
FONDUE: A Framework for Node Disambiguation Using Network Embeddings
Realworld data often presents itself in the form of a network. Examples...
read it

Perturbation Analysis of Gradientbased Adversarial Attacks
After the discovery of adversarial examples and their adverse effects on...
read it

FACE: Feasible and Actionable Counterfactual Explanations
Work in Counterfactual Explanations tends to focus on the principle of "...
read it

Costefficient segmentation of electron microscopy images using active learning
Over the last decade, electron microscopy has improved up to a point tha...
read it

How the Softmax Output is Misleading for Evaluating the Strength of Adversarial Examples
Even before deep learning architectures became the de facto models for c...
read it

Deep Active Inference for Autonomous Robot Navigation
Active inference is a theory that underpins the way biological agent's p...
read it

Not All Adversarial Examples Require a Complex Defense: Identifying Overoptimized Adversarial Examples with IQRbased Logit Thresholding
Detecting adversarial examples currently stands as one of the biggest ch...
read it

CSNE: Conditional Signed Network Embedding
Signed networks are mathematical structures that encode positive and neg...
read it

ALPINE: Active Link Prediction using Network Embedding
Many realworld problems can be formalized as predicting links in a part...
read it

Transfer Learning with Binary Neural Networks
Previous work has shown that it is possible to train deep neural network...
read it

GPflowOpt: A Bayesian Optimization Library using TensorFlow
A novel Python framework for Bayesian optimization known as GPflowOpt is...
read it

Interactive Visual Data Exploration with Subjective Feedback: An InformationTheoretic Approach
Visual exploration of highdimensional realvalued datasets is a fundame...
read it

Subjectively Interesting Subgroup Discovery on Realvalued Targets
Deriving insights from highdimensional data is one of the core problems...
read it

Positive blood culture detection in time series data using a BiLSTM network
The presence of bacteria or fungi in the bloodstream of patients is abno...
read it

A Differentiable Physics Engine for Deep Learning in Robotics
One of the most important fields in robotics is the optimization of cont...
read it

Lexicographic choice functions
We investigate a generalisation of the coherent choice functions conside...
read it

Integrated Inference and Learning of Neural Factors in Structural Support Vector Machines
Tackling pattern recognition problems in areas such as computer vision, ...
read it

GENESIM: genetic extraction of a single, interpretable model
Models obtained by decision tree induction techniques excel in being int...
read it

Fast Calculation of the Knowledge Gradient for Optimization of Deterministic Engineering Simulations
A novel efficient method for computing the KnowledgeGradient policy for...
read it

Fast Faceswap Using Convolutional Neural Networks
We consider the problem of face swapping in images, where an input ident...
read it

Characterizing and Extending Answer Set Semantics using Possibility Theory
Answer Set Programming (ASP) is a popular framework for modeling combina...
read it

Modeling Stable Matching Problems with Answer Set Programming
The Stable Marriage Problem (SMP) is a wellknown matching problem first...
read it

Credal nets under epistemic irrelevance
We present a new approach to credal nets, which are graphical models tha...
read it

Search Combinators
The ability to model search in a constraint solver can be an essential a...
read it

Improved texture image classification through the use of a corrosioninspired cellular automaton
In this paper, the problem of classifying synthetic and natural texture ...
read it

Pattern Encoding on the Poincare Sphere
This paper presents a convenient graphical tool for encoding visual patt...
read it

On the stability of bootstrap estimators
It is shown that bootstrap approximations of an estimator which is based...
read it

Imprecise probability trees: Bridging two theories of imprecise probability
We give an overview of two approaches to probability theory where lower ...
read it

Realtime animation of human characters with fuzzy controllers
The production of animation is a resource intensive process in game comp...
read it

Assessing the Stylistic Properties of Neurally Generated Text in Authorship Attribution
Recent applications of neural language models have led to an increased i...
read it

Break it Down for Me: A Study in Automated Lyric Annotation
Comprehending lyrics, as found in songs and poems, can pose a challenge ...
read it

Representation learning for very short texts using weighted word embedding aggregation
Short text messages such as tweets are very noisy and sparse in their us...
read it

Learning Semantic Similarity for Very Short Texts
Levering data on social media, such as Twitter and Facebook, requires in...
read it

Endtoend Learning from Spectrum Data: A Deep Learning approach for Wireless Signal Identification in Spectrum Monitoring applications
This paper presents endtoend learning from spectrum data  an umbrella...
read it

Smallest snarks with oddness 4 and cyclic connectivity 4 have order 44
The family of snarks  connected bridgeless cubic graphs that cannot be...
read it

Structural and computational results on platypus graphs
A platypus graph is a nonhamiltonian graph for which every vertexdelet...
read it

Bounding the convergence time of local probabilistic evolution
Isoperimetric inequalities form a very intuitive yet powerful characteri...
read it

Sensitivity Analysis of Expensive BlackBox Systems Using Metamodeling
Simulations are becoming ever more common as a tool for designing comple...
read it

On the smallest snarks with oddness 4 and connectivity 2
A snark is a bridgeless cubic graph which is not 3edgecolourable. The ...
read it

Generation and properties of nut graphs
A nut graph is a graph on at least 2 vertices whose adjacency matrix has...
read it

Instrumental variables estimation with competing risk data
Timetoevent analyses are often plagued by both  possibly unmeasured ...
read it

A Generative Deep Recurrent Model for Exchangeable Data
We present a novel model architecture which leverages deep learning tool...
read it

Optimal subspace codes in PG(4,q)
We investigate subspace codes whose codewords are subspaces of PG(4,q) ...
read it

A general measure of the impact of priors in Bayesian statistics via Stein's Method
We propose a measure of the impact of any two choices of prior distribut...
read it

A Comparative Study of Pairwise Learning Methods based on Kernel Ridge Regression
Many machine learning problems can be formulated as predicting labels fo...
read it

Randomization inference with general interference and censoring
Interference occurs between individuals when the treatment (or exposure)...
read it

Bisimulations for intuitionistic temporal logics
We introduce bisimulations for the logic ITL^e with `next', `until' and ...
read it

How robust are Structural Equation Models to model missspecification? A simulation study
Structural Equation Models (SEMs) are routinely used in the analysis of ...
read it

SpeechDriven Facial Reenactment Using Conditional Generative Adversarial Networks
We present a novel approach to generating photorealistic images of a fa...
read it

Highdimensional doubly robust tests for regression parameters
After variable selection, standard inferential procedures for regression...
read it
Ghent University
Ghent University is one of the largest universities in the Dutch language area and presents itself as open, socially engaged and pluralistic.