Ankur Taly

According to our database1, Ankur Taly authored at least 40 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Which Pretrain Samples to Rehearse when Finetuning Pretrained Models?
CoRR, 2024

2023
Identifying and Mitigating the Security Risks of Generative AI.
Found. Trends Priv. Secur., 2023

Identifying and Mitigating the Security Risks of Generative AI.
CoRR, 2023

2022
Local Explanations via Necessity and Sufficiency: Unifying Theory and Practice.
Minds Mach., 2022

Interpretable Mixture of Experts for Structured Data.
CoRR, 2022

First is Better Than Last for Training Data Influence.
CoRR, 2022

First is Better Than Last for Language Data Influence.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

2021
A Multistakeholder Approach Towards Evaluating AI Transparency Mechanisms.
CoRR, 2021

2020
Explainable AI in Industry: Practical Challenges and Lessons Learned.
Proceedings of the Companion of The 2020 Web Conference 2020, 2020

Explainable AI in industry: practical challenges and lessons learned: implications tutorial.
Proceedings of the FAT* '20: Conference on Fairness, 2020

Explainable machine learning in deployment.
Proceedings of the FAT* '20: Conference on Fairness, 2020

The Explanation Game: Explaining Machine Learning Models Using Shapley Values.
Proceedings of the Machine Learning and Knowledge Extraction, 2020

2019
The Explanation Game: Explaining Machine Learning Models with Cooperative Game Theory.
CoRR, 2019

Finding Invariants in Deep Neural Networks.
CoRR, 2019

Explainable AI in Industry.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

Property Inference for Deep Neural Networks.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Exploring Principled Visualizations for Deep Network Attributions.
Proceedings of the Joint Proceedings of the ACM IUI 2019 Workshops co-located with the 24th ACM Conference on Intelligent User Interfaces (ACM IUI 2019), 2019

Counterfactual Fairness in Text Classification through Robustness.
Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society, 2019

2018
Using Attribution to Decode Dataset Bias in Neural Network Models for Chemistry.
CoRR, 2018

A Note about: Local Explanation Methods for Deep Neural Networks lack Sensitivity to Parameter Values.
CoRR, 2018

It was the training data pruning too!
CoRR, 2018

Did the Model Understand the Question?
Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, 2018

2017
Abductive Matching in Question Answering.
CoRR, 2017

Axiomatic Attribution for Deep Networks.
Proceedings of the 34th International Conference on Machine Learning, 2017

2016
Gradients of Counterfactuals.
CoRR, 2016

Distributed Authorization in Vanadium.
Proceedings of the Foundations of Security Analysis and Design VIII, 2016

Privacy, Discovery, and Authentication for the Internet of Things.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
Distributed Authorization with Distributed Grammars.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

2014
Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
Sandboxing untrusted JavaScript.
PhD thesis, 2013

2012
Automated synthesis of symbolic instruction encodings from I/O samples.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2012

2011
Synthesizing switching logic using constraint solving.
Int. J. Softw. Tools Technol. Transf., 2011

Automated Analysis of Security-Critical JavaScript APIs.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

2010
Object Capabilities and Isolation of Untrusted Web Applications.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Switching logic synthesis for reachability.
Proceedings of the 10th International conference on Embedded software, 2010

2009
Deductive Verification of Continuous Dynamical Systems.
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2009

Isolating JavaScript with Filters, Rewriting, and Wrappers.
Proceedings of the Computer Security, 2009

Language-Based Isolation of Untrusted JavaScript.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

2008
An Operational Semantics for JavaScript.
Proceedings of the Programming Languages and Systems, 6th Asian Symposium, 2008

2007
Static Analysis by Policy Iteration on Relational Domains.
Proceedings of the Programming Languages and Systems, 2007


  Loading...