default search action
John Mellor
Person information
Other persons with a similar name
- John E. Mellor
- John F. J. Mellor
- John Phillip Mellor
- John M. Mellor-Crummey — Rice University, Houston, USA
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Laura Weidinger, John Mellor, Bernat Guillen Pegueroles, Nahema Marchal, Ravin Kumar, Kristian Lum, Canfer Akbulut, Mark Diaz, A. Stevie Bergman, Mikel Rodriguez, Verena Rieser, William Isaac:
STAR: SocioTechnical Approach to Red Teaming Language Models. EMNLP 2024: 21516-21532 - [i7]Laura Weidinger, John Mellor, Bernat Guillen Pegueroles, Nahema Marchal, Ravin Kumar, Kristian Lum, Canfer Akbulut, Mark Diaz, A. Stevie Bergman, Mikel Rodriguez, Verena Rieser, William Isaac:
STAR: SocioTechnical Approach to Red Teaming Language Models. CoRR abs/2406.11757 (2024) - 2022
- [c18]Laura Weidinger, Jonathan Uesato, Maribeth Rauh, Conor Griffin, Po-Sen Huang, John Mellor, Amelia Glaese, Myra Cheng, Borja Balle, Atoosa Kasirzadeh, Courtney Biles, Sasha Brown, Zac Kenton, Will Hawkins, Tom Stepleton, Abeba Birhane, Lisa Anne Hendricks, Laura Rimell, William Isaac, Julia Haas, Sean Legassick, Geoffrey Irving, Iason Gabriel:
Taxonomy of Risks posed by Language Models. FAccT 2022: 214-229 - [c17]Maribeth Rauh, John Mellor, Jonathan Uesato, Po-Sen Huang, Johannes Welbl, Laura Weidinger, Sumanth Dathathri, Amelia Glaese, Geoffrey Irving, Iason Gabriel, William Isaac, Lisa Anne Hendricks:
Characteristics of Harmful Text: Towards Rigorous Benchmarking of Language Models. NeurIPS 2022 - [i6]Maribeth Rauh, John Mellor, Jonathan Uesato, Po-Sen Huang, Johannes Welbl, Laura Weidinger, Sumanth Dathathri, Amelia Glaese, Geoffrey Irving, Iason Gabriel, William Isaac, Lisa Anne Hendricks:
Characteristics of Harmful Text: Towards Rigorous Benchmarking of Language Models. CoRR abs/2206.08325 (2022) - [i5]Amelia Glaese, Nat McAleese, Maja Trebacz, John Aslanides, Vlad Firoiu, Timo Ewalds, Maribeth Rauh, Laura Weidinger, Martin J. Chadwick, Phoebe Thacker, Lucy Campbell-Gillingham, Jonathan Uesato, Po-Sen Huang, Ramona Comanescu, Fan Yang, Abigail See, Sumanth Dathathri, Rory Greig, Charlie Chen, Doug Fritz, Jaume Sanchez Elias, Richard Green, Sona Mokrá, Nicholas Fernando, Boxi Wu, Rachel Foley, Susannah Young, Iason Gabriel, William Isaac, John Mellor, Demis Hassabis, Koray Kavukcuoglu, Lisa Anne Hendricks, Geoffrey Irving:
Improving alignment of dialogue agents via targeted human judgements. CoRR abs/2209.14375 (2022) - 2021
- [j2]Lisa Anne Hendricks, John Mellor, Rosalia Schneider, Jean-Baptiste Alayrac, Aida Nematzadeh:
Decoupling the Role of Data, Attention, and Losses in Multimodal Transformers. Trans. Assoc. Comput. Linguistics 9: 570-585 (2021) - [c16]Johannes Welbl, Amelia Glaese, Jonathan Uesato, Sumanth Dathathri, John Mellor, Lisa Anne Hendricks, Kirsty Anderson, Pushmeet Kohli, Ben Coppin, Po-Sen Huang:
Challenges in Detoxifying Language Models. EMNLP (Findings) 2021: 2447-2469 - [i4]Lisa Anne Hendricks, John Mellor, Rosalia Schneider, Jean-Baptiste Alayrac, Aida Nematzadeh:
Decoupling the Role of Data, Attention, and Losses in Multimodal Transformers. CoRR abs/2102.00529 (2021) - [i3]Johannes Welbl, Amelia Glaese, Jonathan Uesato, Sumanth Dathathri, John Mellor, Lisa Anne Hendricks, Kirsty Anderson, Pushmeet Kohli, Ben Coppin, Po-Sen Huang:
Challenges in Detoxifying Language Models. CoRR abs/2109.07445 (2021) - [i2]Laura Weidinger, John Mellor, Maribeth Rauh, Conor Griffin, Jonathan Uesato, Po-Sen Huang, Myra Cheng, Mia Glaese, Borja Balle, Atoosa Kasirzadeh, Zac Kenton, Sasha Brown, Will Hawkins, Tom Stepleton, Courtney Biles, Abeba Birhane, Julia Haas, Laura Rimell, Lisa Anne Hendricks, William Isaac, Sean Legassick, Geoffrey Irving, Iason Gabriel:
