Picture for Bülent Yener

Bülent Yener

Exploiting the Data Gap: Utilizing Non-ignorable Missingness to Manipulate Model Learning

Add code
Sep 06, 2024
Figure 1 for Exploiting the Data Gap: Utilizing Non-ignorable Missingness to Manipulate Model Learning
Figure 2 for Exploiting the Data Gap: Utilizing Non-ignorable Missingness to Manipulate Model Learning
Figure 3 for Exploiting the Data Gap: Utilizing Non-ignorable Missingness to Manipulate Model Learning
Figure 4 for Exploiting the Data Gap: Utilizing Non-ignorable Missingness to Manipulate Model Learning
Viaarxiv icon

Deception by Omission: Using Adversarial Missingness to Poison Causal Structure Learning

Add code
May 31, 2023
Viaarxiv icon

Missing Value Knockoffs

Add code
Feb 26, 2022
Figure 1 for Missing Value Knockoffs
Figure 2 for Missing Value Knockoffs
Figure 3 for Missing Value Knockoffs
Figure 4 for Missing Value Knockoffs
Viaarxiv icon

Output Randomization: A Novel Defense for both White-box and Black-box Adversarial Models

Add code
Jul 08, 2021
Figure 1 for Output Randomization: A Novel Defense for both White-box and Black-box Adversarial Models
Figure 2 for Output Randomization: A Novel Defense for both White-box and Black-box Adversarial Models
Figure 3 for Output Randomization: A Novel Defense for both White-box and Black-box Adversarial Models
Figure 4 for Output Randomization: A Novel Defense for both White-box and Black-box Adversarial Models
Viaarxiv icon

Patient-Specific Seizure Prediction Using Single Seizure Electroencephalography Recording

Add code
Nov 14, 2020
Figure 1 for Patient-Specific Seizure Prediction Using Single Seizure Electroencephalography Recording
Figure 2 for Patient-Specific Seizure Prediction Using Single Seizure Electroencephalography Recording
Figure 3 for Patient-Specific Seizure Prediction Using Single Seizure Electroencephalography Recording
Viaarxiv icon

Towards Obfuscated Malware Detection for Low Powered IoT Devices

Add code
Nov 06, 2020
Figure 1 for Towards Obfuscated Malware Detection for Low Powered IoT Devices
Figure 2 for Towards Obfuscated Malware Detection for Low Powered IoT Devices
Figure 3 for Towards Obfuscated Malware Detection for Low Powered IoT Devices
Figure 4 for Towards Obfuscated Malware Detection for Low Powered IoT Devices
Viaarxiv icon

A survey on practical adversarial examples for malware classifiers

Add code
Nov 06, 2020
Figure 1 for A survey on practical adversarial examples for malware classifiers
Figure 2 for A survey on practical adversarial examples for malware classifiers
Figure 3 for A survey on practical adversarial examples for malware classifiers
Viaarxiv icon

Image-driven discriminative and generative machine learning algorithms for establishing microstructure-processing relationships

Add code
Jul 27, 2020
Figure 1 for Image-driven discriminative and generative machine learning algorithms for establishing microstructure-processing relationships
Figure 2 for Image-driven discriminative and generative machine learning algorithms for establishing microstructure-processing relationships
Figure 3 for Image-driven discriminative and generative machine learning algorithms for establishing microstructure-processing relationships
Figure 4 for Image-driven discriminative and generative machine learning algorithms for establishing microstructure-processing relationships
Viaarxiv icon

An image-driven machine learning approach to kinetic modeling of a discontinuous precipitation reaction

Add code
Jun 13, 2019
Figure 1 for An image-driven machine learning approach to kinetic modeling of a discontinuous precipitation reaction
Figure 2 for An image-driven machine learning approach to kinetic modeling of a discontinuous precipitation reaction
Figure 3 for An image-driven machine learning approach to kinetic modeling of a discontinuous precipitation reaction
Figure 4 for An image-driven machine learning approach to kinetic modeling of a discontinuous precipitation reaction
Viaarxiv icon

Deep density ratio estimation for change point detection

Add code
May 23, 2019
Figure 1 for Deep density ratio estimation for change point detection
Figure 2 for Deep density ratio estimation for change point detection
Figure 3 for Deep density ratio estimation for change point detection
Figure 4 for Deep density ratio estimation for change point detection
Viaarxiv icon