Picture for Debojyoti Dutta

Debojyoti Dutta

Introducing v0.5 of the AI Safety Benchmark from MLCommons

Add code
Apr 18, 2024
Figure 1 for Introducing v0.5 of the AI Safety Benchmark from MLCommons
Figure 2 for Introducing v0.5 of the AI Safety Benchmark from MLCommons
Figure 3 for Introducing v0.5 of the AI Safety Benchmark from MLCommons
Figure 4 for Introducing v0.5 of the AI Safety Benchmark from MLCommons
Viaarxiv icon

DMLR: Data-centric Machine Learning Research -- Past, Present and Future

Add code
Nov 21, 2023
Figure 1 for DMLR: Data-centric Machine Learning Research -- Past, Present and Future
Figure 2 for DMLR: Data-centric Machine Learning Research -- Past, Present and Future
Figure 3 for DMLR: Data-centric Machine Learning Research -- Past, Present and Future
Viaarxiv icon

Data-Driven Evaluation of Training Action Space for Reinforcement Learning

Add code
Apr 08, 2022
Figure 1 for Data-Driven Evaluation of Training Action Space for Reinforcement Learning
Figure 2 for Data-Driven Evaluation of Training Action Space for Reinforcement Learning
Figure 3 for Data-Driven Evaluation of Training Action Space for Reinforcement Learning
Figure 4 for Data-Driven Evaluation of Training Action Space for Reinforcement Learning
Viaarxiv icon

MLPerf Training Benchmark

Add code
Oct 30, 2019
Figure 1 for MLPerf Training Benchmark
Figure 2 for MLPerf Training Benchmark
Figure 3 for MLPerf Training Benchmark
Figure 4 for MLPerf Training Benchmark
Viaarxiv icon

Foreign English Accent Adjustment by Learning Phonetic Patterns

Add code
Jul 09, 2018
Figure 1 for Foreign English Accent Adjustment by Learning Phonetic Patterns
Figure 2 for Foreign English Accent Adjustment by Learning Phonetic Patterns
Figure 3 for Foreign English Accent Adjustment by Learning Phonetic Patterns
Viaarxiv icon

Detecting fraudulent activity in a cloud using privacy-friendly data aggregates

Add code
Nov 25, 2014
Figure 1 for Detecting fraudulent activity in a cloud using privacy-friendly data aggregates
Figure 2 for Detecting fraudulent activity in a cloud using privacy-friendly data aggregates
Figure 3 for Detecting fraudulent activity in a cloud using privacy-friendly data aggregates
Figure 4 for Detecting fraudulent activity in a cloud using privacy-friendly data aggregates
Viaarxiv icon