firstbacksecondback
75 Results
Poster
|
Tue 14:00 |
Towards Robust Detection of Adversarial Examples Tianyu Pang · Chao Du · Yinpeng Dong · Jun Zhu |
|
Spotlight
|
Thu 13:45 |
Binary Classification from Positive-Confidence Data Takashi Ishida · Gang Niu · Masashi Sugiyama |
|
Poster
|
Tue 7:45 |
Multiple Instance Learning for Efficient Sequential Data Classification on Resource-constrained Devices Don Dennis · Chirag Pabbaraju · Harsha Vardhan Simhadri · Prateek Jain |
|
Poster
|
Tue 7:45 |
With Friends Like These, Who Needs Adversaries? Saumya Jetley · Nicholas Lord · Philip Torr |
|
Poster
|
Tue 7:45 |
3D Steerable CNNs: Learning Rotationally Equivariant Features in Volumetric Data Maurice Weiler · Wouter Boomsma · Mario Geiger · Max Welling · Taco Cohen |
|
Poster
|
Thu 14:00 |
Using Trusted Data to Train Deep Networks on Labels Corrupted by Severe Noise Dan Hendrycks · Mantas Mazeika · Duncan Wilson · Kevin Gimpel |
|
Poster
|
Wed 7:45 |
Adversarial Risk and Robustness: General Definitions and Implications for the Uniform Distribution Dimitrios Diochnos · Saeed Mahloujifar · Mohammad Mahmoody |
|
Poster
|
Thu 14:00 |
Persistence Fisher Kernel: A Riemannian Manifold Kernel for Persistence Diagrams Tam Le · Makoto Yamada |
|
Poster
|
Wed 14:00 |
Improving Simple Models with Confidence Profiles Amit Dhurandhar · Karthikeyan Shanmugam · Ronny Luss · Peder A Olsen |
|
Poster
|
Tue 7:45 |
Deep Anomaly Detection Using Geometric Transformations Izhak Golan · Ran El-Yaniv |
|
Poster
|
Wed 7:45 |
PAC-Bayes bounds for stable algorithms with instance-dependent priors Omar Rivasplata · Emilio Parrado-Hernandez · John Shawe-Taylor · Shiliang Sun · Csaba Szepesvari |
|
Workshop
|
Fri 15:00 |
Real Defect Image Classification through Hierarchical Data Augmentation Jiman Kim |