• Skip to primary navigation
  • Skip to content
  • Skip to footer
About deep2Read
  • PostsByYear
  • PostsByTags
  • PostsByCategory
  • BasicDeepLearning
  • DetailedByTerm
  • DetailedByCategory
  • DetailedByTag

    Dr. Yanjun Qi

    Here are Papers I Reviewed. I am science curious.

    • MyHomePage
    • Twitter
    • GitHub

    Reviews Indexed

    • Index
      • PostsByYear
      • PostsByTags
      • PostsByCategory
    • Recent Posts By GenAI Category
      • FM Basic
      • FM Adapt
      • FM Risk
      • FM Multi
      • FM Efficiency
    • Past Posts By DNN Category
      • 0Basics
      • 1Theoretical
      • 2Architecture
      • 2GraphsNN
      • 3Reliable
      • 4Optimization
      • 5Generative
      • 6Reinforcement
      • 7MetaDomain
      • 8Scalable
      • 9DiscreteApp
    • Basic DNN Reads
      • BasicDeep
      • BasicML

    deep2reproduce 2019 Fall - 3Reliable papers

    less than 1 minute read

    On this page

    Team INDEX Title & Link Tags Our Slide
    T3 Deletion-Robust Submodular Maximization: Data Summarization with Privacy and Fairness Constraints submodular, coreset, safety OurSlide
    T6 Decision Boundary Analysis of Adversarial Examples adversarial-examples OurSlide
    T8 Robustness may be at odds with accuracy robustness OurSlide
    T18 Towards Reverse-Engineering Black-Box Neural Networks meta, model-as-sample, safety, privacy OurSlide
    T23 The Odds are Odd: A Statistical Test for Detecting Adversarial Examples adversarial-examples OurSlide
    T25 Learning how to explain neural networks: PatternNet and PatternAttribution Attribution, Interpretable OurSlide
    T31 Detecting Statistical Interactions from Neural Network Weights Interpretable, Relational OurSlide

    Tags: adversarial-examples, Attribution, model-as-sample, privacy, Relational, robustness, safety, submodular

    Categories: 3Reliable

    Updated: December 10, 2019

    Twitter Facebook LinkedIn
    Previous Next

    You May Also Enjoy

    Safety Benchmark WMDP

    1 minute read

    The WMDP Benchmark: Measuring and Reducing Malicious Use With Unlearning Nathaniel Li, Alexander Pan, Anjali Gopal, Summer Yue, Daniel Berrios, Alice Gatt...

    KV Cache and Tooling

    3 minute read

    KV Caching in LLM:

    Advanced Transformer Architectures

    25 minute read

    In this session, our readings cover:

    LLM fine tuning

    29 minute read

    In this session, our readings cover:

    • Twitter
    • GitHub
    • Feed
    © 2024 About deep2Read. Powered by Jekyll & Minimal Mistakes.