Alert button
Picture for Dawn Song

Dawn Song

Alert button

University of California, Berkeley

Measuring Coding Challenge Competence With APPS

Add code
Bookmark button
Alert button
May 27, 2021
Dan Hendrycks, Steven Basart, Saurav Kadavath, Mantas Mazeika, Akul Arora, Ethan Guo, Collin Burns, Samir Puranik, Horace He, Dawn Song, Jacob Steinhardt

Figure 1 for Measuring Coding Challenge Competence With APPS
Figure 2 for Measuring Coding Challenge Competence With APPS
Figure 3 for Measuring Coding Challenge Competence With APPS
Figure 4 for Measuring Coding Challenge Competence With APPS
Viaarxiv icon

BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning

Add code
Bookmark button
Alert button
May 07, 2021
Lun Wang, Zaynah Javed, Xian Wu, Wenbo Guo, Xinyu Xing, Dawn Song

Figure 1 for BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning
Figure 2 for BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning
Figure 3 for BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning
Figure 4 for BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning
Viaarxiv icon

Model-Contrastive Federated Learning

Add code
Bookmark button
Alert button
Mar 30, 2021
Qinbin Li, Bingsheng He, Dawn Song

Figure 1 for Model-Contrastive Federated Learning
Figure 2 for Model-Contrastive Federated Learning
Figure 3 for Model-Contrastive Federated Learning
Figure 4 for Model-Contrastive Federated Learning
Viaarxiv icon

Measuring Mathematical Problem Solving With the MATH Dataset

Add code
Bookmark button
Alert button
Mar 05, 2021
Dan Hendrycks, Collin Burns, Saurav Kadavath, Akul Arora, Steven Basart, Eric Tang, Dawn Song, Jacob Steinhardt

Figure 1 for Measuring Mathematical Problem Solving With the MATH Dataset
Figure 2 for Measuring Mathematical Problem Solving With the MATH Dataset
Figure 3 for Measuring Mathematical Problem Solving With the MATH Dataset
Figure 4 for Measuring Mathematical Problem Solving With the MATH Dataset
Viaarxiv icon

DPlis: Boosting Utility of Differentially Private Deep Learning via Randomized Smoothing

Add code
Bookmark button
Alert button
Mar 02, 2021
Wenxiao Wang, Tianhao Wang, Lun Wang, Nanqing Luo, Pan Zhou, Dawn Song, Ruoxi Jia

Figure 1 for DPlis: Boosting Utility of Differentially Private Deep Learning via Randomized Smoothing
Figure 2 for DPlis: Boosting Utility of Differentially Private Deep Learning via Randomized Smoothing
Figure 3 for DPlis: Boosting Utility of Differentially Private Deep Learning via Randomized Smoothing
Figure 4 for DPlis: Boosting Utility of Differentially Private Deep Learning via Randomized Smoothing
Viaarxiv icon

TeraPipe: Token-Level Pipeline Parallelism for Training Large-Scale Language Models

Add code
Bookmark button
Alert button
Feb 16, 2021
Zhuohan Li, Siyuan Zhuang, Shiyuan Guo, Danyang Zhuo, Hao Zhang, Dawn Song, Ion Stoica

Figure 1 for TeraPipe: Token-Level Pipeline Parallelism for Training Large-Scale Language Models
Figure 2 for TeraPipe: Token-Level Pipeline Parallelism for Training Large-Scale Language Models
Figure 3 for TeraPipe: Token-Level Pipeline Parallelism for Training Large-Scale Language Models
Figure 4 for TeraPipe: Token-Level Pipeline Parallelism for Training Large-Scale Language Models
Viaarxiv icon

A System for Automated Open-Source Threat Intelligence Gathering and Management

Add code
Bookmark button
Alert button
Jan 19, 2021
Peng Gao, Xiaoyuan Liu, Edward Choi, Bhavna Soman, Chinmaya Mishra, Kate Farris, Dawn Song

Figure 1 for A System for Automated Open-Source Threat Intelligence Gathering and Management
Figure 2 for A System for Automated Open-Source Threat Intelligence Gathering and Management
Viaarxiv icon

A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence

Add code
Bookmark button
Alert button
Jan 17, 2021
Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Haoyuan Liu, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song

Figure 1 for A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence
Figure 2 for A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence
Figure 3 for A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence
Viaarxiv icon