Author of the publication

Data AUDIT: Identifying Attribute Utility- and Detectability-Induced Bias in Task Models.

, , , , and . MICCAI (3), volume 14222 of Lecture Notes in Computer Science, page 442-452. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RobustCLEVR: A Benchmark and Framework for Evaluating Robustness in Object-centric Learning., and . CoRR, (2023)Revisiting Stereo Depth Estimation From a Sequence-to-Sequence Perspective with Transformers., , , , , , and . ICCV, page 6177-6186. IEEE, (2021)Exploiting Large Neuroimaging Datasets to Create Connectome-Constrained Approaches for more Robust, Efficient, and Adaptable Artificial Intelligence., , , , , , , , , and 10 other author(s). CoRR, (2023)Objectness-Guided Open Set Visual Search and Closed Set Detection., , , , and . CoRR, (2020)Patch Attack Invariance: How Sensitive are Patch Attacks to 3D Pose?, , and . ICCVW, page 112-121. IEEE, (2021)Robustness in Deep Learning for Computer Vision: Mind the gap?, , , and . CoRR, (2021)From Generalization to Precision: Exploring SAM for Tool Segmentation in Surgical Environments., , , and . CoRR, (2024)The First International Competition in Machine Reconnaissance Blind Chess., , , , , , , , , and 5 other author(s). NeurIPS (Competition and Demos), volume 123 of Proceedings of Machine Learning Research, page 121-130. PMLR, (2019)Do Adaptive Active Attacks Pose Greater Risk Than Static Attacks?, , , and . WACV, page 1380-1389. IEEE, (2023)Attack Agnostic Detection of Adversarial Examples via Random Subspace Analysis., , and . WACV, page 2815-2825. IEEE, (2022)