SlideShare a Scribd company logo
1 of 63
Download to read offline
MEETUP #5:
Neural Nets (Jason Yosinski) &
ML for Production (Ken Sanford)
Fun with Neural Nets

NYAI meetup
24 August 2016
Jason Yosinski
Original slides available under Creative Commons Attribution-ShareAlike 3.0
Geometric Intelligence
Neuralnetsstartworking
1950 1960 1970 1980 1990 2000 2010 2020 ……
Progress in AI
Neuralnetsstartworking
1950 1960 1970 1980 1990 2000 2010 2020 ……
Progress in AI
Chen et al., 2014
in
or
n-
ne
ch
e,
in
es
he
y-
te
ly
ed
detection and generates a vector of features every frame (10 ms).
These features are stacked using the left and right context to cre-
Fig. 1. Framework of Deep KWS system, components from left to
right: (i) Feature Extraction (ii) Deep Neural Network (iii) Posterior
Handling
Speech recognition, natural language conversation
Neuralnetsstartworking
1950 1960 1970 1980 1990 2000 2010 2020 ……
Progress in AI
Chen et al., 2014
We are interested in enabling users to have a fully hands-free
experience by developing a system that listens continuously for spe-
cific keywords to initiate voice input. This could be especially use-
ful in situations like driving. The proposed system must be highly
accurate, low-latency, small-footprint, and run in computationally
constrained environments such as modern mobile devices. Running
the system on the device avoids latency and power implications with
connecting to the server for recognition.
Keyword Spotting (KWS) aims at detecting predefined key-
words in an audio stream, and it is a potential technique to provide
the desired hands-free interface. There is an extensive literature in
KWS, although most of the proposed methods are not suitable for
low-latency applications in computationally constrained environ-
ments. For example, several KWS systems [2, 3, 4] assume offline
processing of the audio using large vocabulary continuous speech
recognition systems (LVCSR) to generate rich lattices. In this case,
their task focuses on efficient indexing and search for keywords in
the lattices. These systems are often used to search large databases
of audio content. We focus instead on detecting keywords in the
audio stream without any latency.
A commonly used technique for keyword spotting is the Key-
word/Filler Hidden Markov Model (HMM) [5, 6, 7, 8, 9]. Despite
being initially proposed over two decades ago, it remains highly
competitive. In this generative approach, an HMM model is trained
⇤The author performed the work as a summer intern at Google, MTV.
tal setup, results and some discussion follow in Section 4. Section 5
closes with the conclusions.
2. DEEP KWS SYSTEM
The proposed Deep KWS framework is illustrated in Figure 1. The
framework consists of three major components: (i) a feature extrac-
tion module, (ii) a deep neural network, and (iii) a posterior handling
module. The feature extraction module (i) performs voice-activity
detection and generates a vector of features every frame (10 ms).
These features are stacked using the left and right context to cre-
Fig. 1. Framework of Deep KWS system, components from left to
right: (i) Feature Extraction (ii) Deep Neural Network (iii) Posterior
Handling
Speech recognition, natural language conversation
Neuralnetsstartworking
1950 1960 1970 1980 1990 2000 2010 2020 ……
Progress in AI
Chen et al., 2014
We are interested in enabling users to have a fully hands-free
experience by developing a system that listens continuously for spe-
cific keywords to initiate voice input. This could be especially use-
ful in situations like driving. The proposed system must be highly
accurate, low-latency, small-footprint, and run in computationally
constrained environments such as modern mobile devices. Running
the system on the device avoids latency and power implications with
connecting to the server for recognition.
Keyword Spotting (KWS) aims at detecting predefined key-
words in an audio stream, and it is a potential technique to provide
the desired hands-free interface. There is an extensive literature in
KWS, although most of the proposed methods are not suitable for
low-latency applications in computationally constrained environ-
ments. For example, several KWS systems [2, 3, 4] assume offline
processing of the audio using large vocabulary continuous speech
recognition systems (LVCSR) to generate rich lattices. In this case,
their task focuses on efficient indexing and search for keywords in
the lattices. These systems are often used to search large databases
of audio content. We focus instead on detecting keywords in the
audio stream without any latency.
A commonly used technique for keyword spotting is the Key-
word/Filler Hidden Markov Model (HMM) [5, 6, 7, 8, 9]. Despite
being initially proposed over two decades ago, it remains highly
competitive. In this generative approach, an HMM model is trained
⇤The author performed the work as a summer intern at Google, MTV.
tal setup, results and some discussion follow in Section 4. Section 5
closes with the conclusions.
2. DEEP KWS SYSTEM
The proposed Deep KWS framework is illustrated in Figure 1. The
framework consists of three major components: (i) a feature extrac-
tion module, (ii) a deep neural network, and (iii) a posterior handling
module. The feature extraction module (i) performs voice-activity
detection and generates a vector of features every frame (10 ms).
These features are stacked using the left and right context to cre-
Fig. 1. Framework of Deep KWS system, components from left to
right: (i) Feature Extraction (ii) Deep Neural Network (iii) Posterior
Handling
Speech recognition, natural language conversation
Reinforcement Learning
Silver et al., 2016
Neuralnetsstartworking
1950 1960 1970 1980 1990 2000 2010 2020 ……
Progress in AI
Chen et al., 2014
We are interested in enabling users to have a fully hands-free
experience by developing a system that listens continuously for spe-
cific keywords to initiate voice input. This could be especially use-
ful in situations like driving. The proposed system must be highly
accurate, low-latency, small-footprint, and run in computationally
constrained environments such as modern mobile devices. Running
the system on the device avoids latency and power implications with
connecting to the server for recognition.
Keyword Spotting (KWS) aims at detecting predefined key-
words in an audio stream, and it is a potential technique to provide
the desired hands-free interface. There is an extensive literature in
KWS, although most of the proposed methods are not suitable for
low-latency applications in computationally constrained environ-
ments. For example, several KWS systems [2, 3, 4] assume offline
processing of the audio using large vocabulary continuous speech
recognition systems (LVCSR) to generate rich lattices. In this case,
their task focuses on efficient indexing and search for keywords in
the lattices. These systems are often used to search large databases
of audio content. We focus instead on detecting keywords in the
audio stream without any latency.
A commonly used technique for keyword spotting is the Key-
word/Filler Hidden Markov Model (HMM) [5, 6, 7, 8, 9]. Despite
being initially proposed over two decades ago, it remains highly
competitive. In this generative approach, an HMM model is trained
⇤The author performed the work as a summer intern at Google, MTV.
tal setup, results and some discussion follow in Section 4. Section 5
closes with the conclusions.
2. DEEP KWS SYSTEM
The proposed Deep KWS framework is illustrated in Figure 1. The
framework consists of three major components: (i) a feature extrac-
tion module, (ii) a deep neural network, and (iii) a posterior handling
module. The feature extraction module (i) performs voice-activity
detection and generates a vector of features every frame (10 ms).
These features are stacked using the left and right context to cre-
Fig. 1. Framework of Deep KWS system, components from left to
right: (i) Feature Extraction (ii) Deep Neural Network (iii) Posterior
Handling
Speech recognition, natural language conversation
Reinforcement Learning
Silver et al., 2016
Neuralnetsstartworking
1950 1960 1970 1980 1990 2000 2010 2020 ……
Progress in AI
Chen et al., 2014
We are interested in enabling users to have a fully hands-free
experience by developing a system that listens continuously for spe-
cific keywords to initiate voice input. This could be especially use-
ful in situations like driving. The proposed system must be highly
accurate, low-latency, small-footprint, and run in computationally
constrained environments such as modern mobile devices. Running
the system on the device avoids latency and power implications with
connecting to the server for recognition.
Keyword Spotting (KWS) aims at detecting predefined key-
words in an audio stream, and it is a potential technique to provide
the desired hands-free interface. There is an extensive literature in
KWS, although most of the proposed methods are not suitable for
low-latency applications in computationally constrained environ-
ments. For example, several KWS systems [2, 3, 4] assume offline
processing of the audio using large vocabulary continuous speech
recognition systems (LVCSR) to generate rich lattices. In this case,
their task focuses on efficient indexing and search for keywords in
the lattices. These systems are often used to search large databases
of audio content. We focus instead on detecting keywords in the
audio stream without any latency.
A commonly used technique for keyword spotting is the Key-
word/Filler Hidden Markov Model (HMM) [5, 6, 7, 8, 9]. Despite
being initially proposed over two decades ago, it remains highly
competitive. In this generative approach, an HMM model is trained
⇤The author performed the work as a summer intern at Google, MTV.
tal setup, results and some discussion follow in Section 4. Section 5
closes with the conclusions.
2. DEEP KWS SYSTEM
The proposed Deep KWS framework is illustrated in Figure 1. The
framework consists of three major components: (i) a feature extrac-
tion module, (ii) a deep neural network, and (iii) a posterior handling
module. The feature extraction module (i) performs voice-activity
detection and generates a vector of features every frame (10 ms).
These features are stacked using the left and right context to cre-
Fig. 1. Framework of Deep KWS system, components from left to
right: (i) Feature Extraction (ii) Deep Neural Network (iii) Posterior
Handling
Speech recognition, natural language conversation
Reinforcement Learning
Silver et al., 2016
Not just perceiving the world,

