Publications
Found 340 results
Author Title Type [ Year] Filters: First Letter Of Last Name is T [Clear All Filters]
(2015).
(2015).
(2015).
(2015).
(2015).
A Methodology for Information Flow Experiments.
2015 IEEE 28th Computer Security Foundations Symposium. 554-568.
(2015).
(2015).
(2015).
(2015). Simultaneous Deep Transfer Across Domains and Tasks.
The IEEE International Conference on Computer Vision (ICCV). 4068-4076.
(2015). A Study of Multimodal Addressee Detection in Human-Human-Computer Interaction.
IEEE Transactions on Multimedia. 17(9), 1550-1561.
(2015). Towards Adapting Deep Visuomotor Representations from Simulated to Real Environments.
CoRR. abs/1511.07111,
(2015).
(2015).
(2015). Adversarial Active Learning.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop (AISec '14). 3–14.
(2014). Adversarial Active Learning.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop (AISec '14). 3–14.
(2014).
(2014).
(2014).
(2014).
(2014). Large-margin Convex Polytope Machine.
Proceedings of the 27th International Conference on Neural Information Processing Systems. 3248–3256.
(2014). Large-margin Convex Polytope Machine.
Proceedings of the 27th International Conference on Neural Information Processing Systems. 3248–3256.
(2014). On Modeling the Costs of Censorship.
CoRR. abs/1409.3211,
(2014). On Modeling the Costs of Censorship.
CoRR. abs/1409.3211,
(2014).
(2014).