no code implementations • 2 Nov 2020 • Ryan Sheatsley, Nicolas Papernot, Michael Weisman, Gunjan Verma, Patrick McDaniel
To assess how these algorithms perform, we evaluate them in constrained (e. g., network intrusion detection) and unconstrained (e. g., image recognition) domains.
no code implementations • 20 Jan 2017 • Edwin Dauber, Aylin Caliskan, Richard Harang, Gregory Shearer, Michael Weisman, Frederica Nelson, Rachel Greenstadt
We show that we can also use these calibration curves in the case that we do not have linking information and thus are forced to classify individual samples directly.