. This approach is appropriate when learning from massive-scale data that is too large to fit on a single machine. To get the best accuracy, IVoting should be used instead of bagging to generate the training subset… ▽ More

    Submitted 8 September, 2011; v1 submitted 10 March, 2011; originally announced March 2011.

    ACM Class: I.5; I.2.6; H.2.8

    Journal ref: ICDM 2011: Proceedings of the 2011 IEEE International Conference on Data Mining, pp. 41-50, 2011