but also generating…
Robot Gait Discovery
Hand-Coded Gait
Fixed Shallow Topology, Learned Parameters
Learned Deep Topology, Learned Parameters
Learned Deep Topology, Learned Parameters
Learned Deep Topology, Learned Parameters
9x faster

than human designed gait
Lion
Krizhevsky et al. 2012
AlexNet
Lion
Recipe for understanding:

• architecture



5 convolutional layers 3 FC layers
Lion
Krizhevsky et al. 2012
AlexNet
Lion
Recipe for understanding:

• architecture

• dataset (big: 250b)

5 convolutional layers 3 FC layers
Lion
Krizhevsky et al. 2012
AlexNet
Lion
Recipe for understanding:

• architecture

• dataset (big: 250b)

5 convolutional layers 3 FC layers
Lion
Krizhevsky et al. 2012
AlexNet
Lion
Recipe for understanding:

• architecture

• dataset (big: 250b)

5 convolutional layers 3 FC layers
ImageNet, Deng et al. 2009
Lion
Krizhevsky et al. 2012
AlexNet
Lion
Recipe for understanding:

• architecture

• dataset (big: 250b)

5 convolutional layers 3 FC layers
ImageNet, Deng et al. 2009
jaguar gibbon great white shark water bottle
golden retriever orangutan fireboat bubble
tobacco shop ambulance cowboy hat mixing bowl
Lion
Krizhevsky et al. 2012
AlexNet
Lion
Recipe for understanding:

• architecture

• dataset (big: 250b)

5 convolutional layers 3 FC layers
Lion
Krizhevsky et al. 2012
AlexNet
Lion
Recipe for understanding:

• architecture

• dataset (big: 250b)

• parameters (big: 60m)
5 convolutional layers 3 FC layers
? ? ?
< DeepVis Toolbox demo >



Code at: http://yosinski.com/
Lion
Recipe for understanding:

• architecture

• dataset (big: 250b)

• parameters (big: 60m)
See also: Erhan et al, 2009; Szegedy et al., 2013.
Recipe for understanding:

• architecture

• dataset (big: 250b)

• parameters (big: 60m)
yx
r g b
(similar to this)
Deep Neural Networks are Easily Fooled:

High Confidence Predictions for Unrecognizable Images
Simonyan ICLR ’14
L2
Dai, Lu, Wu, ICLR ’15
Peacock
LearnedNo regularization
L2 + L1 + spatial
No regularization
Nguyen, Dosovitskiy, Yosinski, Brox, Clune.

