Attacks on machine learning systems-common problems and methods E Ilyushin, D Namiot, I Chizhov International Journal of Open Information Technologies 10 (3), 17-22, 2022 | 42 | 2022 |
Survey of multiarmed bandit algorithms applied to recommendation systems G Elena, K Milos, I Eugene International Journal of Open Information Technologies 9 (4), 12-27, 2021 | 35 | 2021 |
On Trusted AI Platforms D Namiot, E Ilyushin, O Pilipenko International Journal of Open Information Technologies 10 (7), 119-127, 2022 | 25 | 2022 |
The rationale for working on robust machine learning D Namiot, E Ilyushin, I Chizhov International Journal of Open Information Technologies 9 (11), 68-74, 2021 | 23 | 2021 |
Ongoing academic and industrial projects dedicated to robust machine learning D Namiot, E Ilyushin, I Chizhov International Journal of Open Information Technologies 9 (10), 35-46, 2021 | 23 | 2021 |
On the robustness and security of Artificial Intelligence systems D Namiot, E Ilyushin International Journal of Open Information Technologies 10 (9), 126-134, 2022 | 18 | 2022 |
On source-to-source compilers E Ilyushin, D Namiot International Journal of Open Information Technologies 4 (5), 48-51, 2016 | 15 | 2016 |
On a formal verification of machine learning systems N Dmitry, I Eugene, C Ivan International Journal of Open Information Technologies 10 (5), 30-34, 2022 | 12 | 2022 |
Data shift monitoring in machine learning models D Namiot, E Ilyushin International Journal of Open Information Technologies 10 (12), 84-93, 2022 | 10 | 2022 |
Military applications of machine learning D Namiot, E Ilyushin, I Chizhov International Journal of Open Information Technologies 10 (1), 69-76, 2021 | 10 | 2021 |
Artificial intelligence and cybersecurity D Namiot, E Ilyushin, I Chizhov International Journal of Open Information Technologies 10 (9), 135-147, 2022 | 9 | 2022 |
Generative Models in Machine Learning D Namiot, E Ilyushin International Journal of Open Information Technologies 10 (7), 101-118, 2022 | 7 | 2022 |
Using machine learning methods to establish program authorship G Sergey, N Maxim, I Eugene, N Dmitry International Journal of Open Information Technologies 7 (1), 115-119, 2019 | 7 | 2019 |
Dialog-22 ruatd generated text detection N Maloyan, B Nutfullin, E Ilyushin arXiv preprint arXiv:2206.08029, 2022 | 6 | 2022 |
Noninvasive glioma grading with deep learning: a pilot study G Danilov, V Korolev, M Shifrin, E Ilyushin, N Maloyan, D Saada, ... MEDINFO 2021: One World, One Health–Global Partnership for Digital …, 2022 | 6 | 2022 |
Knowledge Graph Essentials and Key Technologies VS Gurin, EV Kostrov, YY Gavrilenko, DF Saada, EA Ilyushin, IV Chizhov Современные информационные технологии и ИТ-образование 15 (4), 932-944, 2019 | 6 | 2019 |
The electroencephalogram based classification of internally pronounced phonemes Y Gavrilenko, D Saada, E Ilyushin, AV Vartanov, A Shevchenko Brain-Inspired Cognitive Architectures for Artificial Intelligence: BICA* AI …, 2021 | 5 | 2021 |
Source code authorship identification using tokenization and boosting algorithms S Gorshkov, M Nered, E Ilyushin, D Namiot, V Sukhomlin International Conference on Modern Information Technology and IT Education …, 2018 | 5 | 2018 |
On memory management in Javascript applications E Ilyushin, D Namiot International Journal of Open Information Technologies 3 (10), 11-15, 2015 | 5 | 2015 |
Trusted Artificial Intelligence Platforms: Certification and Audit D Namiot, E Ilyushin International Journal of Open Information Technologies 12 (1), 43-60, 2024 | 4 | 2024 |