Alert button
Picture for Cynthia Matuszek

Cynthia Matuszek

Alert button

Dialogue with Robots: Proposals for Broadening Participation and Research in the SLIVAR Community

Add code
Bookmark button
Alert button
Apr 01, 2024
Casey Kennington, Malihe Alikhani, Heather Pon-Barry, Katherine Atwell, Yonatan Bisk, Daniel Fried, Felix Gervits, Zhao Han, Mert Inan, Michael Johnston, Raj Korpan, Diane Litman, Matthew Marge, Cynthia Matuszek, Ross Mead, Shiwali Mohan, Raymond Mooney, Natalie Parde, Jivko Sinapov, Angela Stewart, Matthew Stone, Stefanie Tellex, Tom Williams

Viaarxiv icon

Cyber-Security Knowledge Graph Generation by Hierarchical Nonnegative Matrix Factorization

Add code
Bookmark button
Alert button
Mar 26, 2024
Ryan Barron, Maksim E. Eren, Manish Bhattarai, Selma Wanna, Nicholas Solovyev, Kim Rasmussen, Boian S. Alexandrov, Charles Nicholas, Cynthia Matuszek

Viaarxiv icon

Small Effect Sizes in Malware Detection? Make Harder Train/Test Splits!

Add code
Bookmark button
Alert button
Dec 25, 2023
Tirth Patel, Fred Lu, Edward Raff, Charles Nicholas, Cynthia Matuszek, James Holt

Viaarxiv icon

DDxT: Deep Generative Transformer Models for Differential Diagnosis

Add code
Bookmark button
Alert button
Dec 02, 2023
Mohammad Mahmudul Alam, Edward Raff, Tim Oates, Cynthia Matuszek

Figure 1 for DDxT: Deep Generative Transformer Models for Differential Diagnosis
Figure 2 for DDxT: Deep Generative Transformer Models for Differential Diagnosis
Figure 3 for DDxT: Deep Generative Transformer Models for Differential Diagnosis
Figure 4 for DDxT: Deep Generative Transformer Models for Differential Diagnosis
Viaarxiv icon

Measuring Equality in Machine Learning Security Defenses

Add code
Bookmark button
Alert button
Mar 01, 2023
Luke E. Richards, Edward Raff, Cynthia Matuszek

Figure 1 for Measuring Equality in Machine Learning Security Defenses
Figure 2 for Measuring Equality in Machine Learning Security Defenses
Figure 3 for Measuring Equality in Machine Learning Security Defenses
Figure 4 for Measuring Equality in Machine Learning Security Defenses
Viaarxiv icon

Bridging the Gap: Using Deep Acoustic Representations to Learn Grounded Language from Percepts and Raw Speech

Add code
Bookmark button
Alert button
Dec 27, 2021
Gaoussou Youssouf Kebe, Luke E. Richards, Edward Raff, Francis Ferraro, Cynthia Matuszek

Figure 1 for Bridging the Gap: Using Deep Acoustic Representations to Learn Grounded Language from Percepts and Raw Speech
Figure 2 for Bridging the Gap: Using Deep Acoustic Representations to Learn Grounded Language from Percepts and Raw Speech
Figure 3 for Bridging the Gap: Using Deep Acoustic Representations to Learn Grounded Language from Percepts and Raw Speech
Figure 4 for Bridging the Gap: Using Deep Acoustic Representations to Learn Grounded Language from Percepts and Raw Speech
Viaarxiv icon

Adversarial Transfer Attacks With Unknown Data and Class Overlap

Add code
Bookmark button
Alert button
Sep 24, 2021
Luke E. Richards, André Nguyen, Ryan Capps, Steven Forsythe, Cynthia Matuszek, Edward Raff

Figure 1 for Adversarial Transfer Attacks With Unknown Data and Class Overlap
Figure 2 for Adversarial Transfer Attacks With Unknown Data and Class Overlap
Figure 3 for Adversarial Transfer Attacks With Unknown Data and Class Overlap
Figure 4 for Adversarial Transfer Attacks With Unknown Data and Class Overlap
Viaarxiv icon

Neural Variational Learning for Grounded Language Acquisition

Add code
Bookmark button
Alert button
Jul 20, 2021
Nisha Pillai, Cynthia Matuszek, Francis Ferraro

Figure 1 for Neural Variational Learning for Grounded Language Acquisition
Figure 2 for Neural Variational Learning for Grounded Language Acquisition
Figure 3 for Neural Variational Learning for Grounded Language Acquisition
Figure 4 for Neural Variational Learning for Grounded Language Acquisition
Viaarxiv icon