Zobrazeno 1 - 10
of 93
pro vyhledávání: '"Dozier, Gerry"'
Autor:
Rahgouy, Mostafa, Giglou, Hamed Babaei, Tabassum, Mehnaz, Feng, Dongji, Das, Amit, Rahgooy, Taher, Dozier, Gerry, Seals, Cheryl D.
AA is the process of attributing an unidentified document to its true author from a predefined group of known candidates, each possessing multiple samples. The nature of AA necessitates accommodating emerging new authors, as each individual must be c
Externí odkaz:
http://arxiv.org/abs/2408.08900
Autor:
Das, Amit, Zhang, Zheng, Hasan, Najib, Sarkar, Souvika, Jamshidi, Fatemeh, Bhattacharya, Tathagata, Rahgouy, Mostafa, Raychawdhary, Nilanjana, Feng, Dongji, Jain, Vinija, Chadha, Aman, Sandage, Mary, Pope, Lauramarie, Dozier, Gerry, Seals, Cheryl
Data annotation, the practice of assigning descriptive labels to raw data, is pivotal in optimizing the performance of machine learning models. However, it is a resource-intensive process susceptible to biases introduced by annotators. The emergence
Externí odkaz:
http://arxiv.org/abs/2406.11109
Autor:
Das, Amit, Rahgouy, Mostafa, Feng, Dongji, Zhang, Zheng, Bhattacharya, Tathagata, Raychawdhary, Nilanjana, Jamshidi, Fatemeh, Jain, Vinija, Chadha, Aman, Sandage, Mary, Pope, Lauramarie, Dozier, Gerry, Seals, Cheryl
The widespread presence of hateful languages on social media has resulted in adverse effects on societal well-being. As a result, addressing this issue with high priority has become very important. Hate speech or offensive languages exist in both exp
Externí odkaz:
http://arxiv.org/abs/2403.02472
Image classification is a common step in image recognition for machine learning in overhead applications. When applying popular model architectures like MobileNetV2, known vulnerabilities expose the model to counter-attacks, either mislabeling a know
Externí odkaz:
http://arxiv.org/abs/2103.15897
Taking advantage of computationally lightweight, but high-quality translators prompt consideration of new applications that address neglected languages. Locally run translators for less popular languages may assist data projects with protected or per
Externí odkaz:
http://arxiv.org/abs/2101.01628
In Machine Learning, White Box Adversarial Attacks rely on knowing underlying knowledge about the model attributes. This works focuses on discovering to distrinct pieces of model information: the underlying architecture and primary training dataset.
Externí odkaz:
http://arxiv.org/abs/2009.03136
This work proposes a structured approach to baselining a model, identifying attack vectors, and securing the machine learning models after deployment. This method for securing each model post deployment is called the BAD (Build, Attack, and Defend) A
Externí odkaz:
http://arxiv.org/abs/2006.11130
Publikováno v:
International Journal of Intelligent Computing and Cybernetics, 2013, Vol. 6, Issue 1, pp. 4-20.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/17563781311301490
Autor:
Shelton, Joseph, Bryant, Kelvin, Abrams, Sheldon, Small, Lasanio, Adams, Joshua, Leflore, Derrick, Alford, Aniesha, Ricanek, Karl, Dozier, Gerry
Publikováno v:
In Procedia Computer Science 2012 8:351-360
Publikováno v:
In Applied Mathematics and Computation 2012 218(9):4710-4730