1 code implementation • 17 Apr 2024 • Changbin Li, Kangshuo Li, Yuzhe Ou, Lance M. Kaplan, Audun Jøsang, Jin-Hee Cho, Dong Hyun Jeong, Feng Chen
In this paper, we propose a novel framework called Hyper-Evidential Neural Network (HENN) that explicitly models predictive uncertainty due to composite class labels in training data in the context of the belief theory called Subjective Logic (SL).
no code implementations • 19 Feb 2023 • Zhen Guo, Qi Zhang, Xinwei An, Qisheng Zhang, Audun Jøsang, Lance M. Kaplan, Feng Chen, Dong H. Jeong, Jin-Hee Cho
Distinguishing the types of fake news spreaders based on their intent is critical because it will effectively guide how to intervene to mitigate the spread of fake news with different approaches.
no code implementations • 13 Dec 2022 • Qisheng Zhang, Zhen Guo, Audun Jøsang, Lance M. Kaplan, Feng Chen, Dong H. Jeong, Jin-Hee Cho
Proximal Policy Optimization (PPO) is a highly popular policy-based deep reinforcement learning (DRL) approach.
no code implementations • 12 Jun 2022 • Zhen Guo, Zelin Wan, Qisheng Zhang, Xujiang Zhao, Feng Chen, Jin-Hee Cho, Qi Zhang, Lance M. Kaplan, Dong H. Jeong, Audun Jøsang
We found that only a few studies have leveraged the mature uncertainty research in belief/evidence theories in ML/DL to tackle complex problems under different types of uncertainty.
no code implementations • 3 Mar 2021 • Vasileios Mavroeidis, Ryan Hohimer, Tim Casey, Audun Jøsang
As the cyber threat landscape is constantly becoming increasingly complex and polymorphic, the more critical it becomes to understand the enemy and its modus operandi for anticipatory threat reduction.
Cryptography and Security
1 code implementation • 17 Aug 2020 • Fabio Massimo Zennaro, Audun Jøsang
The multi-armed bandit problem is a classical decision-making problem where an agent has to learn an optimal action balancing exploration and exploitation.
no code implementations • 2 Apr 2016 • Mohd Anuar Mat Isa, Ramlan Mahmod, Nur Izura Udzir, Jamalul-lail Ab Manan, Audun Jøsang, Ali Dehghan Tanha
The proposed method will allow a relation computation which is previously subjective and incomputable.