no code implementations • EMNLP (NLP+CSS) 2020 • Bertie Vidgen, Scott Hale, Sam Staton, Tom Melham, Helen Margetts, Ohad Kammar, Marcin Szymczak
We investigate the use of machine learning classifiers for detecting online abuse in empirical research.
no code implementations • 1 Jun 2021 • Isaac Dunn, Hadrien Pouget, Daniel Kroening, Tom Melham
Existing methods for testing DNNs solve the oracle problem by constraining the raw features (e. g. image pixel values) to be within a small distance of a dataset example for which the desired DNN output is known.
no code implementations • 29 Jan 2020 • Isaac Dunn, Laura Hanu, Hadrien Pouget, Daniel Kroening, Tom Melham
We cannot guarantee that training datasets are representative of the distribution of inputs that will be encountered during deployment.
1 code implementation • 15 Jan 2020 • Natasha Yogananda Jeppu, Tom Melham, Daniel Kroening, John O'Leary
Abstract models of system-level behaviour have applications in design exploration, analysis, testing and verification.
Formal Languages and Automata Theory Software Engineering
1 code implementation • 22 Nov 2019 • Mohammadhosein Hasanbeig, Natasha Yogananda Jeppu, Alessandro Abate, Tom Melham, Daniel Kroening
This paper proposes DeepSynth, a method for effective training of deep Reinforcement Learning (RL) agents when the reward is sparse and non-Markovian, but at the same time progress towards the reward requires achieving an unknown sequence of high-level objectives.
Deep Reinforcement Learning Hierarchical Reinforcement Learning +5
no code implementations • 7 May 2019 • Isaac Dunn, Hadrien Pouget, Tom Melham, Daniel Kroening
Neural networks are vulnerable to adversarially-constructed perturbations of their inputs.
1 code implementation • 23 Apr 2018 • Sean Heelan, Tom Melham, Daniel Kroening
In this paper we present the first automatic approach to the problem, based on pseudo-random black-box search.
Cryptography and Security Programming Languages