diff --git a/_config.yml b/_config.yml index 8453d6bbb7..4184356dac 100755 --- a/_config.yml +++ b/_config.yml @@ -17,12 +17,15 @@ paginate: 5 markdown: kramdown highlighter: rouge permalink: none -plugins: [jekyll-paginate, jekyll-sitemap, jekyll-feed, jekyll-seo-tag] +plugins: [jekyll-paginate, jekyll-sitemap, jekyll-feed, jekyll-seo-tag, jekyll-crosspost-to-medium] # Customise atom feed settings (this is where Jekyll-Feed gets configuration information) -title: "Lagrange" -description: "A minimalist Jekyll theme" -author: "Paul Le" +title: "DTRANSPOSED" +description: "data science, AI, technology" +author: "Damian Bogunowicz" + +# Analytics +analytics-id: "UA-131652597-1" # RSS 2.0 can be used instead of Atom by uncommenting following two lines #feed: diff --git a/_data/authors.yml b/_data/authors.yml index fd408e92a2..272914dcde 100755 --- a/_data/authors.yml +++ b/_data/authors.yml @@ -1,3 +1,2 @@ primary: - name: 'Paul Le' - twitter: paululele + name: 'Damian Bogunowicz' diff --git a/_data/settings.yml b/_data/settings.yml index 579bd6861f..4536185f89 100755 --- a/_data/settings.yml +++ b/_data/settings.yml @@ -1,24 +1,28 @@ -title: Lagrange -tagline: a minimalist Jekyll theme +title: DTRANSPOSED +tagline: data science, AI, technology # Authors documented under _data # Change to true for Disqus comments disqus: - comments: false - disqus_shortname: 'https-lenpaul-github-io-lagrange' + comments: true + disqus_shortname: 'https-dtransposed-github-io' google-ID: 'UA-80213386-1' menu: +- {name: 'Blog', path: 'menu', url: 'blog.html'} - {name: 'About', path: 'menu', url: 'about.html'} -- {name: 'Writing', path: 'menu', url: 'writing.html'} -- {name: 'Contact', path: 'menu', url: 'contact.html'} +- {name: 'Projects', path: 'menu', url: 'projects.html'} # Available social icons are powered by Font Awesome, so you can use any icon that they offer social: -- {icon: 'github', link: 'https://www.github.com/lenpaul'} -- {icon: 'twitter', link: 'https://twitter.com/paululele'} -- {icon: 'linkedin', link: 'http://www.linkedin.com/in/lenpaul/'} -- {icon: 'envelope', link: 'mailto:l.nguyen.paul@gmail.com'} +- {icon: 'github', link: 'https://www.github.com/dtransposed'} +- {icon: 'twitter', link: 'https://twitter.com/dtransposed'} +- {icon: 'linkedin', link: 'http://www.linkedin.com/in/dbogunowicz/'} +- {icon: 'envelope', link: 'mailto:damian.bogunowicz@gmail.com'} - {icon: 'rss-square', link: 'feed.xml'} + +pagination: + next_page: 'Newer' + previous_page: 'Older' diff --git a/_drafts/Adversarial-Attack.md b/_drafts/Adversarial-Attack.md new file mode 100644 index 0000000000..6bafd32f2e --- /dev/null +++ b/_drafts/Adversarial-Attack.md @@ -0,0 +1,56 @@ +--- +layout: post +title: "Adverserial attacks" +author: "Damian Bogunowicz" +categories: blog +tags: [AI, hidden markov model, tutorial, python, programming, psychology] +image: face-recognition.jpg +--- +self driving cars, +no longer need human drivers in the loop +identify human faces airports +security systems that can identify people present on the company ground +adverserial attack + + $$\mathcal{L}=\alpha\mathcal{L}_{in}(x,x')+\beta\mathcal{L}_{out}((f(x'),f(x))+\gamma\mathcal{L}_{s}$$ + +The loss function in general consists of three components. Let's take a look at each of these separate losses. + +## Perturbation loss + +The goal of the adversarial attack is to take an original, benign input $$x$$ and produce a malicious image $$x'$$ by adding some noise (perturbation) $$\eta$$ to it. In other words $$x'=x+\eta$$. It would be great to fool a network while keeping the noise added to the image to the minimum. This means that one of the primary goals of the adversarial network is to minimize the difference between the original image $$x$$ and the perturbated image $$x'$$. The mathematical formulation of this condition is: + +$$ \underset{\eta}{\operatorname{argmin}} \mathcal{L}_{in}(x,x')$$ + +This means that we manipulate the noise in such a way, that it minimizes the loss function, i.e. a malicious input has