Zobrazeno 1 - 10
of 75
pro vyhledávání: '"Samavi, Reza"'
Autor:
Karimi, Hamed, Samavi, Reza
In this paper, we propose Evidential Conformal Prediction (ECP) method for image classifiers to generate the conformal prediction sets. Our method is designed based on a non-conformity score function that has its roots in Evidential Deep Learning (ED
Externí odkaz:
http://arxiv.org/abs/2406.10787
Autor:
Czobit, Cassandra, Samavi, Reza
Image-to-image translation has gained popularity in the medical field to transform images from one domain to another. Medical image synthesis via domain transformation is advantageous in its ability to augment an image dataset where images for a give
Externí odkaz:
http://arxiv.org/abs/2401.00023
Autor:
Karimi, Hamed, Samavi, Reza
Publikováno v:
Published in Proceedings of the AAAI Inaugural Summer Symposium Series 2023 (SuSS-23), Vol. 1, No. 1, pp. 142-148
Precise estimation of predictive uncertainty in deep neural networks is a critical requirement for reliable decision-making in machine learning and statistical modeling, particularly in the context of medical AI. Conformal Prediction (CP) has emerged
Externí odkaz:
http://arxiv.org/abs/2306.00876
Autor:
Kashef, Rasha, Freunek, Monika, Schwartzentruber, Jeff, Samavi, Reza, Bulgurcu, Burcu, Khan, AJ, Santos, Marcus
There is a perceived disconnect between how ad hoc industry solutions and academic research solutions in cyber security are developed and applied. Is there a difference in philosophy in how solutions to cyber security problems are developed by indust
Externí odkaz:
http://arxiv.org/abs/2302.13955
Autor:
Doyle, Thomas E., Tucci, Victoria, Zhu, Calvin, Zhang, Yifei, Yassa, Basem, Rashidiani, Sajjad, Khan, Md Asif, Samavi, Reza, Noseworthy, Michael, Yule, Steven
The rapid integration of artificial intelligence across traditional research domains has generated an amalgamation of nomenclature. As cross-discipline teams work together on complex machine learning challenges, finding a consensus of basic definitio
Externí odkaz:
http://arxiv.org/abs/2210.09086
Data breaches-mass leakage of stored information-are a major security concern. Encryption can provide confidentiality, but encryption depends on a key which, if compromised, allows the attacker to decrypt everything, effectively instantly. Security o
Externí odkaz:
http://arxiv.org/abs/2009.00086
Autor:
Liang, Yuting, Samavi, Reza
In this paper we provide an approach for deep learning that protects against adversarial examples in image classification-type networks. The approach relies on two mechanisms:1) a mechanism that increases robustness at the expense of accuracy, and, 2
Externí odkaz:
http://arxiv.org/abs/2007.01507
Autor:
Ou, Yifan, Samavi, Reza
In this paper we use game theory to model poisoning attack scenarios. We prove the non-existence of pure strategy Nash Equilibrium in the attacker and defender game. We then propose a mixed extension of our game model and an algorithm to approximate
Externí odkaz:
http://arxiv.org/abs/1906.02872
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Liang, Yuting, Samavi, Reza
Publikováno v:
In Computers & Security June 2020 93