Ankur Taly
Ankur Taly
Staff Research Scientist, Google
Verified email at - Homepage
Cited by
Cited by
Axiomatic attribution for deep networks
M Sundararajan, A Taly, Q Yan
International conference on machine learning, 3319-3328, 2017
Explainable machine learning in deployment
U Bhatt, A Xiang, S Sharma, A Weller, A Taly, Y Jia, J Ghosh, R Puri, ...
Proceedings of the 2020 conference on fairness, accountability, and …, 2020
Using a deep learning algorithm and integrated gradients explanation to assist grading for diabetic retinopathy
R Sayres, A Taly, E Rahimy, K Blumer, D Coz, N Hammel, J Krause, ...
Ophthalmology 126 (4), 552-564, 2019
Counterfactual fairness in text classification through robustness
S Garg, V Perot, N Limtiaco, A Taly, EH Chi, A Beutel
Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society, 219-226, 2019
An operational semantics for JavaScript
S Maffeis, JC Mitchell, A Taly
Programming Languages and Systems: 6th Asian Symposium, APLAS 2008 …, 2008
Did the model understand the question?
PK Mudrakarta, A Taly, M Sundararajan, K Dhamdhere
arXiv preprint arXiv:1805.05492, 2018
The explanation game: Explaining machine learning models using shapley values
L Merrick, A Taly
Machine Learning and Knowledge Extraction: 4th IFIP TC 5, TC 12, WG 8.4, WG …, 2020
Explainable AI in industry
K Gade, SC Geyik, K Kenthapadi, V Mithal, A Taly
Proceedings of the 25th ACM SIGKDD international conference on knowledge …, 2019
Object capabilities and isolation of untrusted web applications
S Maffeis, JC Mitchell, A Taly
2010 IEEE Symposium on Security and Privacy, 125-140, 2010
Automated analysis of security-critical javascript apis
A Taly, Ú Erlingsson, JC Mitchell, MS Miller, J Nagra
2011 IEEE Symposium on Security and Privacy, 363-378, 2011
Macaroons: Cookies with contextual caveats for decentralized authorization in the cloud
A Birgisson, JG Politz, U Erlingsson, A Taly, M Vrable, M Lentczner
Language-based isolation of untrusted Javascript
S Maffeis, A Taly
2009 22nd IEEE Computer Security Foundations Symposium, 77-91, 2009
Gradients of counterfactuals
M Sundararajan, A Taly, Q Yan
arXiv preprint arXiv:1611.02639, 2016
Using attribution to decode binding mechanism in neural network models for chemistry
K McCloskey, A Taly, F Monti, MP Brenner, LJ Colwell
Proceedings of the National Academy of Sciences 116 (24), 11624-11629, 2019
Static analysis by policy iteration on relational domains
S Gaubert, E Goubault, A Taly, S Zennou
European symposium on programming, 237-252, 2007
Isolating JavaScript with filters, rewriting, and wrappers
S Maffeis, JC Mitchell, A Taly
Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009
Privacy, discovery, and authentication for the internet of things
DJ Wu, A Taly, A Shankar, D Boneh
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
Automated synthesis of symbolic instruction encodings from I/O samples
P Godefroid, A Taly
ACM SIGPLAN Notices 47 (6), 441-452, 2012
Property inference for deep neural networks
D Gopinath, H Converse, C Pasareanu, A Taly
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
Methods and systems of generating and using authentication credentials for decentralized authorization in the cloud
A Taly, U Erlingsson, A Birgisson, JG Politz, M Lentczner
US Patent 9,397,990, 2016
The system can't perform the operation now. Try again later.
Articles 1–20