Alert button
Picture for Mark Dras

Mark Dras

Alert button

Here's a Free Lunch: Sanitizing Backdoored Models with Model Merge

Add code
Bookmark button
Alert button
Feb 29, 2024
Ansh Arora, Xuanli He, Maximilian Mozes, Srinibas Swain, Mark Dras, Qiongkai Xu

Viaarxiv icon

What Learned Representations and Influence Functions Can Tell Us About Adversarial Examples

Add code
Bookmark button
Alert button
Sep 21, 2023
Shakila Mahjabin Tonni, Mark Dras

Figure 1 for What Learned Representations and Influence Functions Can Tell Us About Adversarial Examples
Figure 2 for What Learned Representations and Influence Functions Can Tell Us About Adversarial Examples
Figure 3 for What Learned Representations and Influence Functions Can Tell Us About Adversarial Examples
Figure 4 for What Learned Representations and Influence Functions Can Tell Us About Adversarial Examples
Viaarxiv icon

OptIForest: Optimal Isolation Forest for Anomaly Detection

Add code
Bookmark button
Alert button
Jun 23, 2023
Haolong Xiang, Xuyun Zhang, Hongsheng Hu, Lianyong Qi, Wanchun Dou, Mark Dras, Amin Beheshti, Xiaolong Xu

Figure 1 for OptIForest: Optimal Isolation Forest for Anomaly Detection
Figure 2 for OptIForest: Optimal Isolation Forest for Anomaly Detection
Figure 3 for OptIForest: Optimal Isolation Forest for Anomaly Detection
Figure 4 for OptIForest: Optimal Isolation Forest for Anomaly Detection
Viaarxiv icon

Directional Privacy for Deep Learning

Add code
Bookmark button
Alert button
Nov 09, 2022
Pedro Faustini, Natasha Fernandes, Annabelle McIver, Mark Dras

Figure 1 for Directional Privacy for Deep Learning
Figure 2 for Directional Privacy for Deep Learning
Figure 3 for Directional Privacy for Deep Learning
Figure 4 for Directional Privacy for Deep Learning
Viaarxiv icon

Detecting Textual Adversarial Examples Based on Distributional Characteristics of Data Representations

Add code
Bookmark button
Alert button
Apr 29, 2022
Na Liu, Mark Dras, Wei Emma Zhang

Figure 1 for Detecting Textual Adversarial Examples Based on Distributional Characteristics of Data Representations
Figure 2 for Detecting Textual Adversarial Examples Based on Distributional Characteristics of Data Representations
Figure 3 for Detecting Textual Adversarial Examples Based on Distributional Characteristics of Data Representations
Figure 4 for Detecting Textual Adversarial Examples Based on Distributional Characteristics of Data Representations
Viaarxiv icon

Deep Reinforcement Learning Guided Graph Neural Networks for Brain Network Analysis

Add code
Bookmark button
Alert button
Mar 18, 2022
Xusheng Zhao, Jia Wu, Hao Peng, Amin Beheshti, Jessica Monaghan, David McAlpine, Heivet Hernandez-Perez, Mark Dras, Qiong Dai, Yangyang Li, Philip S. Yu, Lifang He

Figure 1 for Deep Reinforcement Learning Guided Graph Neural Networks for Brain Network Analysis
Figure 2 for Deep Reinforcement Learning Guided Graph Neural Networks for Brain Network Analysis
Figure 3 for Deep Reinforcement Learning Guided Graph Neural Networks for Brain Network Analysis
Figure 4 for Deep Reinforcement Learning Guided Graph Neural Networks for Brain Network Analysis
Viaarxiv icon

Neural Rule-Execution Tracking Machine For Transformer-Based Text Generation

Add code
Bookmark button
Alert button
Jul 27, 2021
Yufei Wang, Can Xu, Huang Hu, Chongyang Tao, Stephen Wan, Mark Dras, Mark Johnson, Daxin Jiang

Figure 1 for Neural Rule-Execution Tracking Machine For Transformer-Based Text Generation
Figure 2 for Neural Rule-Execution Tracking Machine For Transformer-Based Text Generation
Figure 3 for Neural Rule-Execution Tracking Machine For Transformer-Based Text Generation
Figure 4 for Neural Rule-Execution Tracking Machine For Transformer-Based Text Generation
Viaarxiv icon

Pick-Object-Attack: Type-Specific Adversarial Attack for Object Detection

Add code
Bookmark button
Alert button
Jun 05, 2020
Omid Mohamad Nezami, Akshay Chaturvedi, Mark Dras, Utpal Garain

Figure 1 for Pick-Object-Attack: Type-Specific Adversarial Attack for Object Detection
Figure 2 for Pick-Object-Attack: Type-Specific Adversarial Attack for Object Detection
Figure 3 for Pick-Object-Attack: Type-Specific Adversarial Attack for Object Detection
Figure 4 for Pick-Object-Attack: Type-Specific Adversarial Attack for Object Detection
Viaarxiv icon

Siamese Networks for Large-Scale Author Identification

Add code
Bookmark button
Alert button
Jan 21, 2020
Chakaveh Saedi, Mark Dras

Figure 1 for Siamese Networks for Large-Scale Author Identification
Figure 2 for Siamese Networks for Large-Scale Author Identification
Figure 3 for Siamese Networks for Large-Scale Author Identification
Figure 4 for Siamese Networks for Large-Scale Author Identification
Viaarxiv icon