“Synthesizing the preferred inputs for neurons in neural networks via deep generator networks”
...
I m age
banana
convertible
.....
Deep% generator%network
(prior) DNN% being%visualized
candle
Code
Forward%and%backward%passes
u9 u2
u1 c1
c2
fc6 fc7
fc8fc6
c3 c4 c5
...
u p c o n v o l u t i o n a l c o n v o l u t i o n a l
...
I m age
banana
convertible
.....
Deep% generator%network
(prior) DNN% being%visualized
candle
Code
Forward%and%backward%passes
u9 u2
u1 c1
c2
fc6 fc7
fc8fc6
c3 c4 c5
...
u p c o n v o l u t i o n a l c o n v o l u t i o n a l
Nguyen, Dosovitskiy, Yosinski, Brox, Clune.

“Synthesizing the preferred inputs for neurons in neural networks via deep generator networks”
Castle Candle
+ =
Fireboat Candle
+ =
“What I cannot create,
I do not understand.”
Richard Feynman’s blackboard
Car

Engine
Intelligencevs.
time
ability
computation
data
scientific understanding
AI Progress
time
ability
computation
data
scientific understanding
AI Progress
Waiting for EEs
and Internet
New field
“Pseudobiology” ?

(study of fake life)
Thanks!
Hod Lipson
Jeff Clune
Yoshua Bengio
Anh Nguyen
Code/etc:

Email:
http://yosinski.com 

jason@yosinski.com
( Slides: http://s.yosinski.com/nyai.pdf )
Food & Drinks:
O’Reilly AI Conference Ticket Giveaway
INTERMISSION
Randomly selected by Jason & Ken

More Related Content

What's hot

Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...IOSR Journals
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...IOSR Journals
 
IRJET-AI Neural Network Disaster Recovery Cloud Operations Systems
IRJET-AI Neural Network Disaster Recovery Cloud Operations SystemsIRJET-AI Neural Network Disaster Recovery Cloud Operations Systems
IRJET-AI Neural Network Disaster Recovery Cloud Operations SystemsIRJET Journal
 
Convolutional neural networks
Convolutional neural networksConvolutional neural networks
Convolutional neural networksAshutosh Kumar
 
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map cscpconf
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYijcisjournal
 
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsA Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsIDES Editor
 
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor NetworkAggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Networkijsrd.com
 
IRJET - Deep Learning Applications and Frameworks – A Review
IRJET -  	  Deep Learning Applications and Frameworks – A ReviewIRJET -  	  Deep Learning Applications and Frameworks – A Review
IRJET - Deep Learning Applications and Frameworks – A ReviewIRJET Journal
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET Journal
 
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksKey Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksIDES Editor
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataeSAT Publishing House
 
Efficient And Improved Video Steganography using DCT and Neural Network
Efficient And Improved Video Steganography using DCT and Neural NetworkEfficient And Improved Video Steganography using DCT and Neural Network
Efficient And Improved Video Steganography using DCT and Neural NetworkIJSRD
 
Image encryption
Image encryptionImage encryption
Image encryptionrakshit2105
 
The Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret ImagesThe Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret ImagesIJERA Editor
 

What's hot (19)

Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
 
IRJET-AI Neural Network Disaster Recovery Cloud Operations Systems
IRJET-AI Neural Network Disaster Recovery Cloud Operations SystemsIRJET-AI Neural Network Disaster Recovery Cloud Operations Systems
IRJET-AI Neural Network Disaster Recovery Cloud Operations Systems
 
Convolutional neural networks
Convolutional neural networksConvolutional neural networks
Convolutional neural networks
 
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
 
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation UnitMIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
 
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsA Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
 
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor NetworkAggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
 
IRJET - Deep Learning Applications and Frameworks – A Review
IRJET -  	  Deep Learning Applications and Frameworks – A ReviewIRJET -  	  Deep Learning Applications and Frameworks – A Review
IRJET - Deep Learning Applications and Frameworks – A Review
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
 
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksKey Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
 
Efficient And Improved Video Steganography using DCT and Neural Network
Efficient And Improved Video Steganography using DCT and Neural NetworkEfficient And Improved Video Steganography using DCT and Neural Network
Efficient And Improved Video Steganography using DCT and Neural Network
 
Image encryption
Image encryptionImage encryption
Image encryption
 
The Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret ImagesThe Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret Images
 
Thesis Background
Thesis BackgroundThesis Background
Thesis Background
 
O026084087
O026084087O026084087
O026084087
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
 

Viewers also liked

Building Tooling And Culture Together
Building Tooling And Culture TogetherBuilding Tooling And Culture Together
Building Tooling And Culture TogetherNishan Subedi
 
NYAI #7 - Using Data Science to Operationalize Machine Learning by Matthew Ru...
NYAI #7 - Using Data Science to Operationalize Machine Learning by Matthew Ru...NYAI #7 - Using Data Science to Operationalize Machine Learning by Matthew Ru...
NYAI #7 - Using Data Science to Operationalize Machine Learning by Matthew Ru...Rizwan Habib
 
Why Twitter Is All The Rage: A Data Miner's Perspective (PyTN 2014)
Why Twitter Is All The Rage: A Data Miner's Perspective (PyTN 2014)Why Twitter Is All The Rage: A Data Miner's Perspective (PyTN 2014)
Why Twitter Is All The Rage: A Data Miner's Perspective (PyTN 2014)Matthew Russell
 
NYAI #7 - Top-down vs. Bottom-up Computational Creativity by Dr. Cole D. Ingr...
NYAI #7 - Top-down vs. Bottom-up Computational Creativity by Dr. Cole D. Ingr...NYAI #7 - Top-down vs. Bottom-up Computational Creativity by Dr. Cole D. Ingr...
NYAI #7 - Top-down vs. Bottom-up Computational Creativity by Dr. Cole D. Ingr...Rizwan Habib
 
NYAI #8 - HOLIDAY PARTY + NYC AI OVERVIEW with NYC's Chief Digital Officer Sr...
NYAI #8 - HOLIDAY PARTY + NYC AI OVERVIEW with NYC's Chief Digital Officer Sr...NYAI #8 - HOLIDAY PARTY + NYC AI OVERVIEW with NYC's Chief Digital Officer Sr...
NYAI #8 - HOLIDAY PARTY + NYC AI OVERVIEW with NYC's Chief Digital Officer Sr...Rizwan Habib
 
