Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Complexity of Reconnaissance Blind Chess., , and . CoRR, (2018)Adaptive Stress Testing: Finding Likely Failure Events with Reinforcement Learning., , , , , , , and . J. Artif. Intell. Res., (2020)On the Difficulty of Validating Voting Machine Software with Software., , and . EVT, USENIX Association, (2007)The Machine Reconnaissance Blind Chess Tournament of NeurIPS 2022., , , , , , , , , and 2 other author(s). NeurIPS (Competition and Demos), volume 220 of Proceedings of Machine Learning Research, page 119-132. PMLR, (2021)Detecting code alteration by creating a temporary memory bottleneck., , and . IEEE Trans. Inf. Forensics Secur., 4 (4): 638-650 (2009)A Security Analysis of the Internet Chess Club., , and . IEEE Secur. Priv., 4 (1): 46-52 (2006)Continuous Mean-Zero Disagreement-Regularized Imitation Learning (CMZ-DRIL)., , , and . CoRR, (2024)Are Patched Machines Really Fixed?, , and . IEEE Secur. Priv., 7 (5): 82-85 (2009)A Risk-Sensitive Approach to Policy Optimization., , , , and . AAAI, page 15019-15027. AAAI Press, (2023)Attacking the Diebold Signature Variant - RSA Signatures with Unverified High-order Padding., , and . CoRR, (2024)