Related publications (40)

Machine Learning Security Against Data Poisoning: Are We There Yet?

Kathrin Grosse

Poisoning attacks compromise the training data utilized to train machine learning (ML) models, diminishing their overall performance, manipulating predictions on specific test samples, and implanting backdoors. This article thoughtfully explores these atta ...
Ieee Computer Soc2024

Annotation-efficient image anomaly detection

Jean-Philippe Thiran

The present invention proposes a method for detecting anomalous or out-of-distribution images in a machine learning system (1) comprising a pre-training network with a first encoder, and an anomaly detection network with a second encoder. The system is fir ...
2022

OrthoNet: Multilayer Network Data Clustering

Pascal Frossard, Mireille El Gheche, Giovanni Chierchia

Network data appears in very diverse applications, like biological, social, or sensor networks. Clustering of network nodes into categories or communities has thus become a very common task in machine learning and data mining. Network data comes with some ...
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC2020

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.