Search

Your search keyword '"Erfani, Sarah M."' showing total 125 results

Search Constraints

Start Over You searched for: Author "Erfani, Sarah M." Remove constraint Author: "Erfani, Sarah M."
125 results on '"Erfani, Sarah M."'

Search Results

1. Be Persistent: Towards a Unified Solution for Mitigating Shortcuts in Deep Learning

2. It's Simplex! Disaggregating Measures to Improve Certified Robustness

3. Enhancing the Antidote: Improved Pointwise Certifications against Poisoning Attacks

4. Towards quantum enhanced adversarial robustness in machine learning

5. Et Tu Certifications: Robustness Certificates Yield Better Adversarial Examples

6. Hybrid Quantum-Classical Generative Adversarial Network for High Resolution Image Generation

7. Benchmarking Adversarially Robust Quantum Machine Learning at Scale

8. Double Bubble, Toil and Trouble: Enhancing Certified Robustness through Transitivity

10. Performance analysis of coreset selection for quantum implementation of K-Means clustering algorithm

11. Local Intrinsic Dimensionality Signals Adversarial Perturbations

12. A Deep Adversarial Model for Suffix and Remaining Time Prediction of Event Sequences

13. Neural Architecture Search via Combinatorial Multi-Armed Bandit

14. Improving Scalability of Contrast Pattern Mining for Network Traffic Using Closed Patterns

15. EnSpeciVAT: Enhanced SpecieVAT for Cluster Tendency Identification in Graphs

16. Defending Distributed Classifiers Against Data Poisoning Attacks

17. Defending Regression Learners Against Poisoning Attacks

18. Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection

19. Dimensionality-Driven Learning with Noisy Labels

20. Online Cluster Validity Indices for Streaming Data

21. Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality

22. Toward the Starting Line: A Systems Engineering Approach to Strong AI

23. Fuzzy c-Shape: A new algorithm for clustering finite time series waveforms

26. Deep Learning Based Game-Theoretical Approach to Evade Jamming Attacks

32. Improved Classification of Known and Unknown Network Traffic Flows Using Semi-supervised Machine Learning

33. Unsupervised Parameter Estimation for One-Class Support Vector Machines

35. Privacy-Preserving Collaborative Anomaly Detection for Participatory Sensing

38. The Certification Paradox: Certifications Admit Better Attacks

47. Are you with me?:Measurement of Learners’ Video-Watching Attention with Eye Tracking

Catalog

Books, media, physical & digital resources