Ex machina: Personal attacks seen at scale E Wulczyn, N Thain, L Dixon Proceedings of the 26th international conference on world wide web, 1391-1399, 2017 | 883 | 2017 |
Gemini: a family of highly capable multimodal models G Team, R Anil, S Borgeaud, Y Wu, JB Alayrac, J Yu, R Soricut, ... arXiv preprint arXiv:2312.11805, 2023 | 816 | 2023 |
Measuring and mitigating unintended bias in text classification L Dixon, J Li, J Sorensen, N Thain, L Vasserman Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society, 67-73, 2018 | 770 | 2018 |
Nuanced metrics for measuring unintended bias with real data for text classification D Borkan, L Dixon, J Sorensen, N Thain, L Vasserman Companion proceedings of the 2019 world wide web conference, 491-500, 2019 | 419 | 2019 |
Glam: Efficient scaling of language models with mixture-of-experts N Du, Y Huang, AM Dai, S Tong, D Lepikhin, Y Xu, M Krikun, Y Zhou, ... International Conference on Machine Learning, 5547-5569, 2022 | 393 | 2022 |
Conversations gone awry: Detecting early signs of conversational failure J Zhang, JP Chang, C Danescu-Niculescu-Mizil, L Dixon, Y Hua, N Thain, ... arXiv preprint arXiv:1805.05345, 2018 | 215 | 2018 |
Gemma: Open models based on gemini research and technology G Team, T Mesnard, C Hardin, R Dadashi, S Bhupatiraju, S Pathak, ... arXiv preprint arXiv:2403.08295, 2024 | 171 | 2024 |
Toxicity detection: Does context really matter? J Pavlopoulos, J Sorensen, L Dixon, N Thain, I Androutsopoulos arXiv preprint arXiv:2006.00998, 2020 | 138 | 2020 |
IsaPlanner: A prototype proof planner in Isabelle L Dixon, J Fleuriot International Conference on Automated Deduction, 279-283, 2003 | 128 | 2003 |
Gemini 1.5: Unlocking multimodal understanding across millions of tokens of context M Reid, N Savinov, D Teplyashin, D Lepikhin, T Lillicrap, J Alayrac, ... arXiv preprint arXiv:2403.05530, 2024 | 108 | 2024 |
Conjecture synthesis for inductive theories M Johansson, L Dixon, A Bundy Journal of automated reasoning 47, 251-289, 2011 | 104 | 2011 |
Crowdsourcing subjective tasks: the case study of understanding toxicity in online discussions L Aroyo, L Dixon, N Thain, O Redfield, R Rosen Companion proceedings of the 2019 world wide web conference, 1100-1105, 2019 | 96 | 2019 |
Transferring application data between devices VWK Chen, P Lee, GM Hecht, E Chen, JC Chen, MI Carrera, ... US Patent 9,872,174, 2018 | 71 | 2018 |
Open-graphs and monoidal theories L Dixon, A Kissinger Mathematical Structures in Computer Science 23 (2), 308-359, 2013 | 60 | 2013 |
Convai at semeval-2019 task 6: Offensive language identification and categorization with perspective and bert J Pavlopoulos, N Thain, L Dixon, I Androutsopoulos Proceedings of the 13th international Workshop on Semantic Evaluation, 571-576, 2019 | 54 | 2019 |
Network traffic obfuscation and automated internet censorship L Dixon, T Ristenpart, T Shrimpton IEEE Security & Privacy 14 (6), 43-53, 2016 | 53 | 2016 |
Higher Order Rippling in IsaPlanner L Dixon, J Fleuriot Theorem Proving in Higher Order Logics: 17th International Conference …, 2004 | 49 | 2004 |
Scheme-based theorem discovery and concept invention O Montano-Rivas, R McCasland, L Dixon, A Bundy Expert systems with applications 39 (2), 1637-1646, 2012 | 48 | 2012 |
Large language models are competitive near cold-start recommenders for language-and item-based preferences S Sanner, K Balog, F Radlinski, B Wedin, L Dixon Proceedings of the 17th ACM conference on recommender systems, 890-896, 2023 | 44 | 2023 |
Six attributes of unhealthy conversation I Price, J Gifford-Moore, J Fleming, S Musker, M Roichman, G Sylvain, ... arXiv preprint arXiv:2010.07410, 2020 | 43 | 2020 |