Author of the publication

Using Trusted Data to Train Deep Networks on Labels Corrupted by Severe Noise.

, , , and . NeurIPS, page 10477-10486. (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Situating Media Infrastructure: : Understand the Affordance of Public Space Characteristics in Influencing Public Interaction with Media Infrastructure., , and . MAB, page 148-159. ACM, (2021)Ambient recommendations in the pop-up shop., , , and . UbiComp, page 773-776. ACM, (2013)Regulatory network modelling of iron acquisition by a fungal pathogen in contact with epithelial cells., , , and . BMC Syst. Biol., (2010)Understanding the End-Users and Technical Requirements for Real-Time Streaming Data Analytics and Visualisation., and . ICAC, page 1-6. IEEE, (2021)HINTeractions: facilitating informal knowledge exchange in physical and social space., , and . TEI, page 119-122. ACM, (2009)Some problems in trying to implement uncertainty techniques in automated inspection., , , and . Applications of Uncertainty Formalisms, volume 1455 of Lecture Notes in Computer Science, page 225-241. Springer, (1998)Using Trusted Data to Train Deep Networks on Labels Corrupted by Severe Noise., , , and . NeurIPS, page 10477-10486. (2018)Roadmap for Real World Internet applications - Socioeconomic scenarios and design recommendations., , , , and . Future Internet Assembly, page 325-334. IOS Press, (2009)STORMI: An agent-based simulation environment for evaluating responses to major incidents in the UK., , , and . ISCRAM, Simon Fraser University, Vancouver, Canada, (2012)Improving Agent-Based Simulation of Major Incident Response in the United Kingdom through Conceptual and Operational Validation., , , and . IJISCRAM, 7 (4): 1-25 (2015)