1 code implementation • 31 Aug 2021 • Mohammad Mamun, Kevin Shi
To the best of knowledge this is the very first attempt of using recently introduced OpTC dataset for cyber threat detection.
no code implementations • 19 May 2021 • Hadi Hosseini, Debmalya Mandal, Nisarg Shah, Kevin Shi
A clever recent approach, \emph{surprisingly popular voting}, elicits additional information from the individuals, namely their \emph{prediction} of other individuals' votes, and provably recovers the ground truth even when experts are in minority.
no code implementations • 7 Jun 2019 • Kevin Shi, Daniel Hsu, Allison Bishop
We propose a new randomized ensemble technique with a provable security guarantee against black-box transfer attacks.
no code implementations • NeurIPS 2017 • Daniel Hsu, Kevin Shi, Xiaorui Sun
Next, in an average-case and noise-free setting where the responses exactly correspond to a linear function of i. i. d.