Ethical and social risks of harm from Language Models. CoRR abs/2112.04359 (2021) - [i1]Jack W. Rae, Sebastian Borgeaud, Trevor Cai, Katie Millican, Jordan Hoffmann, H. Francis Song, John Aslanides, Sarah Henderson, Roman Ring, Susannah Young, Eliza Rutherford, Tom Hennigan, Jacob Menick, Albin Cassirer, Richard Powell, George van den Driessche, Lisa Anne Hendricks, Maribeth Rauh, Po-Sen Huang, Amelia Glaese, Johannes Welbl, Sumanth Dathathri, Saffron Huang, Jonathan Uesato, John Mellor, Irina Higgins, Antonia Creswell, Nat McAleese, Amy Wu, Erich Elsen, Siddhant M. Jayakumar, Elena Buchatskaya, David Budden, Esme Sutherland, Karen Simonyan, Michela Paganini, Laurent Sifre, Lena Martens, Xiang Lorraine Li, Adhiguna Kuncoro, Aida Nematzadeh, Elena Gribovskaya, Domenic Donato, Angeliki Lazaridou, Arthur Mensch, Jean-Baptiste Lespiau, Maria Tsimpoukelli, Nikolai Grigorev, Doug Fritz, Thibault Sottiaux, Mantas Pajarskas, Toby Pohlen, Zhitao Gong, Daniel Toyama, Cyprien de Masson d'Autume, Yujia Li, Tayfun Terzi, Vladimir Mikulik, Igor Babuschkin, Aidan Clark, Diego de Las Casas, Aurelia Guy, Chris Jones, James Bradbury, Matthew J. Johnson, Blake A. Hechtman, Laura Weidinger, Iason Gabriel, William Isaac, Edward Lockhart, Simon Osindero, Laura Rimell, Chris Dyer, Oriol Vinyals, Kareem Ayoub, Jeff Stanway, Lorrayne Bennett, Demis Hassabis, Koray Kavukcuoglu, Geoffrey Irving:
Scaling Language Models: Methods, Analysis & Insights from Training Gopher. CoRR abs/2112.11446 (2021)
2010 – 2019
- 2014
- [c15]Ashardi Abas, John Mellor, Xun Chen:
Non-intrusive drowsiness detection by employing Support Vector Machine. ICAC 2014: 188-193 - 2011
- [c14]Ahmed Ghneimat, John Mellor, Ping Jiang:
Adaptive, Cluster Based, Sensor Network Routing Protocol. UKSim 2011: 472-476 - [p1]Monis Akhlaq, Faeiz Alserhani, Irfan Awan, John Mellor, Andrea J. Cullen, Abdullah Al-Dhelaan:
Implementation and Evaluation of Network Intrusion Detection Systems. Network Performance Engineering 2011: 988-1016 - 2010
- [c13]Monis Akhlaq, Faeiz Alserhani, Ahsan Subhan, Irfan-Ullah Awan, John Mellor, Pravin Mirchandani:
High Speed NIDS using Dynamic Cluster and Comparator Logic. CIT 2010: 575-581
2000 – 2009
- 2009
- [c12]Faeiz Alserhani, Monis Akhlaq, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani:
Evaluating Intrusion Detection Systems in High Speed Networks. IAS 2009: 454-459 - [c11]A. Al-Haj, John Mellor, Irfan-Ullah Awan:
Performance Evaluation of Secure Call Admission Control for Multiclass Internet Services. AINA Workshops 2009: 117-121 - [c10]Monis Akhlaq, Baber Aslam, Faeiz Alserhani, Irfan-Ullah Awan, John Mellor:
Empowered Certification Authority in VANETs. AINA Workshops 2009: 181-186 - [c9]Ra'ed AlJa'afreh, John Mellor, Irfan-Ullah Awan:
A Comparison Between the Tunneling Process and Mapping Schemes for IPv4/IPv6 Transition. AINA Workshops 2009: 601-606 - [c8]Monis Akhlaq, Faeiz Alserhani, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani:
Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment. ISDF 2009: 26-41 - [c7]Ahsan Subhan, Monis Akhlaq, Faeiz Alserhani, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani:
Smart Logic - Preventing Packet Loss in High Speed Network Intrusion Detection Systems. ISDF 2009: 57-65 - [c6]Monis Akhlaq, Faeiz Alserhani, Irfan-Ullah Awan, Andrea J. Cullen, John Mellor, Pravin Mirchandani:
Virtualization in Network Intrusion Detection Systems. OTM Workshops 2009: 6-8 - 2008
- [c5]Mohamed Saad Saleh, Abdulkader Alfantookh, John Mellor, Saad Haj Bakry:
An Open Reference Framework for Enterprise Information Security Risk Management Using the STOPE Scope and the Six-Sigma Process. AMCIS 2008: 281 - [c4]Ra'ed AlJa'afreh, John Mellor, Irfan Awan:
Evaluating BDMS and DSTM Transition Mechanisms. EMS 2008: 488-493 - [c3]Ra'ed AlJa'afreh, John Mellor, Irfan Awan:
Implementation of IPv4/IPv6 BDMS Translation Mechanism. EMS 2008: 512-517 - [c2]Ra'ed AlJa'afreh, John Mellor, Mumtaz Kamala, Basil Al-Kasasbeh:
Bi-directional Mapping System as a New IPv4/IPv6 Translation Mechanism. UKSim 2008: 40-45 - [c1]M. Mansour, John Mellor, Irfan Awan:
Fast Handoff Scheme Using Location Information. UKSim 2008: 428-433 - 2007
- [j1]Shafqat Hameed, John Mellor, Atta Badii, Niyati Patel, Andrea J. Cullen:
Factors mediating the routinisation of e-learning within a traditional university education environment. Int. J. Electron. Bus. 5(2): 160-175 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint