Follow
Lucas Dixon
Title
Cited by
Cited by
Year
Ex machina: Personal attacks seen at scale
E Wulczyn, N Thain, L Dixon
Proceedings of the 26th international conference on world wide web, 1391-1399, 2017
8472017
Measuring and mitigating unintended bias in text classification
L Dixon, J Li, J Sorensen, N Thain, L Vasserman
Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society, 67-73, 2018
7062018
Nuanced metrics for measuring unintended bias with real data for text classification
D Borkan, L Dixon, J Sorensen, N Thain, L Vasserman
Companion proceedings of the 2019 world wide web conference, 491-500, 2019
3892019
Gemini: a family of highly capable multimodal models
G Team, R Anil, S Borgeaud, Y Wu, JB Alayrac, J Yu, R Soricut, ...
arXiv preprint arXiv:2312.11805, 2023
3482023
Glam: Efficient scaling of language models with mixture-of-experts
N Du, Y Huang, AM Dai, S Tong, D Lepikhin, Y Xu, M Krikun, Y Zhou, ...
International Conference on Machine Learning, 5547-5569, 2022
3222022
Conversations gone awry: Detecting early signs of conversational failure
J Zhang, JP Chang, C Danescu-Niculescu-Mizil, L Dixon, Y Hua, N Thain, ...
arXiv preprint arXiv:1805.05345, 2018
2052018
IsaPlanner: A prototype proof planner in Isabelle
L Dixon, J Fleuriot
International Conference on Automated Deduction, 279-283, 2003
1262003
Toxicity detection: Does context really matter?
J Pavlopoulos, J Sorensen, L Dixon, N Thain, I Androutsopoulos
arXiv preprint arXiv:2006.00998, 2020
1252020
Conjecture synthesis for inductive theories
M Johansson, L Dixon, A Bundy
Journal of automated reasoning 47, 251-289, 2011
1032011
Crowdsourcing subjective tasks: the case study of understanding toxicity in online discussions
L Aroyo, L Dixon, N Thain, O Redfield, R Rosen
Companion proceedings of the 2019 world wide web conference, 1100-1105, 2019
892019
Transferring application data between devices
VWK Chen, P Lee, GM Hecht, E Chen, JC Chen, MI Carrera, ...
US Patent 9,872,174, 2018
682018
Open-graphs and monoidal theories
L Dixon, A Kissinger
Mathematical Structures in Computer Science 23 (2), 308-359, 2013
602013
Convai at semeval-2019 task 6: Offensive language identification and categorization with perspective and bert
J Pavlopoulos, N Thain, L Dixon, I Androutsopoulos
Proceedings of the 13th international Workshop on Semantic Evaluation, 571-576, 2019
532019
Network traffic obfuscation and automated internet censorship
L Dixon, T Ristenpart, T Shrimpton
IEEE Security & Privacy 14 (6), 43-53, 2016
502016
Higher Order Rippling in IsaPlanner
L Dixon, J Fleuriot
Theorem Proving in Higher Order Logics: 17th International Conference …, 2004
502004
Scheme-based theorem discovery and concept invention
O Montano-Rivas, R McCasland, L Dixon, A Bundy
Expert systems with applications 39 (2), 1637-1646, 2012
462012
Graphical reasoning in compact closed categories for quantum computation
L Dixon, R Duncan
Annals of Mathematics and Artificial Intelligence 56, 23-42, 2009
422009
Civil rephrases of toxic texts with self-supervised transformers
L Laugier, J Pavlopoulos, J Sorensen, L Dixon
arXiv preprint arXiv:2102.05456, 2021
392021
Six attributes of unhealthy conversation
I Price, J Gifford-Moore, J Fleming, S Musker, M Roichman, G Sylvain, ...
arXiv preprint arXiv:2010.07410, 2020
392020
Constructing induction rules for deductive synthesis proofs
A Bundy, L Dixon, J Gow, J Fleuriot
Electronic Notes in Theoretical Computer Science 153 (1), 3-21, 2006
392006
The system can't perform the operation now. Try again later.
Articles 1–20