Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Certified Defenses for Data Poisoning Attacks., , and . NIPS, page 3517-3529. (2017)Enabling certification of verification-agnostic networks via memory-efficient semidefinite programming., , , , , , , , , and 1 other author(s). NeurIPS, (2020)Deep Bidirectional Language-Knowledge Graph Pretraining., , , , , , and . NeurIPS, (2022)Learning with Relaxed Supervision., and . NIPS, page 2827-2835. (2015)What Can Transformers Learn In-Context? A Case Study of Simple Function Classes., , , and . NeurIPS, (2022)Learning Overcomplete HMMs., , , and . NIPS, page 940-949. (2017)Picking on the Same Person: Does Algorithmic Monoculture lead to Outcome Homogenization?, , , , and . NeurIPS, (2022)Generative Agents: Interactive Simulacra of Human Behavior., , , , , and . UIST, page 2:1-2:22. ACM, (2023)Distributionally Robust Language Modeling., , , and . EMNLP/IJCNLP (1), page 4226-4236. Association for Computational Linguistics, (2019)Designing and Interpreting Probes with Control Tasks., and . EMNLP/IJCNLP (1), page 2733-2743. Association for Computational Linguistics, (2019)