Alert button
Picture for Christopher Leckie

Christopher Leckie

Alert button

Round Trip Translation Defence against Large Language Model Jailbreaking Attacks

Add code
Bookmark button
Alert button
Feb 21, 2024
Canaan Yung, Hadi Mohaghegh Dolatabadi, Sarah Erfani, Christopher Leckie

Viaarxiv icon

Be Persistent: Towards a Unified Solution for Mitigating Shortcuts in Deep Learning

Add code
Bookmark button
Alert button
Feb 17, 2024
Hadi M. Dolatabadi, Sarah M. Erfani, Christopher Leckie

Viaarxiv icon

An Interpretable Low-complexity Model for Wireless Channel Estimation

Add code
Bookmark button
Alert button
Feb 12, 2024
Zainab Zaidi, Tansu Alpcan, Christopher Leckie, Sarah Efrain

Viaarxiv icon

OIL-AD: An Anomaly Detection Framework for Sequential Decision Sequences

Add code
Bookmark button
Alert button
Feb 07, 2024
Chen Wang, Sarah Erfani, Tansu Alpcan, Christopher Leckie

Viaarxiv icon

Open-Set Graph Anomaly Detection via Normal Structure Regularisation

Add code
Bookmark button
Alert button
Nov 12, 2023
Qizhou Wang, Guansong Pang, Mahsa Salehi, Wray Buntine, Christopher Leckie

Viaarxiv icon

Towards quantum enhanced adversarial robustness in machine learning

Add code
Bookmark button
Alert button
Jun 22, 2023
Maxwell T. West, Shu-Lok Tsang, Jia S. Low, Charles D. Hill, Christopher Leckie, Lloyd C. L. Hollenberg, Sarah M. Erfani, Muhammad Usman

Viaarxiv icon

Unsupervised Domain-agnostic Fake News Detection using Multi-modal Weak Signals

Add code
Bookmark button
Alert button
May 18, 2023
Amila Silva, Ling Luo, Shanika Karunasekera, Christopher Leckie

Figure 1 for Unsupervised Domain-agnostic Fake News Detection using Multi-modal Weak Signals
Figure 2 for Unsupervised Domain-agnostic Fake News Detection using Multi-modal Weak Signals
Figure 3 for Unsupervised Domain-agnostic Fake News Detection using Multi-modal Weak Signals
Figure 4 for Unsupervised Domain-agnostic Fake News Detection using Multi-modal Weak Signals
Viaarxiv icon

Failure-tolerant Distributed Learning for Anomaly Detection in Wireless Networks

Add code
Bookmark button
Alert button
Mar 23, 2023
Marc Katzef, Andrew C. Cullen, Tansu Alpcan, Christopher Leckie, Justin Kopacz

Figure 1 for Failure-tolerant Distributed Learning for Anomaly Detection in Wireless Networks
Figure 2 for Failure-tolerant Distributed Learning for Anomaly Detection in Wireless Networks
Figure 3 for Failure-tolerant Distributed Learning for Anomaly Detection in Wireless Networks
Figure 4 for Failure-tolerant Distributed Learning for Anomaly Detection in Wireless Networks
Viaarxiv icon

The Devil's Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models

Add code
Bookmark button
Alert button
Mar 15, 2023
Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie

Figure 1 for The Devil's Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models
Figure 2 for The Devil's Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models
Figure 3 for The Devil's Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models
Figure 4 for The Devil's Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models
Viaarxiv icon

Cross-Domain Graph Anomaly Detection via Anomaly-aware Contrastive Alignment

Add code
Bookmark button
Alert button
Dec 02, 2022
Qizhou Wang, Guansong Pang, Mahsa Salehi, Wray Buntine, Christopher Leckie

Figure 1 for Cross-Domain Graph Anomaly Detection via Anomaly-aware Contrastive Alignment
Figure 2 for Cross-Domain Graph Anomaly Detection via Anomaly-aware Contrastive Alignment
Figure 3 for Cross-Domain Graph Anomaly Detection via Anomaly-aware Contrastive Alignment
Figure 4 for Cross-Domain Graph Anomaly Detection via Anomaly-aware Contrastive Alignment
Viaarxiv icon