NYAI #9: Concepts and Questions As Programs by Brenden Lake
NYAI #9: Concepts and Questions As Programs by Brenden LakeNYAI #9: Concepts and Questions As Programs by Brenden Lake
NYAI #9: Concepts and Questions As Programs by Brenden LakeRizwan Habib
 
Virtual Madness @ Etsy
Virtual Madness @ EtsyVirtual Madness @ Etsy
Virtual Madness @ EtsyNishan Subedi
 
NYAI - Understanding Music Through Machine Learning by Brian McFee
NYAI - Understanding Music Through Machine Learning by Brian McFeeNYAI - Understanding Music Through Machine Learning by Brian McFee
NYAI - Understanding Music Through Machine Learning by Brian McFeeRizwan Habib
 
NYAI - Commodity Machine Learning & Beyond by Andreas Mueller
NYAI - Commodity Machine Learning & Beyond by Andreas MuellerNYAI - Commodity Machine Learning & Beyond by Andreas Mueller
NYAI - Commodity Machine Learning & Beyond by Andreas MuellerRizwan Habib
 
Machine Learning with scikit-learn
Machine Learning with scikit-learnMachine Learning with scikit-learn
Machine Learning with scikit-learnodsc
 
Mining the Social Web for Fun and Profit: A Getting Started Guide
Mining the Social Web for Fun and Profit: A Getting Started GuideMining the Social Web for Fun and Profit: A Getting Started Guide
Mining the Social Web for Fun and Profit: A Getting Started GuideMatthew Russell
 
Privacy, Ethics, and Future Uses of the Social Web
Privacy, Ethics, and Future Uses of the Social WebPrivacy, Ethics, and Future Uses of the Social Web
Privacy, Ethics, and Future Uses of the Social WebMatthew Russell
 
Lessons Learned from Running Hundreds of Kaggle Competitions
Lessons Learned from Running Hundreds of Kaggle CompetitionsLessons Learned from Running Hundreds of Kaggle Competitions
Lessons Learned from Running Hundreds of Kaggle CompetitionsBen Hamner
 
What convnets look at when they look at nudity
What convnets look at when they look at nudityWhat convnets look at when they look at nudity
What convnets look at when they look at nudityRyan Compton
 
Mining Social Web APIs with IPython Notebook (PyCon 2014)
Mining Social Web APIs with IPython Notebook (PyCon 2014)Mining Social Web APIs with IPython Notebook (PyCon 2014)
Mining Social Web APIs with IPython Notebook (PyCon 2014)Matthew Russell
 
NYAI - Intersection of neuroscience and deep learning by Russell Hanson
NYAI - Intersection of neuroscience and deep learning by Russell HansonNYAI - Intersection of neuroscience and deep learning by Russell Hanson
NYAI - Intersection of neuroscience and deep learning by Russell HansonRizwan Habib
 
Mining Social Web APIs with IPython Notebook (Data Day Texas 2015)
Mining Social Web APIs with IPython Notebook (Data Day Texas 2015)Mining Social Web APIs with IPython Notebook (Data Day Texas 2015)
Mining Social Web APIs with IPython Notebook (Data Day Texas 2015)Matthew Russell
 
NYAI - Scaling Machine Learning Applications by Braxton McKee
NYAI - Scaling Machine Learning Applications by Braxton McKeeNYAI - Scaling Machine Learning Applications by Braxton McKee
NYAI - Scaling Machine Learning Applications by Braxton McKeeRizwan Habib
 
NYAI - Visualizing what makes neural networks actually work by Matthew Zeiler
NYAI - Visualizing what makes neural networks actually work by Matthew ZeilerNYAI - Visualizing what makes neural networks actually work by Matthew Zeiler
NYAI - Visualizing what makes neural networks actually work by Matthew ZeilerRizwan Habib
 
NYAI - Interactive Machine Learning by Daniel Hsu
NYAI - Interactive Machine Learning by Daniel HsuNYAI - Interactive Machine Learning by Daniel Hsu
NYAI - Interactive Machine Learning by Daniel HsuRizwan Habib
 

Viewers also liked (20)

Building Tooling And Culture Together
Building Tooling And Culture TogetherBuilding Tooling And Culture Together
Building Tooling And Culture Together
 
NYAI #7 - Using Data Science to Operationalize Machine Learning by Matthew Ru...
NYAI #7 - Using Data Science to Operationalize Machine Learning by Matthew Ru...NYAI #7 - Using Data Science to Operationalize Machine Learning by Matthew Ru...
NYAI #7 - Using Data Science to Operationalize Machine Learning by Matthew Ru...
 
Why Twitter Is All The Rage: A Data Miner's Perspective (PyTN 2014)
Why Twitter Is All The Rage: A Data Miner's Perspective (PyTN 2014)Why Twitter Is All The Rage: A Data Miner's Perspective (PyTN 2014)
Why Twitter Is All The Rage: A Data Miner's Perspective (PyTN 2014)
 
NYAI #7 - Top-down vs. Bottom-up Computational Creativity by Dr. Cole D. Ingr...
NYAI #7 - Top-down vs. Bottom-up Computational Creativity by Dr. Cole D. Ingr...NYAI #7 - Top-down vs. Bottom-up Computational Creativity by Dr. Cole D. Ingr...
NYAI #7 - Top-down vs. Bottom-up Computational Creativity by Dr. Cole D. Ingr...
 
NYAI #8 - HOLIDAY PARTY + NYC AI OVERVIEW with NYC's Chief Digital Officer Sr...
NYAI #8 - HOLIDAY PARTY + NYC AI OVERVIEW with NYC's Chief Digital Officer Sr...NYAI #8 - HOLIDAY PARTY + NYC AI OVERVIEW with NYC's Chief Digital Officer Sr...
NYAI #8 - HOLIDAY PARTY + NYC AI OVERVIEW with NYC's Chief Digital Officer Sr...
 
