Ex machina: Personal attacks seen at scale E Wulczyn, N Thain, L Dixon Proceedings of the 26th international conference on world wide web, 1391-1399, 2017 | 718 | 2017 |
Measuring and mitigating unintended bias in text classification L Dixon, J Li, J Sorensen, N Thain, L Vasserman Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society, 67-73, 2018 | 545 | 2018 |
Nuanced metrics for measuring unintended bias with real data for text classification D Borkan, L Dixon, J Sorensen, N Thain, L Vasserman Companion proceedings of the 2019 world wide web conference, 491-500, 2019 | 283 | 2019 |
Conversations gone awry: Detecting early signs of conversational failure J Zhang, JP Chang, C Danescu-Niculescu-Mizil, L Dixon, Y Hua, N Thain, ... arXiv preprint arXiv:1805.05345, 2018 | 176 | 2018 |
IsaPlanner: A prototype proof planner in Isabelle L Dixon, J Fleuriot Automated Deduction–CADE-19: 19th International Conference on Automated …, 2003 | 129 | 2003 |
Glam: Efficient scaling of language models with mixture-of-experts N Du, Y Huang, AM Dai, S Tong, D Lepikhin, Y Xu, M Krikun, Y Zhou, ... International Conference on Machine Learning, 5547-5569, 2022 | 121 | 2022 |
Conjecture synthesis for inductive theories M Johansson, L Dixon, A Bundy Journal of automated reasoning 47, 251-289, 2011 | 98 | 2011 |
Toxicity detection: Does context really matter? J Pavlopoulos, J Sorensen, L Dixon, N Thain, I Androutsopoulos arXiv preprint arXiv:2006.00998, 2020 | 83 | 2020 |
Crowdsourcing subjective tasks: the case study of understanding toxicity in online discussions L Aroyo, L Dixon, N Thain, O Redfield, R Rosen Companion proceedings of the 2019 world wide web conference, 1100-1105, 2019 | 67 | 2019 |
Open-graphs and monoidal theories L Dixon, A Kissinger Mathematical Structures in Computer Science 23 (2), 308-359, 2013 | 61 | 2013 |
Transferring application data between devices VWK Chen, P Lee, GM Hecht, E Chen, JC Chen, MI Carrera, ... US Patent 9,872,174, 2018 | 49 | 2018 |
Higher Order Rippling in IsaPlanner L Dixon, J Fleuriot Theorem Proving in Higher Order Logics: 17th International Conference …, 2004 | 48 | 2004 |
Convai at semeval-2019 task 6: Offensive language identification and categorization with perspective and bert J Pavlopoulos, N Thain, L Dixon, I Androutsopoulos Proceedings of the 13th international Workshop on Semantic Evaluation, 571-576, 2019 | 46 | 2019 |
Scheme-based theorem discovery and concept invention O Montano-Rivas, R McCasland, L Dixon, A Bundy Expert systems with applications 39 (2), 1637-1646, 2012 | 45 | 2012 |
Graphical reasoning in compact closed categories for quantum computation L Dixon, R Duncan Annals of Mathematics and Artificial Intelligence 56, 23-42, 2009 | 41 | 2009 |
Network traffic obfuscation and automated internet censorship L Dixon, T Ristenpart, T Shrimpton IEEE Security & Privacy 14 (6), 43-53, 2016 | 40 | 2016 |
Constructing induction rules for deductive synthesis proofs A Bundy, L Dixon, J Gow, J Fleuriot Electronic Notes in Theoretical Computer Science 153 (1), 3-21, 2006 | 40 | 2006 |
A proof planning framework for Isabelle L Dixon University of Edinburgh. College of Science and Engineering. School of …, 2006 | 37 | 2006 |
Towards formal proof script refactoring I Whiteside, D Aspinall, L Dixon, G Grov Intelligent Computer Mathematics: 18th Symposium, Calculemus 2011, and 10th …, 2011 | 35 | 2011 |
Case-analysis for rippling and inductive proof M Johansson, L Dixon, A Bundy Interactive Theorem Proving: First International Conference, ITP 2010 …, 2010 | 35 | 2010 |