Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visualizing the Loss Landscape of Neural Nets., , , , and . NeurIPS, page 6391-6401. (2018)Visualizing the Loss Landscape of Neural Nets, , , , and . (2017)Towards Modeling the Behavior of Autonomous Systems and Humans for Trusted Operations., , , , , , and . AAAI Spring Symposia, AAAI Press, (2014)IoT Sensor Gym: Training Autonomous IoT Devices with Deep Reinforcement Learning., , , and . IOT, page 37:1-37:4. ACM, (2019)An analysis of linear models, linear value-function approximation, and feature selection for reinforcement learning., , , , and . ICML, volume 307 of ACM International Conference Proceeding Series, page 752-759. ACM, (2008)Transferable Clean-Label Poisoning Attacks on Deep Neural Nets., , , , , , and . CoRR, (2019)Feature Selection Using Regularization in Approximate Linear Programs for Markov Decision Processes., , , and . ICML, page 871-878. Omnipress, (2010)Robust Optimization as Data Augmentation for Large-scale Graphs., , , , , , , and . CVPR, page 60-69. IEEE, (2022)LowKey: Leveraging Adversarial Attacks to Protect Social Media Users from Facial Recognition., , , , , , and . ICLR, OpenReview.net, (2021)Introduction to the Symposium on AI and the Mitigation of Human Error., , , and . AAAI Spring Symposia, AAAI Press, (2016)