1 code implementation • 22 Jul 2023 • Chen Rui, Liang Guotao, Ma Chenrui, Han Qilong, Li Li, Huang Xiao
In this paper, we systematically investigate various temporal information for sequential recommendation and identify three types of advantageous temporal patterns beyond order, including absolute time information, relative item time intervals and relative recommendation time intervals.
no code implementations • 1 Jun 2022 • Huang Xiao, Battista Biggio, Blaine Nelson, Han Xiao, Claudia Eckert, Fabio Roli
Machine learning algorithms are increasingly being applied in security-related tasks such as spam and malware detection, although their security properties against deliberate attacks have not yet been widely understood.
no code implementations • 19 Jun 2019 • Huang Xiao, Michael Herman, Joerg Wagner, Sebastian Ziesche, Jalal Etesami, Thai Hong Linh
Imitation Learning describes the problem of recovering an expert policy from demonstrations.
no code implementations • 21 Apr 2018 • Huang Xiao, Battista Biggio, Gavin Brown, Giorgio Fumera, Claudia Eckert, Fabio Roli
Learning in adversarial settings is becoming an important task for application domains where attackers may inject malicious data into the training set to subvert normal operation of data-driven technologies.