Alert button
Picture for Miryung Kim

Miryung Kim

Alert button

Human-in-the-Loop Synthetic Text Data Inspection with Provenance Tracking

Add code
Bookmark button
Alert button
Apr 29, 2024
Hong Jin Kang, Fabrice Harel-Canada, Muhammad Ali Gulzar, Violet Peng, Miryung Kim

Viaarxiv icon

Sibylvariant Transformations for Robust Text Classification

Add code
Bookmark button
Alert button
May 10, 2022
Fabrice Harel-Canada, Muhammad Ali Gulzar, Nanyun Peng, Miryung Kim

Figure 1 for Sibylvariant Transformations for Robust Text Classification
Figure 2 for Sibylvariant Transformations for Robust Text Classification
Figure 3 for Sibylvariant Transformations for Robust Text Classification
Figure 4 for Sibylvariant Transformations for Robust Text Classification
Viaarxiv icon

Dorylus: Affordable, Scalable, and Accurate GNN Training with Distributed CPU Servers and Serverless Threads

Add code
Bookmark button
Alert button
May 25, 2021
John Thorpe, Yifan Qiao, Jonathan Eyolfson, Shen Teng, Guanzhou Hu, Zhihao Jia, Jinliang Wei, Keval Vora, Ravi Netravali, Miryung Kim, Guoqing Harry Xu

Figure 1 for Dorylus: Affordable, Scalable, and Accurate GNN Training with Distributed CPU Servers and Serverless Threads
Figure 2 for Dorylus: Affordable, Scalable, and Accurate GNN Training with Distributed CPU Servers and Serverless Threads
Figure 3 for Dorylus: Affordable, Scalable, and Accurate GNN Training with Distributed CPU Servers and Serverless Threads
Figure 4 for Dorylus: Affordable, Scalable, and Accurate GNN Training with Distributed CPU Servers and Serverless Threads
Viaarxiv icon

An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models

Add code
Bookmark button
Alert button
Feb 06, 2020
Yao Deng, Xi Zheng, Tianyi Zhang, Chen Chen, Guannan Lou, Miryung Kim

Figure 1 for An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models
Figure 2 for An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models
Figure 3 for An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models
Figure 4 for An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models
Viaarxiv icon