Alert button
Picture for Justin Khim

Justin Khim

Alert button

Statistical Theory for Imbalanced Binary Classification

Add code
Bookmark button
Alert button
Jul 05, 2021
Shashank Singh, Justin Khim

Figure 1 for Statistical Theory for Imbalanced Binary Classification
Figure 2 for Statistical Theory for Imbalanced Binary Classification
Viaarxiv icon

Class-Weighted Classification: Trade-offs and Robust Approaches

Add code
Bookmark button
Alert button
May 26, 2020
Ziyu Xu, Chen Dan, Justin Khim, Pradeep Ravikumar

Figure 1 for Class-Weighted Classification: Trade-offs and Robust Approaches
Figure 2 for Class-Weighted Classification: Trade-offs and Robust Approaches
Figure 3 for Class-Weighted Classification: Trade-offs and Robust Approaches
Figure 4 for Class-Weighted Classification: Trade-offs and Robust Approaches
Viaarxiv icon

Multiclass Classification via Class-Weighted Nearest Neighbors

Add code
Bookmark button
Alert button
May 04, 2020
Justin Khim, Ziyu Xu, Shashank Singh

Figure 1 for Multiclass Classification via Class-Weighted Nearest Neighbors
Figure 2 for Multiclass Classification via Class-Weighted Nearest Neighbors
Figure 3 for Multiclass Classification via Class-Weighted Nearest Neighbors
Figure 4 for Multiclass Classification via Class-Weighted Nearest Neighbors
Viaarxiv icon

Adversarial Risk Bounds for Binary Classification via Function Transformation

Add code
Bookmark button
Alert button
Oct 22, 2018
Justin Khim, Po-Ling Loh

Figure 1 for Adversarial Risk Bounds for Binary Classification via Function Transformation
Figure 2 for Adversarial Risk Bounds for Binary Classification via Function Transformation
Figure 3 for Adversarial Risk Bounds for Binary Classification via Function Transformation
Viaarxiv icon

Computationally Efficient Influence Maximization in Stochastic and Adversarial Models: Algorithms and Analysis

Add code
Bookmark button
Alert button
Nov 01, 2016
Justin Khim, Varun Jog, Po-Ling Loh

Figure 1 for Computationally Efficient Influence Maximization in Stochastic and Adversarial Models: Algorithms and Analysis
Figure 2 for Computationally Efficient Influence Maximization in Stochastic and Adversarial Models: Algorithms and Analysis
Figure 3 for Computationally Efficient Influence Maximization in Stochastic and Adversarial Models: Algorithms and Analysis
Viaarxiv icon

Confidence Sets for the Source of a Diffusion in Regular Trees

Add code
Bookmark button
Alert button
Oct 19, 2015
Justin Khim, Po-Ling Loh

Figure 1 for Confidence Sets for the Source of a Diffusion in Regular Trees
Figure 2 for Confidence Sets for the Source of a Diffusion in Regular Trees
Figure 3 for Confidence Sets for the Source of a Diffusion in Regular Trees
Figure 4 for Confidence Sets for the Source of a Diffusion in Regular Trees
Viaarxiv icon