NYAI #9: Concepts and Questions As Programs by Brenden Lake
NYAI #9: Concepts and Questions As Programs by Brenden LakeNYAI #9: Concepts and Questions As Programs by Brenden Lake
NYAI #9: Concepts and Questions As Programs by Brenden Lake
 
Virtual Madness @ Etsy
Virtual Madness @ EtsyVirtual Madness @ Etsy
Virtual Madness @ Etsy
 
NYAI - Understanding Music Through Machine Learning by Brian McFee
NYAI - Understanding Music Through Machine Learning by Brian McFeeNYAI - Understanding Music Through Machine Learning by Brian McFee
NYAI - Understanding Music Through Machine Learning by Brian McFee
 
NYAI - Commodity Machine Learning & Beyond by Andreas Mueller
NYAI - Commodity Machine Learning & Beyond by Andreas MuellerNYAI - Commodity Machine Learning & Beyond by Andreas Mueller
NYAI - Commodity Machine Learning & Beyond by Andreas Mueller
 
Machine Learning with scikit-learn
Machine Learning with scikit-learnMachine Learning with scikit-learn
Machine Learning with scikit-learn
 
Mining the Social Web for Fun and Profit: A Getting Started Guide
Mining the Social Web for Fun and Profit: A Getting Started GuideMining the Social Web for Fun and Profit: A Getting Started Guide
Mining the Social Web for Fun and Profit: A Getting Started Guide
 
Privacy, Ethics, and Future Uses of the Social Web
Privacy, Ethics, and Future Uses of the Social WebPrivacy, Ethics, and Future Uses of the Social Web
Privacy, Ethics, and Future Uses of the Social Web
 
Lessons Learned from Running Hundreds of Kaggle Competitions
Lessons Learned from Running Hundreds of Kaggle CompetitionsLessons Learned from Running Hundreds of Kaggle Competitions
Lessons Learned from Running Hundreds of Kaggle Competitions
 
What convnets look at when they look at nudity
What convnets look at when they look at nudityWhat convnets look at when they look at nudity
What convnets look at when they look at nudity
 
Mining Social Web APIs with IPython Notebook (PyCon 2014)
Mining Social Web APIs with IPython Notebook (PyCon 2014)Mining Social Web APIs with IPython Notebook (PyCon 2014)
Mining Social Web APIs with IPython Notebook (PyCon 2014)
 
NYAI - Intersection of neuroscience and deep learning by Russell Hanson
NYAI - Intersection of neuroscience and deep learning by Russell HansonNYAI - Intersection of neuroscience and deep learning by Russell Hanson
NYAI - Intersection of neuroscience and deep learning by Russell Hanson
 
Mining Social Web APIs with IPython Notebook (Data Day Texas 2015)
Mining Social Web APIs with IPython Notebook (Data Day Texas 2015)Mining Social Web APIs with IPython Notebook (Data Day Texas 2015)
Mining Social Web APIs with IPython Notebook (Data Day Texas 2015)
 
NYAI - Scaling Machine Learning Applications by Braxton McKee
NYAI - Scaling Machine Learning Applications by Braxton McKeeNYAI - Scaling Machine Learning Applications by Braxton McKee
NYAI - Scaling Machine Learning Applications by Braxton McKee
 
NYAI - Visualizing what makes neural networks actually work by Matthew Zeiler
NYAI - Visualizing what makes neural networks actually work by Matthew ZeilerNYAI - Visualizing what makes neural networks actually work by Matthew Zeiler
NYAI - Visualizing what makes neural networks actually work by Matthew Zeiler
 
NYAI - Interactive Machine Learning by Daniel Hsu
NYAI - Interactive Machine Learning by Daniel HsuNYAI - Interactive Machine Learning by Daniel Hsu
NYAI - Interactive Machine Learning by Daniel Hsu
 

Similar to NYAI #5 - Fun With Neural Nets by Jason Yosinski

Using AI to recognise person
Using AI to recognise personUsing AI to recognise person
Using AI to recognise personSolutionsPortal
 
Towards a distributed framework to analyze multimodal data.pdf
Towards a distributed framework to analyze multimodal data.pdfTowards a distributed framework to analyze multimodal data.pdf
Towards a distributed framework to analyze multimodal data.pdfCarlosRodrigues517978
 
Automatic Speaker Recognition and AI.pdf
Automatic Speaker Recognition and AI.pdfAutomatic Speaker Recognition and AI.pdf
Automatic Speaker Recognition and AI.pdfBhusan Chettri
 
An overview of speaker recognition by Bhusan Chettri.pdf
An overview of speaker recognition by Bhusan Chettri.pdfAn overview of speaker recognition by Bhusan Chettri.pdf
An overview of speaker recognition by Bhusan Chettri.pdfBhusan Chettri
 
Bodleian Library's DAMS system
Bodleian Library's DAMS systemBodleian Library's DAMS system
Bodleian Library's DAMS systembenosteen
 
IRJET- Speech Based Answer Sheet Evaluation System
IRJET- Speech Based Answer Sheet Evaluation SystemIRJET- Speech Based Answer Sheet Evaluation System
IRJET- Speech Based Answer Sheet Evaluation SystemIRJET Journal
 
IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016tsysglobalsolutions
 
Sign Language Detection using Action Recognition
Sign Language Detection using Action RecognitionSign Language Detection using Action Recognition
Sign Language Detection using Action RecognitionIRJET Journal
 
A survey on Enhancements in Speech Recognition
A survey on Enhancements in Speech RecognitionA survey on Enhancements in Speech Recognition
A survey on Enhancements in Speech RecognitionIRJET Journal
 
Key Frame Extraction for Salient Activity Recognition
Key Frame Extraction for Salient Activity RecognitionKey Frame Extraction for Salient Activity Recognition
Key Frame Extraction for Salient Activity RecognitionSuhas Pillai
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONAM Publications
 
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and SynthesizerIRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and SynthesizerIRJET Journal
 
A comparison of different support vector machine kernels for artificial speec...
A comparison of different support vector machine kernels for artificial speec...A comparison of different support vector machine kernels for artificial speec...
A comparison of different support vector machine kernels for artificial speec...TELKOMNIKA JOURNAL
 
