ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation
暂无分享,去创建一个
Richard E. Harang | Ethan M. Rudd | Konstantin Berlin | Cody Wild | Felipe N. Ducau | Konstantin Berlin | Cody Wild
[1] Rama Chellappa,et al. HyperFace: A Deep Multi-Task Learning Framework for Face Detection, Landmark Localization, Pose Estimation, and Gender Recognition , 2019, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[2] Andrew Zisserman,et al. Deep Structured Output Learning for Unconstrained Text Recognition , 2014, ICLR.
[3] Max Welling,et al. Semi-supervised Learning with Deep Generative Models , 2014, NIPS.
[4] Richard E. Harang,et al. A Deep Learning Approach to Fast, Format-Agnostic Detection of Malicious Web Content , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[5] Yaser S. Abu-Mostafa,et al. Learning from hints in neural networks , 1990, J. Complex..
[6] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[7] Wenyi Huang,et al. MtNet: A Multi-Task Neural Network for Dynamic Malware Classification , 2016, DIMVA.
[8] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[9] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[10] Richard E. Harang,et al. MEADE: Towards a Malicious Email Attachment Detection Engine , 2018, 2018 IEEE International Symposium on Technologies for Homeland Security (HST).
[11] Konstantin Berlin,et al. Deep neural network based malware detection using two dimensional binary program features , 2015, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE).
[12] Rauf Izmailov,et al. Learning using privileged information: similarity control and knowledge transfer , 2015, J. Mach. Learn. Res..
[13] Dacheng Tao,et al. A Survey on Multi-view Learning , 2013, ArXiv.
[14] Gary M. Weiss. Mining with rarity: a unifying framework , 2004, SKDD.
[15] Joachim Bingel,et al. Sluice networks: Learning what to share between loosely related tasks , 2017, ArXiv.
[16] Hal Daumé,et al. Learning Task Grouping and Overlap in Multi-task Learning , 2012, ICML.
[17] P. McCullagh,et al. Generalized Linear Models , 1984 .
[18] Rich Caruana. A Dozen Tricks with Multitask Learning , 1996, Neural Networks: Tricks of the Trade.
[19] Tapani Raiko,et al. Semi-supervised Learning with Ladder Networks , 2015, NIPS.
[20] Terrance E. Boult,et al. A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions , 2016, IEEE Communications Surveys & Tutorials.
[21] Liang Wang,et al. Unconstrained Multimodal Multi-Label Learning , 2015, IEEE Transactions on Multimedia.
[22] Jiebo Luo,et al. Weakly Semi-Supervised Deep Learning for Multi-Label Image Annotation , 2015, IEEE Transactions on Big Data.
[23] Ming-Wei Chang,et al. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding , 2019, NAACL.
[24] F. Famoye. Restricted generalized poisson regression model , 1993 .
[25] Rich Caruana,et al. Multitask Learning: A Knowledge-Based Source of Inductive Bias , 1993, ICML.
[26] Vladimir Vapnik,et al. A new learning paradigm: Learning using privileged information , 2009, Neural Networks.
[27] Huashan Chen,et al. Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth , 2018, IEEE Transactions on Information Forensics and Security.
[28] Terrance E. Boult,et al. MOON: A Mixed Objective Optimization Network for the Recognition of Facial Attributes , 2016, ECCV.
[29] Gang Wang,et al. Multi-Task CNN Model for Attribute Prediction , 2015, IEEE Transactions on Multimedia.
[30] Sepp Hochreiter,et al. Fast and Accurate Deep Network Learning by Exponential Linear Units (ELUs) , 2015, ICLR.
[31] Hyrum S. Anderson,et al. EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models , 2018, ArXiv.