Author of the publication

Detection of Compromised Models Using Bayesian Optimization.

, , , , and . Australasian Conference on Artificial Intelligence, volume 11919 of Lecture Notes in Computer Science, page 485-496. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Value of a ``Free'' Customer, , and . (2006)http://www.hbs.edu/research/pdf/07-035.pdf.Guidelines for Developing and Reporting Machine Learning Predictive Models in Biomedical Research: A Multidisciplinary View, , , , , , , , , and 2 other author(s). Journal of Medical Internet Research, 18 (12): e323+ (Dec 16, 2016)Hybrid Generative-Discriminative Models for Inverse Materials Design., , , , and . CoRR, (2018)Selecting Optimal Source for Transfer Learning in Bayesian Optimisation., , , and . PRICAI (1), volume 11012 of Lecture Notes in Computer Science, page 42-56. Springer, (2018)Sparse Approximation for Gaussian Process with Derivative Observations., , , , and . Australasian Conference on Artificial Intelligence, volume 11320 of Lecture Notes in Computer Science, page 507-518. Springer, (2018)Hyperparameter tuning for big data using Bayesian optimisation., , , and . ICPR, page 2574-2579. IEEE, (2016)NeuralBO: A black-box optimization algorithm using deep neural networks., , and . Neurocomputing, (November 2023)Defense Against Multi-target Trojan Attacks., , , , , , and . CoRR, (2022)Gradient Descent in Neural Networks as Sequential Learning in RKBS., , , and . CoRR, (2023)Predicting anti-HIV activity: computational approach using a novel topological descriptor., , and . J. Comput. Aided Mol. Des., 15 (7): 671-678 (2001)