Zobrazeno 1 - 10
of 122
pro vyhledávání: '"Ian Molloy"'
Backdoor attacks mislead machine-learning models to output an attacker-specified class when presented a specific trigger at test time. These attacks require poisoning the training data to compromise the learning algorithm, e.g., by injecting poisonin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d59f0b796703f11ae7a37051207a95af
http://arxiv.org/abs/2006.06721
http://arxiv.org/abs/2006.06721
Autor:
Carlos Alzate, Anna Monreale, Haytham Assem, Albert Bifet, Teodora Sandra Buda, Bora Caglayan, Brett Drury, Eva García-Martín, Ricard Gavaldà, Irena Koprinska, Stefan Kramer, Niklas Lavesson, Michael Madden, Ian Molloy, Maria-Irina Nicolae, Mathieu Sinn
This book constitutes revised selected papers from the workshops Nemesis, UrbReas, SoGood, IWAISe, and Green Data Mining, held at the 18th European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2018, in Dublin, Irelan
Publikováno v:
Proceedings of the 35th International Conference on Education and Research in Computer Aided Architectural Design in Europe (eCAADe) [Volume 2].
Publikováno v:
Proceedings of the AAAI Conference on Artificial Intelligence. 30
Tensor decomposition methods are effective tools for modelling multidimensional array data (i.e., tensors). Among them, nonparametric Bayesian models, such as Infinite Tucker Decomposition (InfTucker), are more powerful than multilinear factorization
Autor:
Mo, Fan1 (AUTHOR) mofan1992@gmail.com, Tarkhani, Zahra2 (AUTHOR) zt233@cantab.ac.uk, Haddadi, Hamed1 (AUTHOR) h.haddadi@imperial.ac.uk
Publikováno v:
ACM Computing Surveys. Nov2024, Vol. 56 Issue 11, p1-40. 40p.
Autor:
Yan, Baochen1 (AUTHOR) bcyan@stu.xidian.edu.cn, Lan, Jiahe1 (AUTHOR) jhlan16@stu.xidian.edu.cn, Yan, Zheng1 (AUTHOR) zyan@xidian.edu.cn
Publikováno v:
ACM Computing Surveys. Mar2025, Vol. 57 Issue 3, p1-35. 35p.
Autor:
Cheng, Pau-Chen1 (AUTHOR) pau@us.ibm.com, Ozga, Wojciech2 (AUTHOR) woz@zurich.ibm.com, Valdez, Enriquillo1 (AUTHOR) rvaldez@us.ibm.com, Ahmed, Salman1 (AUTHOR) sahmed@ibm.com, Gu, Zhongshu1 (AUTHOR) zgu@us.ibm.com, Jamjoom, Hani1 (AUTHOR) jamjoom@us.ibm.com, Franke, Hubertus1 (AUTHOR) frankeh@us.ibm.com, Bottomley, James1 (AUTHOR) jejb@us.ibm.com
Publikováno v:
ACM Computing Surveys. Sep2024, Vol. 56 Issue 9, p1-33. 33p.
Autor:
Xiong, Peiyu1 (AUTHOR) gbxpeiyu@ece.ubc.ca, Tegegn, Michael1 (AUTHOR) mtegegn@ece.ubc.ca, Sarin, Jaskeerat Singh1 (AUTHOR) jsarin@student.ubc.ca, Pal, Shubhraneel2 (AUTHOR) shubhraneel@iitkgp.ac.in, Rubin, Julia1 (AUTHOR) mjulia@ece.ubc.ca
Publikováno v:
ACM Computing Surveys. Jul2024, Vol. 56 Issue 7, p1-41. 41p.
Autor:
HUIQIANG CHEN1 huiqiang.chen@student.uts.edu.au, TIANQING ZHU1 tao.zhang-3@student.uts.edu.au, TAO ZHANG1 tianqing.zhu@uts.edu.au, WANLEI ZHOU2 wlzhou@cityu.edu.mo, YU, PHILIP S.3 psyu@uic.edu
Publikováno v:
ACM Computing Surveys. Feb2024, Vol. 56 Issue 2, p1-37. 37p.
Publikováno v:
ACM Transactions on Multimedia Computing, Communications & Applications; Oct2024, Vol. 20 Issue 10, p1-24, 24p