The Mirrored Influence Hypothesis: Efficient Data Influence Estimation by Harnessing Forward Passes. Ko, M., Kang, F., Shi, W., Jin, M., Yu, Z., & Jia, R. In Conference on Computer Vision and Pattern Recognition (CVPR), 2024.
Arxiv bibtex 8 downloads @inproceedings{2024_3C_mirror,
title={The Mirrored Influence Hypothesis: Efficient Data Influence Estimation by Harnessing Forward Passes},
author={Myeongseob Ko and Feiyang Kang and Weiyan Shi and Ming Jin and Zhou Yu and Ruoxi Jia},
booktitle={Conference on Computer Vision and Pattern Recognition (CVPR)},
pages={},
year={2024},
url_arXiv = {https://arxiv.org/abs/2402.08922v1},
keywords = {Cybersecurity, Data Valuation, Machine Learning}
}
Downloads: 8
{"_id":"Nuk8mas8WEn4Lr2qH","bibbaseid":"ko-kang-shi-jin-yu-jia-themirroredinfluencehypothesisefficientdatainfluenceestimationbyharnessingforwardpasses-2024","author_short":["Ko, M.","Kang, F.","Shi, W.","Jin, M.","Yu, Z.","Jia, R."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"The Mirrored Influence Hypothesis: Efficient Data Influence Estimation by Harnessing Forward Passes","author":[{"firstnames":["Myeongseob"],"propositions":[],"lastnames":["Ko"],"suffixes":[]},{"firstnames":["Feiyang"],"propositions":[],"lastnames":["Kang"],"suffixes":[]},{"firstnames":["Weiyan"],"propositions":[],"lastnames":["Shi"],"suffixes":[]},{"firstnames":["Ming"],"propositions":[],"lastnames":["Jin"],"suffixes":[]},{"firstnames":["Zhou"],"propositions":[],"lastnames":["Yu"],"suffixes":[]},{"firstnames":["Ruoxi"],"propositions":[],"lastnames":["Jia"],"suffixes":[]}],"booktitle":"Conference on Computer Vision and Pattern Recognition (CVPR)","pages":"","year":"2024","url_arxiv":"https://arxiv.org/abs/2402.08922v1","keywords":"Cybersecurity, Data Valuation, Machine Learning","bibtex":"@inproceedings{2024_3C_mirror,\n title={The Mirrored Influence Hypothesis: Efficient Data Influence Estimation by Harnessing Forward Passes},\n author={Myeongseob Ko and Feiyang Kang and Weiyan Shi and Ming Jin and Zhou Yu and Ruoxi Jia},\n booktitle={Conference on Computer Vision and Pattern Recognition (CVPR)},\n pages={},\n year={2024},\n url_arXiv = {https://arxiv.org/abs/2402.08922v1},\n keywords = {Cybersecurity, Data Valuation, Machine Learning}\n}\n\n\n","author_short":["Ko, M.","Kang, F.","Shi, W.","Jin, M.","Yu, Z.","Jia, R."],"key":"2024_3C_mirror","id":"2024_3C_mirror","bibbaseid":"ko-kang-shi-jin-yu-jia-themirroredinfluencehypothesisefficientdatainfluenceestimationbyharnessingforwardpasses-2024","role":"author","urls":{" arxiv":"https://arxiv.org/abs/2402.08922v1"},"keyword":["Cybersecurity","Data Valuation","Machine Learning"],"metadata":{"authorlinks":{}},"downloads":8},"bibtype":"inproceedings","biburl":"http://www.jinming.tech/papers/myref.bib","dataSources":["sTzDHHaipTZWjp8oe"],"keywords":["cybersecurity","data valuation","machine learning"],"search_terms":["mirrored","influence","hypothesis","efficient","data","influence","estimation","harnessing","forward","passes","ko","kang","shi","jin","yu","jia"],"title":"The Mirrored Influence Hypothesis: Efficient Data Influence Estimation by Harnessing Forward Passes","year":2024,"downloads":8}