Search Results for author: Kevin Shi

Found 4 papers, 1 papers with code

DeepTaskAPT: Insider APT detection using Task-tree based Deep Learning

1 code implementation31 Aug 2021 Mohammad Mamun, Kevin Shi

To the best of knowledge this is the very first attempt of using recently introduced OpTC dataset for cyber threat detection.

Surprisingly Popular Voting Recovers Rankings, Surprisingly!

no code implementations19 May 2021 Hadi Hosseini, Debmalya Mandal, Nisarg Shah, Kevin Shi

A clever recent approach, \emph{surprisingly popular voting}, elicits additional information from the individuals, namely their \emph{prediction} of other individuals' votes, and provably recovers the ground truth even when experts are in minority.

A cryptographic approach to black box adversarial machine learning

no code implementations7 Jun 2019 Kevin Shi, Daniel Hsu, Allison Bishop

We propose a new randomized ensemble technique with a provable security guarantee against black-box transfer attacks.

BIG-bench Machine Learning

Linear regression without correspondence

no code implementations NeurIPS 2017 Daniel Hsu, Kevin Shi, Xiaorui Sun

Next, in an average-case and noise-free setting where the responses exactly correspond to a linear function of i. i. d.

regression

Cannot find the paper you are looking for? You can Submit a new open access paper.