Alert button
Picture for Christian Cosgrove

Christian Cosgrove

Alert button

Holistic Evaluation of Language Models

Nov 16, 2022
Percy Liang, Rishi Bommasani, Tony Lee, Dimitris Tsipras, Dilara Soylu, Michihiro Yasunaga, Yian Zhang, Deepak Narayanan, Yuhuai Wu, Ananya Kumar, Benjamin Newman, Binhang Yuan, Bobby Yan, Ce Zhang, Christian Cosgrove, Christopher D. Manning, Christopher Ré, Diana Acosta-Navas, Drew A. Hudson, Eric Zelikman, Esin Durmus, Faisal Ladhak, Frieda Rong, Hongyu Ren, Huaxiu Yao, Jue Wang, Keshav Santhanam, Laurel Orr, Lucia Zheng, Mert Yuksekgonul, Mirac Suzgun, Nathan Kim, Neel Guha, Niladri Chatterji, Omar Khattab, Peter Henderson, Qian Huang, Ryan Chi, Sang Michael Xie, Shibani Santurkar, Surya Ganguli, Tatsunori Hashimoto, Thomas Icard, Tianyi Zhang, Vishrav Chaudhary, William Wang, Xuechen Li, Yifan Mai, Yuhui Zhang, Yuta Koreeda

Figure 1 for Holistic Evaluation of Language Models
Figure 2 for Holistic Evaluation of Language Models
Figure 3 for Holistic Evaluation of Language Models
Figure 4 for Holistic Evaluation of Language Models
Viaarxiv icon

Robustness Out of the Box: Compositional Representations Naturally Defend Against Black-Box Patch Attacks

Dec 01, 2020
Christian Cosgrove, Adam Kortylewski, Chenglin Yang, Alan Yuille

Figure 1 for Robustness Out of the Box: Compositional Representations Naturally Defend Against Black-Box Patch Attacks
Figure 2 for Robustness Out of the Box: Compositional Representations Naturally Defend Against Black-Box Patch Attacks
Figure 3 for Robustness Out of the Box: Compositional Representations Naturally Defend Against Black-Box Patch Attacks
Figure 4 for Robustness Out of the Box: Compositional Representations Naturally Defend Against Black-Box Patch Attacks
Viaarxiv icon

Adversarial Examples for Edge Detection: They Exist, and They Transfer

Jun 02, 2019
Christian Cosgrove, Alan L. Yuille

Figure 1 for Adversarial Examples for Edge Detection: They Exist, and They Transfer
Figure 2 for Adversarial Examples for Edge Detection: They Exist, and They Transfer
Figure 3 for Adversarial Examples for Edge Detection: They Exist, and They Transfer
Figure 4 for Adversarial Examples for Edge Detection: They Exist, and They Transfer
Viaarxiv icon