About Us
Research
News
People
Publications
Theses
Sponsors
Contact
0
Referring Expressions with Rational Speech Act Framework: A Probabilistic Approach
This paper focuses on a referring expression generation (REG) task in which the aim is to pick out an object in a complex visual scene. …
Hieu Le
,
Taufiq Daryanto
,
Fabian Zhafransyah
,
Derry Wijaya
,
Elizabeth Coppock
,
Sang (Peter) Chin
Cite
URL
Collusion Detection in Team-Based Multiplayer Games
In the context of competitive multiplayer games, collusion happens when two or more teams decide to collaborate towards a common goal, …
Laura Greige
,
Fernando De Mesentier Silva
,
Meredith Trotter
,
Chris Lawrence
,
Sang (Peter) Chin
,
Dilip Varadarajan
Cite
URL
Non-Volatile Memory Accelerated Posterior Estimation
Bayesian inference allows machine learning models to express uncertainty. Current machine learning models use only a single learnable …
Andrew Wood
,
Moshik Hershcovitch
,
Daniel Waddington
,
Sarel Cohen
,
Sang (Peter) Chin
Cite
URL
Revisiting the Prepositional-Phrase Attachment Problem Using Explicit Commonsense Knowledge
We revisit the challenging problem of resolving prepositional-phrase (PP) attachment ambiguity. To date, proposed solutions are either …
Yida Xin
,
Henry Lieberman
,
Sang (Peter) Chin
Cite
URL
GymFG: A Framework with a Gym Interface for FlightGear
Over the past decades, progress in deployable autonomous flight systems has slowly stagnated. This is reflected in today’s …
Andrew Wood
,
Ali Sydney
,
Sang (Peter) Chin
,
Bishal Thapa
,
Ryan Ross
Cite
URL
Block Switching: A Stochastic Approach for Deep Learning Security
Recent study of adversarial attacks has revealed the vulnerability of modern deep learning models. That is, subtly crafted …
Xiao (Kieran) Wang
,
Siyue Wang
,
Pin-Yu Chen
,
Xue Lin
,
Sang (Peter) Chin
Cite
URL
Tree-Transformer: A Transformer-Based Method for Correction of Tree-Structured Data
Many common sequential data sources, such as source code and natural language, have a natural tree-structured representation. These …
Jacob Harer
,
Chris Reale
,
Sang (Peter) Chin
Cite
URL
Automated software vulnerability detection with machine learning
Thousands of security vulnerabilities are discovered in production software each year, either reported publicly to the Common …
Jacob Harer
,
Louis Y. Kim
,
Rebecca L. Russell
,
Onur Ozdemir
,
Leonard R. Kosta
,
Akshay Rangamani
,
Lei H. Hamilton
,
Gabriel I. Centeno
,
Jonathan R. Key
,
Paul M. Ellingwood
,
Erik Antelman
,
Alan Mackay
,
Marc W. McConley
,
Jeffrey M. Opper
,
Sang (Peter) Chin
,
Tomo Lazovich
Cite
URL
Cite
×