Feature Extraction and Analysis of Natural Language Processing for Deep Learn...
Feature Extraction and Analysis of Natural Language Processing for Deep Learn...Feature Extraction and Analysis of Natural Language Processing for Deep Learn...
Feature Extraction and Analysis of Natural Language Processing for Deep Learn...Sharmila Sathish
 
IRJET- Voice based Retrieval for Transport Enquiry System
IRJET- Voice based Retrieval for Transport Enquiry SystemIRJET- Voice based Retrieval for Transport Enquiry System
IRJET- Voice based Retrieval for Transport Enquiry SystemIRJET Journal
 
Book of abstract volume 8 no 9 ijcsis december 2010
Book of abstract volume 8 no 9 ijcsis december 2010Book of abstract volume 8 no 9 ijcsis december 2010
Book of abstract volume 8 no 9 ijcsis december 2010Oladokun Sulaiman
 
Developing a hands-free interface to operate a Computer using voice command
Developing a hands-free interface to operate a Computer using voice commandDeveloping a hands-free interface to operate a Computer using voice command
Developing a hands-free interface to operate a Computer using voice commandMohammad Liton Hossain
 
IRJET - Deep Learning based Chatbot
IRJET - Deep Learning based ChatbotIRJET - Deep Learning based Chatbot
IRJET - Deep Learning based ChatbotIRJET Journal
 

Similar to NYAI #5 - Fun With Neural Nets by Jason Yosinski (20)

Using AI to recognise person
Using AI to recognise personUsing AI to recognise person
Using AI to recognise person
 
Towards a distributed framework to analyze multimodal data.pdf
Towards a distributed framework to analyze multimodal data.pdfTowards a distributed framework to analyze multimodal data.pdf
Towards a distributed framework to analyze multimodal data.pdf
 
Automatic Speaker Recognition and AI.pdf
Automatic Speaker Recognition and AI.pdfAutomatic Speaker Recognition and AI.pdf
Automatic Speaker Recognition and AI.pdf
 
An overview of speaker recognition by Bhusan Chettri.pdf
An overview of speaker recognition by Bhusan Chettri.pdfAn overview of speaker recognition by Bhusan Chettri.pdf
An overview of speaker recognition by Bhusan Chettri.pdf
 
Bodleian Library's DAMS system
Bodleian Library's DAMS systemBodleian Library's DAMS system
Bodleian Library's DAMS system
 
IRJET- Speech Based Answer Sheet Evaluation System
IRJET- Speech Based Answer Sheet Evaluation SystemIRJET- Speech Based Answer Sheet Evaluation System
IRJET- Speech Based Answer Sheet Evaluation System
 
50120140504006
5012014050400650120140504006
50120140504006
 
IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016
 
Sign Language Detection using Action Recognition
Sign Language Detection using Action RecognitionSign Language Detection using Action Recognition
Sign Language Detection using Action Recognition
 
A survey on Enhancements in Speech Recognition
A survey on Enhancements in Speech RecognitionA survey on Enhancements in Speech Recognition
A survey on Enhancements in Speech Recognition
 
Key Frame Extraction for Salient Activity Recognition
Key Frame Extraction for Salient Activity RecognitionKey Frame Extraction for Salient Activity Recognition
Key Frame Extraction for Salient Activity Recognition
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
 
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and SynthesizerIRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
 
A comparison of different support vector machine kernels for artificial speec...
A comparison of different support vector machine kernels for artificial speec...A comparison of different support vector machine kernels for artificial speec...
A comparison of different support vector machine kernels for artificial speec...
 
Feature Extraction and Analysis of Natural Language Processing for Deep Learn...
Feature Extraction and Analysis of Natural Language Processing for Deep Learn...Feature Extraction and Analysis of Natural Language Processing for Deep Learn...
Feature Extraction and Analysis of Natural Language Processing for Deep Learn...
 
IRJET- Voice based Retrieval for Transport Enquiry System
IRJET- Voice based Retrieval for Transport Enquiry SystemIRJET- Voice based Retrieval for Transport Enquiry System
IRJET- Voice based Retrieval for Transport Enquiry System
 
Book of abstract volume 8 no 9 ijcsis december 2010
Book of abstract volume 8 no 9 ijcsis december 2010Book of abstract volume 8 no 9 ijcsis december 2010
Book of abstract volume 8 no 9 ijcsis december 2010
 
BTP paper
BTP paperBTP paper
BTP paper
 
Developing a hands-free interface to operate a Computer using voice command
Developing a hands-free interface to operate a Computer using voice commandDeveloping a hands-free interface to operate a Computer using voice command
Developing a hands-free interface to operate a Computer using voice command
 
IRJET - Deep Learning based Chatbot
IRJET - Deep Learning based ChatbotIRJET - Deep Learning based Chatbot
IRJET - Deep Learning based Chatbot
 

Recently uploaded

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Recently uploaded (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

