James Bailey
James Bailey
Professor, School of Computing and Information Systems, University of Melbourne
Dirección de correo verificada de - Página principal
Citado por
Citado por
Information theoretic measures for clusterings comparison: Variants, properties, normalization and correction for chance
NX Vinh, J Epps, J Bailey
The Journal of Machine Learning Research 11, 2837-2854, 2010
Symmetric cross entropy for robust learning with noisy labels
Y Wang, X Ma, Z Chen, Y Luo, J Yi, J Bailey
Proceedings of the IEEE/CVF international conference on computer vision, 322-330, 2019
Characterizing adversarial subspaces using local intrinsic dimensionality
X Ma, B Li, Y Wang, SM Erfani, S Wijewickrema, G Schoenebeck, D Song, ...
arXiv preprint arXiv:1801.02613, 2018
Improving adversarial robustness requires revisiting misclassified examples
Y Wang, D Zou, J Yi, J Bailey, X Ma, Q Gu
International conference on learning representations, 2019
Dimensionality-driven learning with noisy labels
X Ma, Y Wang, ME Houle, S Zhou, S Erfani, S Xia, S Wijewickrema, ...
International Conference on Machine Learning, 3355-3364, 2018
Reflection backdoor: A natural backdoor attack on deep neural networks
Y Liu, X Ma, J Bailey, F Lu
Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23 …, 2020
Understanding adversarial attacks on deep learning based medical image analysis systems
X Ma, Y Niu, L Gu, Y Wang, Y Zhao, J Bailey, F Lu
Pattern Recognition 110, 107332, 2021
On the convergence and robustness of adversarial training
Y Wang, X Ma, J Bailey, J Yi, B Zhou, Q Gu
arXiv preprint arXiv:2112.08304, 2021
Normalized loss functions for deep learning with noisy labels
X Ma, H Huang, Y Wang, S Romano, S Erfani, J Bailey
International conference on machine learning, 6543-6553, 2020
Iterative learning with open-set noisy labels
Y Wang, W Liu, X Ma, J Bailey, H Zha, L Song, ST Xia
Proceedings of the IEEE conference on computer vision and pattern …, 2018
Discovery of minimal unsatisfiable subsets of constraints using hitting set dualization
J Bailey, P Stuckey
Practical Aspects of Declarative Languages, 174-186, 2005
Skip connections matter: On the transferability of adversarial examples generated with resnets
D Wu, Y Wang, ST Xia, J Bailey, X Ma
arXiv preprint arXiv:2002.05990, 2020
Identifying at-risk students in massive open online courses
J He, J Bailey, B Rubinstein, R Zhang
Proceedings of the AAAI Conference on Artificial Intelligence 29 (1), 2015
Mining minimal distinguishing subsequence patterns with gap constraints
X Ji, J Bailey, G Dong
Knowledge and Information Systems 11 (3), 259-286, 2007
Computer-aided Diagnosis of Melanoma Using Border and Wavelet-based Texture Analysis
R Garnavi, M Aldeen, J Bailey
IEEE, 2012
An event-condition-action language for XML
J Bailey, A Poulovassilis, PT Wood
Proceedings of the 11th international conference on World Wide Web, 486-495, 2002
Clean-label backdoor attacks on video recognition models
S Zhao, X Ma, X Zheng, J Bailey, J Chen, YG Jiang
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020
Contrast Data Mining: Concepts, Algorithms, and Applications
G Dong, J Bailey, J Li
Chapman & Hall, 2012
Adjusting for chance clustering comparison measures
S Romano, NX Vinh, J Bailey, K Verspoor
The Journal of Machine Learning Research 17 (1), 4635-4666, 2016
Adversarial camouflage: Hiding physical-world attacks with natural styles
R Duan, X Ma, Y Wang, J Bailey, AK Qin, Y Yang
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20