How-To


Researchers Explore Evolutionary Algorithms for Neural Network Training

Compared to standard neural network training techniques that are based on mathematical backpropagation, evolutionary training allows more complex neural architectures.

Blue and Red Graphic

Researchers Explore Machine Learning Hyperparameter Tuning Using Evolutionary Optimization

Efficient tuning techniques for large machine learning models can produce significant time and cost savings.

Microsoft Researchers Use Neural Transformer Architecture for Cybersecurity

Transformer architecture (TA) is designed to handle long sequences of words, such as a paragraph of text.

globe illustration

Researchers Demonstrate Transformer Architecture-Based Anomaly Detection for Cybersecurity

The new technique is based on deep neural transformer architecture (TA), originally intended for natural language processing but successfully adapted for other problem scenarios.

Collage of Colors

Researchers Generate Realistic Images from Text

Researchers at Google have demonstrated a "quite remarkable" new technique that generates photo-realistic images from arbitrary text.

Contrastive Loss Representation for Anomaly Detection Has Cybersecurity Implications

This and other research seems to be making good progress toward our ability to detect and defend against malicious attacks on computer systems.

Researchers Discover New Technique for Training Huge Neural Networks

It can train huge neural networks in a fraction of the time and cost required for standard training techniques.

Rainbow LED Graphic

Researchers Explore Neural Network Slot Machine Technique Training

"Slot machine and quantum annealing training techniques might be useful in scenarios where neural networks must be retrained frequently and in scenarios where training must occur on devices with limited processing power, such as mobile phones," says Microsoft AI scientist engineer.

blue and yellow lights graphic

Researchers Explore Quantum-Inspired Optimization

Quantum-inspired optimization starts with a standard algorithm, such as particle swarm optimization or simulated annealing, and modifies the algorithm by using one of many ideas adapted from physics quantum behavior.

Light Blue Shape Graphic

Researchers Explore Differential Privacy

Differential privacy consists of a set of techniques designed to prevent the leakage of sensitive data.

Featured

Upcoming Training Events