Tech Blog

Jul
24
Activation Functions III: Trainable Activation Functions

Activation Functions III: Trainable Activation Functions

Introduction The idea of traninable activation functions is not new in the neural networks research field. In recent years, as
10 min read
Jun
12
Activation Functions II: Rectified-based Activation Functions

Activation Functions II: Rectified-based Activation Functions

Introduction We have given a brief introduction to the basic activation functions in the previous blog. In this post, we
5 min read
Jun
06
Activation Functions I: Basic AF

Activation Functions I: Basic AF

Deep learning is actually not a difficult or complicated algorithm. In the whole process of deep learning framework design, the
8 min read
Apr
03
DAD Notes IV: Deep Anomaly Detection Models

DAD Notes IV: Deep Anomaly Detection Models

In this post, we discuss various Deep Anomaly Detection Models (DAD) classified based on the availability of labels and training
8 min read
Feb
21
DAD Notes III: Applications of Deep Anomaly Detection

DAD Notes III: Applications of Deep Anomaly Detection

Anomaly detection is applicable in a very large number and variety of domains, such as fraud detection, fault detection, system
8 min read
Feb
13
DAD Notes II: Different Aspects of Deep Learning-based Anomaly Detection

DAD Notes II: Different Aspects of Deep Learning-based Anomaly Detection

Varous deep learning mothods are used to detect anomaly. When we encounter the difficulty to choose an apropriate one, we
6 min read
Feb
12
DAD Notes I: Introduction to Deep Learning for Anomaly Detection

DAD Notes I: Introduction to Deep Learning for Anomaly Detection

In data analysis, anomaly detection (also referred to as outlier detection) is generally understood to be the identification of rare
3 min read