Alert button
Picture for Anna Squicciarini

Anna Squicciarini

Alert button

RoCourseNet: Distributionally Robust Training of a Prediction Aware Recourse Model

Add code
Bookmark button
Alert button
Jun 01, 2022
Hangzhi Guo, Feiran Jia, Jinghui Chen, Anna Squicciarini, Amulya Yadav

Figure 1 for RoCourseNet: Distributionally Robust Training of a Prediction Aware Recourse Model
Figure 2 for RoCourseNet: Distributionally Robust Training of a Prediction Aware Recourse Model
Figure 3 for RoCourseNet: Distributionally Robust Training of a Prediction Aware Recourse Model
Figure 4 for RoCourseNet: Distributionally Robust Training of a Prediction Aware Recourse Model
Viaarxiv icon

Automated Detection of Doxing on Twitter

Add code
Bookmark button
Alert button
Feb 02, 2022
Younes Karimi, Anna Squicciarini, Shomir Wilson

Figure 1 for Automated Detection of Doxing on Twitter
Figure 2 for Automated Detection of Doxing on Twitter
Figure 3 for Automated Detection of Doxing on Twitter
Figure 4 for Automated Detection of Doxing on Twitter
Viaarxiv icon

A Longitudinal Dataset of Twitter ISIS Users

Add code
Bookmark button
Alert button
Feb 02, 2022
Younes Karimi, Anna Squicciarini, Peter K. Forster, Kira M. Leavitt

Figure 1 for A Longitudinal Dataset of Twitter ISIS Users
Figure 2 for A Longitudinal Dataset of Twitter ISIS Users
Figure 3 for A Longitudinal Dataset of Twitter ISIS Users
Figure 4 for A Longitudinal Dataset of Twitter ISIS Users
Viaarxiv icon

A Synthetic Prediction Market for Estimating Confidence in Published Work

Add code
Bookmark button
Alert button
Dec 23, 2021
Sarah Rajtmajer, Christopher Griffin, Jian Wu, Robert Fraleigh, Laxmaan Balaji, Anna Squicciarini, Anthony Kwasnica, David Pennock, Michael McLaughlin, Timothy Fritton, Nishanth Nakshatri, Arjun Menon, Sai Ajay Modukuri, Rajal Nivargi, Xin Wei, C. Lee Giles

Figure 1 for A Synthetic Prediction Market for Estimating Confidence in Published Work
Viaarxiv icon

Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation

Add code
Bookmark button
Alert button
Aug 30, 2018
Cong Liao, Haoti Zhong, Anna Squicciarini, Sencun Zhu, David Miller

Figure 1 for Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
Figure 2 for Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
Figure 3 for Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
Figure 4 for Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
Viaarxiv icon