NYAI #5 - Fun With Neural Nets by Jason Yosinski

  • 1. MEETUP #5: Neural Nets (Jason Yosinski) & ML for Production (Ken Sanford)
  • 2. Fun with Neural Nets NYAI meetup 24 August 2016 Jason Yosinski Original slides available under Creative Commons Attribution-ShareAlike 3.0 Geometric Intelligence
  • 3. Neuralnetsstartworking 1950 1960 1970 1980 1990 2000 2010 2020 …… Progress in AI
  • 4. Neuralnetsstartworking 1950 1960 1970 1980 1990 2000 2010 2020 …… Progress in AI Chen et al., 2014 in or n- ne ch e, in es he y- te ly ed detection and generates a vector of features every frame (10 ms). These features are stacked using the left and right context to cre- Fig. 1. Framework of Deep KWS system, components from left to right: (i) Feature Extraction (ii) Deep Neural Network (iii) Posterior Handling Speech recognition, natural language conversation
  • 5. Neuralnetsstartworking 1950 1960 1970 1980 1990 2000 2010 2020 …… Progress in AI Chen et al., 2014 We are interested in enabling users to have a fully hands-free experience by developing a system that listens continuously for spe- cific keywords to initiate voice input. This could be especially use- ful in situations like driving. The proposed system must be highly accurate, low-latency, small-footprint, and run in computationally constrained environments such as modern mobile devices. Running the system on the device avoids latency and power implications with connecting to the server for recognition. Keyword Spotting (KWS) aims at detecting predefined key- words in an audio stream, and it is a potential technique to provide the desired hands-free interface. There is an extensive literature in KWS, although most of the proposed methods are not suitable for low-latency applications in computationally constrained environ- ments. For example, several KWS systems [2, 3, 4] assume offline processing of the audio using large vocabulary continuous speech recognition systems (LVCSR) to generate rich lattices. In this case, their task focuses on efficient indexing and search for keywords in the lattices. These systems are often used to search large databases of audio content. We focus instead on detecting keywords in the audio stream without any latency. A commonly used technique for keyword spotting is the Key- word/Filler Hidden Markov Model (HMM) [5, 6, 7, 8, 9]. Despite being initially proposed over two decades ago, it remains highly competitive. In this generative approach, an HMM model is trained ⇤The author performed the work as a summer intern at Google, MTV. tal setup, results and some discussion follow in Section 4. Section 5 closes with the conclusions. 2. DEEP KWS SYSTEM The proposed Deep KWS framework is illustrated in Figure 1. The framework consists of three major components: (i) a feature extrac- tion module, (ii) a deep neural network, and (iii) a posterior handling module. The feature extraction module (i) performs voice-activity detection and generates a vector of features every frame (10 ms). These features are stacked using the left and right context to cre- Fig. 1. Framework of Deep KWS system, components from left to right: (i) Feature Extraction (ii) Deep Neural Network (iii) Posterior Handling Speech recognition, natural language conversation
  • 6. Neuralnetsstartworking 1950 1960 1970 1980 1990 2000 2010 2020 …… Progress in AI Chen et al., 2014 We are interested in enabling users to have a fully hands-free experience by developing a system that listens continuously for spe- cific keywords to initiate voice input. This could be especially use- ful in situations like driving. The proposed system must be highly accurate, low-latency, small-footprint, and run in computationally constrained environments such as modern mobile devices. Running the system on the device avoids latency and power implications with connecting to the server for recognition. Keyword Spotting (KWS) aims at detecting predefined key- words in an audio stream, and it is a potential technique to provide the desired hands-free interface. There is an extensive literature in KWS, although most of the proposed methods are not suitable for low-latency applications in computationally constrained environ- ments. For example, several KWS systems [2, 3, 4] assume offline processing of the audio using large vocabulary continuous speech recognition systems (LVCSR) to generate rich lattices. In this case, their task focuses on efficient indexing and search for keywords in the lattices. These systems are often used to search large databases of audio content. We focus instead on detecting keywords in the audio stream without any latency. A commonly used technique for keyword spotting is the Key- word/Filler Hidden Markov Model (HMM) [5, 6, 7, 8, 9]. Despite being initially proposed over two decades ago, it remains highly competitive. In this generative approach, an HMM model is trained ⇤The author performed the work as a summer intern at Google, MTV. tal setup, results and some discussion follow in Section 4. Section 5 closes with the conclusions. 2. DEEP KWS SYSTEM The proposed Deep KWS framework is illustrated in Figure 1. The framework consists of three major components: (i) a feature extrac- tion module, (ii) a deep neural network, and (iii) a posterior handling module. The feature extraction module (i) performs voice-activity detection and generates a vector of features every frame (10 ms). These features are stacked using the left and right context to cre- Fig. 1. Framework of Deep KWS system, components from left to right: (i) Feature Extraction (ii) Deep Neural Network (iii) Posterior Handling Speech recognition, natural language conversation Reinforcement Learning Silver et al., 2016
  • 7. Neuralnetsstartworking 1950 1960 1970 1980 1990 2000 2010 2020 …… Progress in AI Chen et al., 2014 We are interested in enabling users to have a fully hands-free experience by developing a system that listens continuously for spe- cific keywords to initiate voice input. This could be especially use- ful in situations like driving. The proposed system must be highly accurate, low-latency, small-footprint, and run in computationally constrained environments such as modern mobile devices. Running the system on the device avoids latency and power implications with connecting to the server for recognition. Keyword Spotting (KWS) aims at detecting predefined key- words in an audio stream, and it is a potential technique to provide the desired hands-free interface. There is an extensive literature in KWS, although most of the proposed methods are not suitable for low-latency applications in computationally constrained environ- ments. For example, several KWS systems [2, 3, 4] assume offline processing of the audio using large vocabulary continuous speech recognition systems (LVCSR) to generate rich lattices. In this case, their task focuses on efficient indexing and search for keywords in the lattices. These systems are often used to search large databases of audio content. We focus instead on detecting keywords in the audio stream without any latency. A commonly used technique for keyword spotting is the Key- word/Filler Hidden Markov Model (HMM) [5, 6, 7, 8, 9]. Despite being initially proposed over two decades ago, it remains highly competitive. In this generative approach, an HMM model is trained ⇤The author performed the work as a summer intern at Google, MTV. tal setup, results and some discussion follow in Section 4. Section 5 closes with the conclusions. 2. DEEP KWS SYSTEM The proposed Deep KWS framework is illustrated in Figure 1. The framework consists of three major components: (i) a feature extrac- tion module, (ii) a deep neural network, and (iii) a posterior handling module. The feature extraction module (i) performs voice-activity detection and generates a vector of features every frame (10 ms). These features are stacked using the left and right context to cre- Fig. 1. Framework of Deep KWS system, components from left to right: (i) Feature Extraction (ii) Deep Neural Network (iii) Posterior Handling Speech recognition, natural language conversation Reinforcement Learning Silver et al., 2016
  • 8. Neuralnetsstartworking 1950 1960 1970 1980 1990 2000 2010 2020 …… Progress in AI Chen et al., 2014 We are interested in enabling users to have a fully hands-free experience by developing a system that listens continuously for spe- cific keywords to initiate voice input. This could be especially use- ful in situations like driving. The proposed system must be highly accurate, low-latency, small-footprint, and run in computationally constrained environments such as modern mobile devices. Running the system on the device avoids latency and power implications with connecting to the server for recognition. Keyword Spotting (KWS) aims at detecting predefined key- words in an audio stream, and it is a potential technique to provide the desired hands-free interface. There is an extensive literature in KWS, although most of the proposed methods are not suitable for low-latency applications in computationally constrained environ- ments. For example, several KWS systems [2, 3, 4] assume offline processing of the audio using large vocabulary continuous speech recognition systems (LVCSR) to generate rich lattices. In this case, their task focuses on efficient indexing and search for keywords in the lattices. These systems are often used to search large databases of audio content. We focus instead on detecting keywords in the audio stream without any latency. A commonly used technique for keyword spotting is the Key- word/Filler Hidden Markov Model (HMM) [5, 6, 7, 8, 9]. Despite being initially proposed over two decades ago, it remains highly competitive. In this generative approach, an HMM model is trained ⇤The author performed the work as a summer intern at Google, MTV. tal setup, results and some discussion follow in Section 4. Section 5 closes with the conclusions. 2. DEEP KWS SYSTEM The proposed Deep KWS framework is illustrated in Figure 1. The framework consists of three major components: (i) a feature extrac- tion module, (ii) a deep neural network, and (iii) a posterior handling module. The feature extraction module (i) performs voice-activity detection and generates a vector of features every frame (10 ms). These features are stacked using the left and right context to cre- Fig. 1. Framework of Deep KWS system, components from left to right: (i) Feature Extraction (ii) Deep Neural Network (iii) Posterior Handling Speech recognition, natural language conversation Reinforcement Learning Silver et al., 2016
  • 9. Not just perceiving the world, but also generating…
  • 12. Fixed Shallow Topology, Learned Parameters
  • 13. Learned Deep Topology, Learned Parameters
  • 14. Learned Deep Topology, Learned Parameters
  • 15. Learned Deep Topology, Learned Parameters 9x faster than human designed gait
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Lion Krizhevsky et al. 2012 AlexNet Lion Recipe for understanding: • architecture
 
