Explainable YouTube Video Identification Using Sufficient Input Subsets
暂无分享,去创建一个
Muhammad U. S. Khan | A. R. Ansari | R. Nawaz | S. M. A. H. Bukhari | Tahir Maqsood | Waleed Afandi | Muhammad A. B. Fayyaz
[1] Kamlesh Tiwari,et al. Post Quantum Cryptography: Techniques, Challenges, Standardization, and Directions for Future Research , 2022, ArXiv.
[2] Muhammad U. S. Khan,et al. ISP can identify YouTube videos that you just watched , 2021, 2021 International Conference on Frontiers of Information Technology (FIT).
[3] Assad Abbas,et al. HateClassify: A Service Framework for Hate Speech Identification on Social Media , 2021, IEEE Internet Computing.
[4] Anna Visvizi,et al. Deep Learning-based Extraction of Algorithmic Metadata in Full-Text Scholarly Documents , 2020, Inf. Process. Manag..
[5] Ahmad Karim,et al. Malware Classification Framework using Convolutional Neural Network , 2020, 2020 International Conference on Cyber Warfare and Security (ICCWS).
[6] Rao Muhammad Adeel Nawab,et al. Deep sentiments in Roman Urdu text using Recurrent Convolutional Neural Network model , 2020, Inf. Process. Manag..
[7] Yong Sun,et al. ITP-KNN: Encrypted Video Flow Identification Based on the Intermittent Traffic Pattern of Video and K-Nearest Neighbors Classification , 2020, ICCS.
[8] Siddhartha Jain,et al. Overinterpretation reveals image classification model pathologies , 2020, NeurIPS.
[9] Mazhar Ali,et al. Bot detection using a single post on social media , 2019, 2019 Third World Conference on Smart Trends in Systems Security and Sustainablity (WorldS4).
[10] Michael Seufert,et al. Let me Decrypt your Beauty: Real-time Prediction of Video Resolution and Bitrate for Encrypted Video Streaming , 2019, 2019 Network Traffic Measurement and Analysis Conference (TMA).
[11] Ran Dubin,et al. Clustering the Unknown - The Youtube Case , 2019, 2019 International Conference on Computing, Networking and Communications (ICNC).
[12] Jonas Mueller,et al. What made you do this? Understanding black-box decisions with sufficient input subsets , 2018, AISTATS.
[13] Samee Ullah Khan,et al. Convolutional Neural Networks as Means to Identify Apposite Sensor Combination for Human Activity Recognition , 2018, 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE).
[14] Jiliang Wang,et al. Walls Have Ears: Traffic-based Side-channel Attack in Video Streaming , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[15] Bin Yu,et al. Beyond Word Importance: Contextual Decomposition to Extract Interactions from LSTMs , 2018, ICLR.
[16] Vitaly Shmatikov,et al. Beauty and the Burst: Remote Identification of Encrypted Video Streams , 2017, USENIX Security Symposium.
[17] May D. Wang,et al. Interpretable Predictions of Clinical Outcomes with An Attention-based Recurrent Neural Network , 2017, BCB.
[18] Kristof T. Schütt,et al. Learning how to explain neural networks: PatternNet and PatternAttribution , 2017, ICLR.
[19] Avanti Shrikumar,et al. Learning Important Features Through Propagating Activation Differences , 2017, ICML.
[20] Andrew Reed,et al. Identifying HTTPS-Protected Netflix Videos in Real-Time , 2017, CODASPY.
[21] Ankur Taly,et al. Axiomatic Attribution for Deep Networks , 2017, ICML.
[22] Jure Leskovec,et al. Human Decisions and Machine Predictions , 2017, The quarterly journal of economics.
[23] A. Rama Mohan Reddy,et al. A fast DBSCAN clustering algorithm by accelerating neighbor searching using Groups method , 2016, Pattern Recognit..
[24] Regina Barzilay,et al. Rationalizing Neural Predictions , 2016, EMNLP.
[25] Karol J. Piczak. Environmental sound classification with convolutional neural networks , 2015, 2015 IEEE 25th International Workshop on Machine Learning for Signal Processing (MLSP).
[26] Alexander Binder,et al. On Pixel-Wise Explanations for Non-Linear Classifier Decisions by Layer-Wise Relevance Propagation , 2015, PloS one.
[27] Andrew Zisserman,et al. Deep Inside Convolutional Networks: Visualising Image Classification Models and Saliency Maps , 2013, ICLR.
[28] Rob Fergus,et al. Visualizing and Understanding Convolutional Networks , 2013, ECCV.
[29] Motoaki Kawanabe,et al. How to Explain Individual Classification Decisions , 2009, J. Mach. Learn. Res..
[30] D. Pham,et al. Selection of K in K-means clustering , 2005 .
[31] Waleed S. Afandi,et al. Fingerprinting Technique for YouTube Videos Identification in Network Traffic , 2022, IEEE Access.
[32] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[33] I. S. Sitanggang,et al. Determination of Optimal Epsilon (Eps) Value on DBSCAN Algorithm to Clustering Data on Peatland Hotspots in Sumatra , 2016 .
[34] Shawn McCann,et al. Object Detection using Convolutional Neural Networks , 2013 .
[35] K. Sree,et al. CLUSTERING BASED ON COSINE SIMILARITY MEASURE , 2012 .
[36] Nizar Grira,et al. Unsupervised and Semi-supervised Clustering : a Brief Survey ∗ , 2004 .
[37] Marco Tulio Ribeiro,et al. “Why Should I Trust You?”: Explaining the Predictions of Any Classifier , 2016, NAACL.