Alert button
Picture for Percy Liang

Percy Liang

Alert button

On the Accuracy of Influence Functions for Measuring Group Effects

Add code
Bookmark button
Alert button
May 30, 2019
Pang Wei Koh, Kai-Siang Ang, Hubert H. K. Teo, Percy Liang

Figure 1 for On the Accuracy of Influence Functions for Measuring Group Effects
Figure 2 for On the Accuracy of Influence Functions for Measuring Group Effects
Figure 3 for On the Accuracy of Influence Functions for Measuring Group Effects
Figure 4 for On the Accuracy of Influence Functions for Measuring Group Effects
Viaarxiv icon

Pre-training Graph Neural Networks

Add code
Bookmark button
Alert button
May 29, 2019
Weihua Hu, Bowen Liu, Joseph Gomes, Marinka Zitnik, Percy Liang, Vijay Pande, Jure Leskovec

Figure 1 for Pre-training Graph Neural Networks
Figure 2 for Pre-training Graph Neural Networks
Figure 3 for Pre-training Graph Neural Networks
Figure 4 for Pre-training Graph Neural Networks
Viaarxiv icon

Pun Generation with Surprise

Add code
Bookmark button
Alert button
Apr 15, 2019
He He, Nanyun Peng, Percy Liang

Figure 1 for Pun Generation with Surprise
Figure 2 for Pun Generation with Surprise
Figure 3 for Pun Generation with Surprise
Figure 4 for Pun Generation with Surprise
Viaarxiv icon

Unifying Human and Statistical Evaluation for Natural Language Generation

Add code
Bookmark button
Alert button
Apr 04, 2019
Tatsunori B. Hashimoto, Hugh Zhang, Percy Liang

Figure 1 for Unifying Human and Statistical Evaluation for Natural Language Generation
Figure 2 for Unifying Human and Statistical Evaluation for Natural Language Generation
Figure 3 for Unifying Human and Statistical Evaluation for Natural Language Generation
Figure 4 for Unifying Human and Statistical Evaluation for Natural Language Generation
Viaarxiv icon

Defending against Whitebox Adversarial Attacks via Randomized Discretization

Add code
Bookmark button
Alert button
Mar 25, 2019
Yuchen Zhang, Percy Liang

Figure 1 for Defending against Whitebox Adversarial Attacks via Randomized Discretization
Figure 2 for Defending against Whitebox Adversarial Attacks via Randomized Discretization
Figure 3 for Defending against Whitebox Adversarial Attacks via Randomized Discretization
Figure 4 for Defending against Whitebox Adversarial Attacks via Randomized Discretization
Viaarxiv icon

Uncertainty Sampling is Preconditioned Stochastic Gradient Descent on Zero-One Loss

Add code
Bookmark button
Alert button
Dec 05, 2018
Stephen Mussmann, Percy Liang

Figure 1 for Uncertainty Sampling is Preconditioned Stochastic Gradient Descent on Zero-One Loss
Figure 2 for Uncertainty Sampling is Preconditioned Stochastic Gradient Descent on Zero-One Loss
Figure 3 for Uncertainty Sampling is Preconditioned Stochastic Gradient Descent on Zero-One Loss
Figure 4 for Uncertainty Sampling is Preconditioned Stochastic Gradient Descent on Zero-One Loss
Viaarxiv icon

A Retrieve-and-Edit Framework for Predicting Structured Outputs

Add code
Bookmark button
Alert button
Dec 04, 2018
Tatsunori B. Hashimoto, Kelvin Guu, Yonatan Oren, Percy Liang

Figure 1 for A Retrieve-and-Edit Framework for Predicting Structured Outputs
Figure 2 for A Retrieve-and-Edit Framework for Predicting Structured Outputs
Figure 3 for A Retrieve-and-Edit Framework for Predicting Structured Outputs
Figure 4 for A Retrieve-and-Edit Framework for Predicting Structured Outputs
Viaarxiv icon

Semidefinite relaxations for certifying robustness to adversarial examples

Add code
Bookmark button
Alert button
Nov 02, 2018
Aditi Raghunathan, Jacob Steinhardt, Percy Liang

Figure 1 for Semidefinite relaxations for certifying robustness to adversarial examples
Figure 2 for Semidefinite relaxations for certifying robustness to adversarial examples
Figure 3 for Semidefinite relaxations for certifying robustness to adversarial examples
Figure 4 for Semidefinite relaxations for certifying robustness to adversarial examples
Viaarxiv icon

Stronger Data Poisoning Attacks Break Data Sanitization Defenses

Add code
Bookmark button
Alert button
Nov 02, 2018
Pang Wei Koh, Jacob Steinhardt, Percy Liang

Figure 1 for Stronger Data Poisoning Attacks Break Data Sanitization Defenses
Figure 2 for Stronger Data Poisoning Attacks Break Data Sanitization Defenses
Figure 3 for Stronger Data Poisoning Attacks Break Data Sanitization Defenses
Figure 4 for Stronger Data Poisoning Attacks Break Data Sanitization Defenses
Viaarxiv icon

Mapping Natural Language Commands to Web Elements

Add code
Bookmark button
Alert button
Oct 01, 2018
Panupong Pasupat, Tian-Shun Jiang, Evan Zheran Liu, Kelvin Guu, Percy Liang

Figure 1 for Mapping Natural Language Commands to Web Elements
Figure 2 for Mapping Natural Language Commands to Web Elements
Figure 3 for Mapping Natural Language Commands to Web Elements
Figure 4 for Mapping Natural Language Commands to Web Elements
Viaarxiv icon