Picture for Chris Emmery

Chris Emmery

Native Language Identification with Big Bird Embeddings

Add code
Sep 13, 2023
Figure 1 for Native Language Identification with Big Bird Embeddings
Figure 2 for Native Language Identification with Big Bird Embeddings
Figure 3 for Native Language Identification with Big Bird Embeddings
Figure 4 for Native Language Identification with Big Bird Embeddings
Viaarxiv icon

Tailoring Domain Adaptation for Machine Translation Quality Estimation

Add code
Apr 18, 2023
Viaarxiv icon

User-Centered Security in Natural Language Processing

Add code
Jan 10, 2023
Figure 1 for User-Centered Security in Natural Language Processing
Figure 2 for User-Centered Security in Natural Language Processing
Figure 3 for User-Centered Security in Natural Language Processing
Figure 4 for User-Centered Security in Natural Language Processing
Viaarxiv icon

Neural Data-to-Text Generation Based on Small Datasets: Comparing the Added Value of Two Semi-Supervised Learning Approaches on Top of a Large Language Model

Add code
Jul 14, 2022
Figure 1 for Neural Data-to-Text Generation Based on Small Datasets: Comparing the Added Value of Two Semi-Supervised Learning Approaches on Top of a Large Language Model
Figure 2 for Neural Data-to-Text Generation Based on Small Datasets: Comparing the Added Value of Two Semi-Supervised Learning Approaches on Top of a Large Language Model
Figure 3 for Neural Data-to-Text Generation Based on Small Datasets: Comparing the Added Value of Two Semi-Supervised Learning Approaches on Top of a Large Language Model
Figure 4 for Neural Data-to-Text Generation Based on Small Datasets: Comparing the Added Value of Two Semi-Supervised Learning Approaches on Top of a Large Language Model
Viaarxiv icon

Cyberbullying Classifiers are Sensitive to Model-Agnostic Perturbations

Add code
Jan 17, 2022
Figure 1 for Cyberbullying Classifiers are Sensitive to Model-Agnostic Perturbations
Figure 2 for Cyberbullying Classifiers are Sensitive to Model-Agnostic Perturbations
Figure 3 for Cyberbullying Classifiers are Sensitive to Model-Agnostic Perturbations
Figure 4 for Cyberbullying Classifiers are Sensitive to Model-Agnostic Perturbations
Viaarxiv icon

NeuTral Rewriter: A Rule-Based and Neural Approach to Automatic Rewriting into Gender-Neutral Alternatives

Add code
Sep 13, 2021
Figure 1 for NeuTral Rewriter: A Rule-Based and Neural Approach to Automatic Rewriting into Gender-Neutral Alternatives
Figure 2 for NeuTral Rewriter: A Rule-Based and Neural Approach to Automatic Rewriting into Gender-Neutral Alternatives
Figure 3 for NeuTral Rewriter: A Rule-Based and Neural Approach to Automatic Rewriting into Gender-Neutral Alternatives
Figure 4 for NeuTral Rewriter: A Rule-Based and Neural Approach to Automatic Rewriting into Gender-Neutral Alternatives
Viaarxiv icon

Adversarial Stylometry in the Wild: Transferable Lexical Substitution Attacks on Author Profiling

Add code
Jan 27, 2021
Figure 1 for Adversarial Stylometry in the Wild: Transferable Lexical Substitution Attacks on Author Profiling
Figure 2 for Adversarial Stylometry in the Wild: Transferable Lexical Substitution Attacks on Author Profiling
Figure 3 for Adversarial Stylometry in the Wild: Transferable Lexical Substitution Attacks on Author Profiling
Figure 4 for Adversarial Stylometry in the Wild: Transferable Lexical Substitution Attacks on Author Profiling
Viaarxiv icon

Current Limitations in Cyberbullying Detection: on Evaluation Criteria, Reproducibility, and Data Scarcity

Add code
Oct 25, 2019
Figure 1 for Current Limitations in Cyberbullying Detection: on Evaluation Criteria, Reproducibility, and Data Scarcity
Figure 2 for Current Limitations in Cyberbullying Detection: on Evaluation Criteria, Reproducibility, and Data Scarcity
Figure 3 for Current Limitations in Cyberbullying Detection: on Evaluation Criteria, Reproducibility, and Data Scarcity
Figure 4 for Current Limitations in Cyberbullying Detection: on Evaluation Criteria, Reproducibility, and Data Scarcity
Viaarxiv icon

Style Obfuscation by Invariance

Add code
May 18, 2018
Figure 1 for Style Obfuscation by Invariance
Figure 2 for Style Obfuscation by Invariance
Figure 3 for Style Obfuscation by Invariance
Figure 4 for Style Obfuscation by Invariance
Viaarxiv icon

Automatic Detection of Cyberbullying in Social Media Text

Add code
Jan 17, 2018
Figure 1 for Automatic Detection of Cyberbullying in Social Media Text
Figure 2 for Automatic Detection of Cyberbullying in Social Media Text
Figure 3 for Automatic Detection of Cyberbullying in Social Media Text
Figure 4 for Automatic Detection of Cyberbullying in Social Media Text
Viaarxiv icon