Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prediction and Clustering in Signed Networks: A Local to Global Perspective, , , , and . CoRR, (2013)Low rank modeling of signed networks., , and . KDD, page 507-515. ACM, (2012)Double Perturbation: On the Robustness of Robustness and Counterfactual Bias Evaluation., , , , and . NAACL-HLT, page 3899-3916. Association for Computational Linguistics, (2021)RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications., , and . AAAI, page 5757-5764. AAAI Press, (2019)Searching for an Effective Defender: Benchmarking Defense against Adversarial Word Substitution., , , , , , , and . EMNLP (1), page 3137-3147. Association for Computational Linguistics, (2021)Relevance under the Iceberg: Reasonable Prediction for Extreme Multi-label Classification., , , , and . SIGIR, page 1870-1874. ACM, (2022)Convergence of Adversarial Training in Overparametrized Neural Networks., , , , , and . NeurIPS, page 13009-13020. (2019)Elastic-InfoGAN: Unsupervised Disentangled Representation Learning in Class-Imbalanced Data., , , and . NeurIPS, (2020)An Efficient Adversarial Attack for Tree Ensembles., , and . NeurIPS, (2020)Robust Deep Reinforcement Learning against Adversarial Perturbations on State Observations., , , , , , and . NeurIPS, (2020)