James Bailey
James Bailey
Professor, School of Computing and Information Systems, University of Melbourne
Verifierad e-postadress på unimelb.edu.au - Startsida
Citeras av
Citeras av
Information theoretic measures for clusterings comparison: Variants, properties, normalization and correction for chance
NX Vinh, J Epps, J Bailey
The Journal of Machine Learning Research 11, 2837-2854, 2010
Symmetric cross entropy for robust learning with noisy labels
Y Wang, X Ma, Z Chen, Y Luo, J Yi, J Bailey
Proceedings of the IEEE/CVF international conference on computer vision, 322-330, 2019
Characterizing adversarial subspaces using local intrinsic dimensionality
X Ma, B Li, Y Wang, SM Erfani, S Wijewickrema, G Schoenebeck, D Song, ...
arXiv preprint arXiv:1801.02613, 2018
Improving adversarial robustness requires revisiting misclassified examples
Y Wang, D Zou, J Yi, J Bailey, X Ma, Q Gu
International conference on learning representations, 2019
Reflection backdoor: A natural backdoor attack on deep neural networks
Y Liu, X Ma, J Bailey, F Lu
Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23 …, 2020
Understanding adversarial attacks on deep learning based medical image analysis systems
X Ma, Y Niu, L Gu, Y Wang, Y Zhao, J Bailey, F Lu
Pattern Recognition 110, 107332, 2021
Dimensionality-driven learning with noisy labels
X Ma, Y Wang, ME Houle, S Zhou, S Erfani, S Xia, S Wijewickrema, ...
International Conference on Machine Learning, 3355-3364, 2018
Normalized loss functions for deep learning with noisy labels
X Ma, H Huang, Y Wang, S Romano, S Erfani, J Bailey
International conference on machine learning, 6543-6553, 2020
On the convergence and robustness of adversarial training
Y Wang, X Ma, J Bailey, J Yi, B Zhou, Q Gu
arXiv preprint arXiv:2112.08304, 2021
Iterative learning with open-set noisy labels
Y Wang, W Liu, X Ma, J Bailey, H Zha, L Song, ST Xia
Proceedings of the IEEE conference on computer vision and pattern …, 2018
Skip connections matter: On the transferability of adversarial examples generated with resnets
D Wu, Y Wang, ST Xia, J Bailey, X Ma
arXiv preprint arXiv:2002.05990, 2020
Clean-label backdoor attacks on video recognition models
S Zhao, X Ma, X Zheng, J Bailey, J Chen, YG Jiang
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020
-IoU: A Family of Power Intersection over Union Losses for Bounding Box Regression
J He, S Erfani, X Ma, J Bailey, Y Chi, XS Hua
Advances in Neural Information Processing Systems 34, 20230-20242, 2021
Identifying at-risk students in massive open online courses
J He, J Bailey, B Rubinstein, R Zhang
Proceedings of the AAAI conference on artificial intelligence 29 (1), 2015
Discovery of minimal unsatisfiable subsets of constraints using hitting set dualization
J Bailey, P Stuckey
Practical Aspects of Declarative Languages, 174-186, 2005
Mining minimal distinguishing subsequence patterns with gap constraints
X Ji, J Bailey, G Dong
Knowledge and Information Systems 11 (3), 259-286, 2007
Adversarial camouflage: Hiding physical-world attacks with natural styles
R Duan, X Ma, Y Wang, J Bailey, AK Qin, Y Yang
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020
Adjusting for chance clustering comparison measures
S Romano, NX Vinh, J Bailey, K Verspoor
Journal of Machine Learning Research 17 (134), 1-32, 2016
Computer-aided Diagnosis of Melanoma Using Border and Wavelet-based Texture Analysis
R Garnavi, M Aldeen, J Bailey
IEEE, 2012
An event-condition-action language for XML
J Bailey, A Poulovassilis, PT Wood
Proceedings of the 11th international conference on World Wide Web, 486-495, 2002
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20