Thomas TANAY
Thomas TANAY
Verified email at ucl.ac.uk
Title
Cited by
Cited by
Year
A boundary tilting persepective on the phenomenon of adversarial examples
T Tanay, L Griffin
arXiv preprint arXiv:1608.07690, 2016
1622016
Transfer representation-learning for anomaly detection
J Andrews, T Tanay, EJ Morton, LD Griffin
JMLR, 2016
642016
Batch normalization is a cause of adversarial vulnerability
A Galloway, A Golubeva, T Tanay, M Moussa, GW Taylor
arXiv preprint arXiv:1905.02161, 2019
402019
Ntire 2020 challenge on real image denoising: Dataset, methods and results
A Abdelhamed, M Afifi, R Timofte, MS Brown
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020
352020
AI-enabled future crime
M Caldwell, JTA Andrews, T Tanay, LD Griffin
Crime Science 9 (1), 1-13, 2020
262020
Adversarial training versus weight decay
A Galloway, T Tanay, GW Taylor
arXiv preprint arXiv:1804.03308, 2018
142018
NTIRE 2021 challenge on quality enhancement of compressed video: Methods and results
R Yang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
132021
Built-in vulnerabilities to imperceptible adversarial perturbations
T Tanay, JTA Andrews, LD Griffin
arXiv preprint arXiv:1806.07409, 2018
72018
A new angle on L2 regularization
T Tanay, LD Griffin
arXiv preprint arXiv:1806.11186, 2018
62018
Stochastic diffusion search applied to trees: a swarm intelligence heuristic performing monte-carlo tree search
T Tanay, J Bishop, S Nasuto, EB Roesch, M Spencer
Proceedings of the AISB, 2013
62013
Abstract platforms of computation
MC Spencer, EB Roesch, SJ Nasuto, T Tanay, JM Bishop
62013
Multiple-identity image attacks against face-based identity verification
JTA Andrews, T Tanay, LD Griffin
arXiv preprint arXiv:1906.08507, 2019
42019
Exploration of the functional properties of interaction: computer models and pointers for theory
EB Roesch, M Spencer, SJ Nasuto, T Tanay, JM Bishop
Constructivist Foundations 9 (1), 26-33, 2013
42013
Game-tree exploration using stochastic diffusion search
T Tanay
Tech. rep., goldsmiths, University of London, 2012
22012
Understanding the extreme vulnerability of image classifiers to adversarial examples
T Tanay
UCL (University College London), 2020
2020
Diagnosing and Preventing Instabilities in Recurrent Video Processing
T Tanay, A Sootla, M Maggioni, PK Dokania, P Torr, A Leonardis, ...
arXiv preprint arXiv:2010.05099, 2020
2020
HeX and the single anthill: playing games with Aunt Hillary
JM Bishop, SJ Nasuto, T Tanay, EB Roesch, MC Spencer
Fundamental Issues of Artificial Intelligence, 369-390, 2016
2016
Authors' Response: Learning, Anticipation and the Brain
EB Roesch, M Spencer, SJ Nasuto, T Tanay, JM Bishop
Constructivist Foundations 9 (1), 42-45, 2013
2013
DRAFT PAPER: HeX and the single anthill: playing games with Aunt Hilary
JM Bishop, SJ Nasuto, T Tanay, E Roesch, M Spencer
Playing HeX with Aunt Hilary: games with an anthill
JM BISHOP, SJ NASUTO, T TANAY, E ROESCH, M SPENCER
The system can't perform the operation now. Try again later.
Articles 1–20