Adversarial vulnerability bounds for Gaussian process classification
Graph Chatbot
Chattez avec Graph Search
Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Technological advances in sensing and portable computing devices and wireless communication has lead to an increase in the number and variety of sensing enabled devices (e.g. smartphones or sensing garments). Pervasive computing and activity recognition sy ...
Ieee Service Center, 445 Hoes Lane, Po Box 1331, Piscataway, Nj 08855-1331 Usa2011
Systemic risks and hazards have become increasingly significant features of modern industrial society of which the network industries form a vital element. The idea of systemic risk, however, is much less prominent in the network industries compared to ban ...
The Support Vector Machine (SVM) is an acknowledged powerful tool for building classifiers, but it lacks flexibility, in the sense that the kernel is chosen prior to learning. Multiple Kernel Learning (MKL) enables to learn the kernel, from an ensemble of ...
Breadth First Search (BFS) is a widely used approach for sampling large graphs. However, it has been empirically observed that BFS sampling is biased toward high-degree nodes, which may strongly affect the measurement results. In this paper, we quantify an ...
Institute of Electrical and Electronics Engineers2011
In the standard real options approach to investment under uncertainty, agents formulate optimal policies under the assumptions of risk neutrality or perfect capital markets. However, in most situations, corporate executives face incomplete markets either b ...
The aims of the preliminary study reported in this document were twofold. Firstly, within the context of the application of UHPFRC for the rehabilitation of reinforced concrete structures, to identify the phenomena that require further study with respect t ...
The objective of this paper is to present the operating and hedging analysis of a hydroelectric system in a non-hydro dominated market using a specifically-developed tool for operating and contracting decisions. Hydropower companies are likely to face stoc ...
The Support Vector Machine (SVM) is an acknowledged powerful tool for building classifiers, but it lacks flexibility, in the sense that the kernel is chosen prior to learning. Multiple Kernel Learning (MKL) enables to learn the kernel, from an ensemble of ...
In this paper we extend the work presented in [1], [2] by quantifying the effects of in-band wormhole attacks on Intrusion Detection Systems. More specifically, we propose a mathematical framework for obtaining performance bounds of Byzantine attackers and ...
The impact of capital mobility restrictions on the diversification benefit for risk at the group level of a financial conglomerate is an important aspect in risk management. In this paper we propose a new bottom-up approach for realizing diversification be ...