Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Top-K Off-Policy Correction for a REINFORCE Recommender System., , , , , and . WSDM, page 456-464. ACM, (2019)CopyCatch: stopping group attacks by spotting lockstep behavior in social networks., , , , and . WWW, page 119-130. International World Wide Web Conferences Steering Committee / ACM, (2013)The Case for Learned Index Structures., , , , and . SIGMOD Conference, page 489-504. ACM, (2018)Spotting Suspicious Behaviors in Multimodal Data: A General Metric and Algorithms., , , , , and . IEEE Trans. Knowl. Data Eng., 28 (8): 2187-2200 (2016)Catching Synchronized Behaviors in Large Networks: A Graph Mining Approach., , , , and . ACM Trans. Knowl. Discov. Data, 10 (4): 35:1-35:27 (2016)Improving Uncertainty Estimates through the Relationship with Adversarial Robustness., , , and . CoRR, (2020)Improving Few-shot Generalization of Safety Classifiers via Data Augmented Parameter-Efficient Fine-Tuning., , , , , , and . CoRR, (2023)Underspecification Presents Challenges for Credibility in Modern Machine Learning., , , , , , , , , and 30 other author(s). CoRR, (2020)Controlled Decoding from Language Models., , , , , , , , , and 3 other author(s). CoRR, (2023)Network Anomaly Detection Using Co-clustering., , and . Encyclopedia of Social Network Analysis and Mining. 2nd Ed., Springer, (2018)