possibly close pixel values to the original image. + +Let's take an autonomous vehicle as an example. Let's step into shoes of a villain, who wants to attack a convoy of autonomous cars. Perturbation loss would be a crucial element of a physical attack on a network. + +## + +The authors of the paper Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition In impersonation (or targeted) attacks, the adversary attempts to be misclassified as a specific other person. +- In dodging (or untargeted) attacks, the adversary attempts to be misclassified as some other person. + +autonomous car sees sign as something different +impersonate a person using physical artifact lie + + + + +Term | Definition | +--------------------- | :-------------------: | +a benign image $$x$$ | original input to the network | +an adversarial image $$x'$$ | an image that has been altered in order to fool the classifier | +non-targeted attacks | an attack where the attacker desires to be missclassified by any means| +targeted attack | an attack where the attacker tries to get missclassified to a specific target class | +white box | yfftftffffghf| +black box attack | when the attacker has the access to the model's architecture (parameter | +physical attack/digital attack |ygfyfyyf/| + + + +ine learning models that an attacker has intentionally designed to cause the model to make a mistake; they?re like optical illusions for machines. In this post we?ll show how adversarial examples work across different mediums, and will discuss why securing systems against them can be difficult. + + Explaining and Harnessing Adversarial Examples: panda image + +Source of the cover image: http://www.bleum.com diff --git a/_drafts/alphazero.md b/_drafts/alphazero.md new file mode 100644 index 0000000000..a1acc9495b --- /dev/null +++ b/_drafts/alphazero.md @@ -0,0 +1,22 @@ +earning minmax + + + +quick alpha zero: + + + + + + + +Sources: + +Creating AlphaZero: +https://medium.com/applied-data-science/how-to-build-your-own-alphazero-ai-using-python-and-keras-7f664945c188 + +AlphaZero Cheatsheet: +https://medium.com/applied-data-science/alphago-zero-explained-in-one-diagram-365f5abf67e0 + +AlphaZero Stanford: +https://web.stanford.edu/~surag/posts/alphazero.html diff --git a/_drafts/maiot.md b/_drafts/maiot.md new file mode 100644 index 0000000000..4f8fa33e8d --- /dev/null +++ b/_drafts/maiot.md @@ -0,0 +1 @@ +“Every person in your company is a vector. Your progress is determined by the sum of all vectors.” — Elon Musk diff --git a/_drafts/sim2real b/_drafts/sim2real new file mode 100644 index 0000000000..4f3e96b88a --- /dev/null +++ b/_drafts/sim2real @@ -0,0 +1,13 @@ + +Sim-to-Real Transfer of Robotic Control with Dynamics Randomization + +Using Simulation and Domain Adaptation to Improve Efficiency of Deep Robotic Grasping +Sim-to-Real via Sim-to-Sim: Data-efficient Robotic Grasping via Randomized-to-Canonical Adaptation Networks + +Closing the Sim-to-Real Loop: Adapting Simulation Randomization with Real World Experience + +Robots Learning to Move like Animals + +Meta-Reinforcement Learning for Robotic Industrial Insertion Tasks + +SOLVING RUBIK’S CUBE WITH A ROBOT HAND diff --git a/_includes/google-analytics.html b/_includes/google-analytics.html index 8a61a19446..56b20f5e6b 100755 --- a/_includes/google-analytics.html +++ b/_includes/google-analytics.html @@ -1,9 +1,9 @@ + + diff --git a/_includes/head.html b/_includes/head.html index 3830bfdfaf..6c780548b8 100755 --- a/_includes/head.html +++ b/_includes/head.html @@ -33,5 +33,4 @@ {% seo %} - diff --git a/_layouts/default.html b/_layouts/default.html index 268a4b2a5e..1c30445f61 100755 --- a/_layouts/default.html +++ b/_layouts/default.html @@ -7,6 +7,7 @@
{% include header.html %} + {% seo %}
{{ content }} diff --git a/_layouts/post.html b/_layouts/post.html index c1f9c45114..8535db8947 100755 --- a/_layouts/post.html +++ b/_layouts/post.html @@ -6,14 +6,14 @@

{{ page.title }}

-{% if page.image.feature %} - +{% if page.image %} + {% endif %} {{ content }}