Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unwrapping ADMM: Efficient Distributed Computing via Transpose Reduction., , , and . CoRR, (2015)An analysis of linear models, linear value-function approximation, and feature selection for reinforcement learning., , , , and . ICML, volume 307 of ACM International Conference Proceeding Series, page 752-759. ACM, (2008)Feature Selection Using Regularization in Approximate Linear Programs for Markov Decision Processes., , , and . ICML, page 871-878. Omnipress, (2010)Transferable Clean-Label Poisoning Attacks on Deep Neural Nets., , , , , , and . CoRR, (2019)FLAG: Adversarial Data Augmentation for Graph Neural Networks., , , , , , , and . CoRR, (2020)Robust Optimization as Data Augmentation for Large-scale Graphs., , , , , , , and . CVPR, page 60-69. IEEE, (2022)LowKey: Leveraging Adversarial Attacks to Protect Social Media Users from Facial Recognition., , , , , , and . ICLR, OpenReview.net, (2021)Hoaxing statistical features of the Voynich Manuscript., and . Cryptologia, 41 (3): 247-268 (2017)Introduction to the Symposium on AI and the Mitigation of Human Error., , , and . AAAI Spring Symposia, AAAI Press, (2016)An Analysis of State-Relevance Weights and Sampling Distributions on L1-Regularized Approximate Linear Programming Approximation Accuracy., , and . ICML, volume 32 of JMLR Workshop and Conference Proceedings, page 451-459. JMLR.org, (2014)