Showing 1–20 of 75 results
/ Date/ Name
Feb 10, 2010On the Stability of Empirical Risk Minimization in the Presence of Multiple Risk MinimizersNov 18, 2009A Geometric Approach to Sample CompressionApr 3, 2024Backdoor Attack on Multilingual Machine TranslationSep 2, 2011How Open Should Open Source Be?Jul 12, 2020A Graph Symmetrisation Bound on Channel Information Leakage under Blowfish PrivacyJul 12, 2021Putting words into the system's mouth: A targeted attack on neural machine translation using monolingual data poisoningSep 24, 2021Local Intrinsic Dimensionality Signals Adversarial PerturbationsJan 29, 2014Bounding Embeddings of VC Classes into Maximum ClassesApr 27, 2017Privacy Assessment of De-identified Opal Data: A report for Transport for NSWApr 6, 2017Adequacy of the Gradient-Descent Method for Classifier Evasion AttacksMay 22, 2024Adaptive Data Analysis for Growing DataMar 1, 2012A Bayesian Approach to Discovering Truth from Conflicting Sources for Data IntegrationAug 9, 2012Scaling Multiple-Source Entity Resolution using Statistically Efficient Transfer LearningOct 12, 2022Double Bubble, Toil and Trouble: Enhancing Certified Robustness through TransitivityAug 15, 2023Enhancing the Antidote: Improved Pointwise Certifications against Poisoning AttacksJun 23, 2020Discrete Few-Shot Learning for Pan PrivacyFeb 24, 2019Truth Inference at Scale: A Bayesian Model for Adjudicating Highly Redundant Crowd AnnotationsJun 12, 2020Needle in a Haystack: Label-Efficient Evaluation under Extreme Class ImbalanceSep 29, 2021A Communication Security Game on Switched Systems for Autonomous Vehicle PlatoonsDec 24, 2021State Selection Algorithms and Their Impact on The Performance of Stateful Network Protocol Fuzzing