6 results for “topic:p-hacking”
Code and data for the paper "Critical Values Robust to P-hacking"
FiveThirtyEight reader responses to a food frequency questionnaire (FFQ).
Will You Spot the Leaks? A Data Science Challenge When models fly too high: A perilous journey through data leakage
Why you shouldn't peek at significance levels to decide when to stop an experiment
LLM agent for p-hacking & selective-reporting risk screening in academic PDFs.
Benchmark for statistically valid AI scientist systems, using audit-closed protocols, transparency logs, and sequential inference to prevent false discoveries in autonomous research agents.