Alert button
Picture for Rasika Bhalerao

Rasika Bhalerao

Alert button

Pretraining Language Models with Human Preferences

Add code
Bookmark button
Alert button
Feb 16, 2023
Tomasz Korbak, Kejian Shi, Angelica Chen, Rasika Bhalerao, Christopher L. Buckley, Jason Phang, Samuel R. Bowman, Ethan Perez

Figure 1 for Pretraining Language Models with Human Preferences
Figure 2 for Pretraining Language Models with Human Preferences
Figure 3 for Pretraining Language Models with Human Preferences
Figure 4 for Pretraining Language Models with Human Preferences
Viaarxiv icon

Data-Driven Mitigation of Adversarial Text Perturbation

Add code
Bookmark button
Alert button
Feb 19, 2022
Rasika Bhalerao, Mohammad Al-Rubaie, Anand Bhaskar, Igor Markov

Figure 1 for Data-Driven Mitigation of Adversarial Text Perturbation
Figure 2 for Data-Driven Mitigation of Adversarial Text Perturbation
Figure 3 for Data-Driven Mitigation of Adversarial Text Perturbation
Figure 4 for Data-Driven Mitigation of Adversarial Text Perturbation
Viaarxiv icon

CrowS-Pairs: A Challenge Dataset for Measuring Social Biases in Masked Language Models

Add code
Bookmark button
Alert button
Sep 30, 2020
Nikita Nangia, Clara Vania, Rasika Bhalerao, Samuel R. Bowman

Figure 1 for CrowS-Pairs: A Challenge Dataset for Measuring Social Biases in Masked Language Models
Figure 2 for CrowS-Pairs: A Challenge Dataset for Measuring Social Biases in Masked Language Models
Figure 3 for CrowS-Pairs: A Challenge Dataset for Measuring Social Biases in Masked Language Models
Figure 4 for CrowS-Pairs: A Challenge Dataset for Measuring Social Biases in Masked Language Models
Viaarxiv icon

Towards Automatic Discovery of Cybercrime Supply Chains

Add code
Bookmark button
Alert button
Dec 04, 2018
Rasika Bhalerao, Maxwell Aliapoulios, Ilia Shumailov, Sadia Afroz, Damon McCoy

Figure 1 for Towards Automatic Discovery of Cybercrime Supply Chains
Figure 2 for Towards Automatic Discovery of Cybercrime Supply Chains
Figure 3 for Towards Automatic Discovery of Cybercrime Supply Chains
Figure 4 for Towards Automatic Discovery of Cybercrime Supply Chains
Viaarxiv icon