Skip to main content

Showing 1–3 of 3 results for author: Kaeli, D

Searching in archive stat. Search in all archives.
.
  1. arXiv:2009.11242  [pdf, other

    stat.AP stat.ME

    Using Undersampling with Ensemble Learning to Identify Factors Contributing to Preterm Birth

    Authors: Shi Dong, Zlatan Feric, Guangyu Li, Chieh Wu, April Z. Gu, Jennifer Dy, John Meeker, Ingrid Y. Padilla, Jose Cordero, Carmen Velez Vega, Zaira Rosario, Akram Alshawabkeh, David Kaeli

    Abstract: In this paper, we propose Ensemble Learning models to identify factors contributing to preterm birth. Our work leverages a rich dataset collected by a NIEHS P42 Center that is trying to identify the dominant factors responsible for the high rate of premature births in northern Puerto Rico. We investigate analytical models addressing two major challenges present in the dataset: 1) the significant a… ▽ More

    Submitted 23 September, 2020; originally announced September 2020.

    Journal ref: ICMLA 2020

  2. arXiv:1909.03441  [pdf, other

    stat.ML cs.LG stat.AP

    Iterative Spectral Method for Alternative Clustering

    Authors: Chieh Wu, Stratis Ioannidis, Mario Sznaier, Xiangyu Li, David Kaeli, Jennifer G. Dy

    Abstract: Given a dataset and an existing clustering as input, alternative clustering aims to find an alternative partition. One of the state-of-the-art approaches is Kernel Dimension Alternative Clustering (KDAC). We propose a novel Iterative Spectral Method (ISM) that greatly improves the scalability of KDAC. Our algorithm is intuitive, relies on easily implementable spectral decompositions, and comes wit… ▽ More

    Submitted 8 September, 2019; originally announced September 2019.

  3. arXiv:1809.05165  [pdf, other

    cs.CR cs.CV cs.LG stat.ML

    Defensive Dropout for Hardening Deep Neural Networks under Adversarial Attacks

    Authors: Siyue Wang, Xiao Wang, Pu Zhao, Wujie Wen, David Kaeli, Peter Chin, Xue Lin

    Abstract: Deep neural networks (DNNs) are known vulnerable to adversarial attacks. That is, adversarial examples, obtained by adding delicately crafted distortions onto original legal inputs, can mislead a DNN to classify them as any target labels. This work provides a solution to hardening DNNs under adversarial attacks through defensive dropout. Besides using dropout during training for the best test accu… ▽ More

    Submitted 13 September, 2018; originally announced September 2018.

    Comments: Accepted as conference paper on ICCAD 2018