 5 convolutional layers 3 FC layers
  • 25. Lion Krizhevsky et al. 2012 AlexNet Lion Recipe for understanding: • architecture • dataset (big: 250b) 5 convolutional layers 3 FC layers
  • 26. Lion Krizhevsky et al. 2012 AlexNet Lion Recipe for understanding: • architecture • dataset (big: 250b)
 5 convolutional layers 3 FC layers
  • 27. Lion Krizhevsky et al. 2012 AlexNet Lion Recipe for understanding: • architecture • dataset (big: 250b)
 5 convolutional layers 3 FC layers ImageNet, Deng et al. 2009
  • 28. Lion Krizhevsky et al. 2012 AlexNet Lion Recipe for understanding: • architecture • dataset (big: 250b)
 5 convolutional layers 3 FC layers ImageNet, Deng et al. 2009 jaguar gibbon great white shark water bottle golden retriever orangutan fireboat bubble tobacco shop ambulance cowboy hat mixing bowl
  • 29. Lion Krizhevsky et al. 2012 AlexNet Lion Recipe for understanding: • architecture • dataset (big: 250b)
 5 convolutional layers 3 FC layers
  • 30. Lion Krizhevsky et al. 2012 AlexNet Lion Recipe for understanding: • architecture • dataset (big: 250b) • parameters (big: 60m) 5 convolutional layers 3 FC layers ? ? ?
  • 31. < DeepVis Toolbox demo > 
 Code at: http://yosinski.com/
  • 32. Lion Recipe for understanding: • architecture • dataset (big: 250b) • parameters (big: 60m)
  • 33. See also: Erhan et al, 2009; Szegedy et al., 2013. Recipe for understanding: • architecture • dataset (big: 250b) • parameters (big: 60m)
  • 34.
  • 35.
  • 36.
  • 37.
  • 38. yx r g b (similar to this)
  • 39.
  • 40.
  • 41.
  • 42.
  • 43. Deep Neural Networks are Easily Fooled: High Confidence Predictions for Unrecognizable Images
  • 44.
  • 45. Simonyan ICLR ’14 L2 Dai, Lu, Wu, ICLR ’15 Peacock LearnedNo regularization
  • 46. L2 + L1 + spatial No regularization
  • 47.
  • 48.
  • 49.
  • 50.
  • 51. Nguyen, Dosovitskiy, Yosinski, Brox, Clune. “Synthesizing the preferred inputs for neurons in neural networks via deep generator networks” ... I m age banana convertible ..... Deep% generator%network (prior) DNN% being%visualized candle Code Forward%and%backward%passes u9 u2 u1 c1 c2 fc6 fc7 fc8fc6 c3 c4 c5 ... u p c o n v o l u t i o n a l c o n v o l u t i o n a l
  • 52. ... I m age banana convertible ..... Deep% generator%network (prior) DNN% being%visualized candle Code Forward%and%backward%passes u9 u2 u1 c1 c2 fc6 fc7 fc8fc6 c3 c4 c5 ... u p c o n v o l u t i o n a l c o n v o l u t i o n a l Nguyen, Dosovitskiy, Yosinski, Brox, Clune. “Synthesizing the preferred inputs for neurons in neural networks via deep generator networks”
  • 53.
  • 54.
  • 55.
  • 57.
  • 58. “What I cannot create, I do not understand.” Richard Feynman’s blackboard Car Engine Intelligencevs.
  • 60. time ability computation data scientific understanding AI Progress Waiting for EEs and Internet New field “Pseudobiology” ? (study of fake life)
  • 61.
  • 62. Thanks! Hod Lipson Jeff Clune Yoshua Bengio Anh Nguyen Code/etc: Email: http://yosinski.com jason@yosinski.com ( Slides: http://s.yosinski.com/nyai.pdf )
  • 63. Food & Drinks: O’Reilly AI Conference Ticket Giveaway INTERMISSION Randomly selected by Jason & Ken