Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial Policies: Attacking Deep Reinforcement Learning., , , , , and . CoRR, (2019)Retrospective on the 2021 BASALT Competition on Learning from Human Feedback., , , , , , , , , and 6 other author(s). CoRR, (2022)An Empirical Investigation of Representation Learning for Imitation., , , , , , , , , and 2 other author(s). CoRR, (2022)Retrospective on the 2021 MineRL BASALT Competition on Learning from Human Feedback., , , , , , , , , and 6 other author(s). NeurIPS (Competition and Demos), volume 176 of Proceedings of Machine Learning Research, page 259-272. PMLR, (2021)An Empirical Investigation of Representation Learning for Imitation., , , , , , , , , and 3 other author(s). NeurIPS Datasets and Benchmarks, (2021)A Deep Learning Approach to Fast, Format-Agnostic Detection of Malicious Web Content., , , and . IEEE Symposium on Security and Privacy Workshops, page 8-14. IEEE Computer Society, (2018)Neural Networks are Surprisingly Modular., , , , and . CoRR, (2020)Clusterability in Neural Networks., , , , , and . CoRR, (2021)ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation., , , , and . USENIX Security Symposium, page 303-320. USENIX Association, (2019)Detecting Modularity in Deep Neural Networks., , , , , and . CoRR, (2021)