Author of the publication

Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations.

, , , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 367-393. PMLR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy efficient node engagement strategies for achieving data fidelity in wireless sensor networks., , and . LCN, page 723-729. IEEE Computer Society, (2010)Visualization of multivariate time-series data in a neonatal ICU., , , , , , and . IBM J. Res. Dev., 56 (5): 7 (2012)Marcus Hutter, Universal Artificial Intelligence, Springer (2004)., and . Artif. Intell., 170 (18): 1222-1226 (2006)Advancing Security in AI Systems: A Novel Approach to Detecting Backdoors in Deep Neural Networks., and . CoRR, (2024)Towards a Correct-by-Construction Design of Integrated Modular Avionics., , , , , , , , , and 2 other author(s). FMCAD, page 221-227. IEEE, (2023)Finding news story chains based on multi-dimensional event profiles., and . OAIR, page 157-164. ACM, (2013)Neuroevolution-Based Inverse Reinforcement Learning., and . CoRR, (2016)Automatic Goal Generation using Dynamical Distance Learning., , , and . CoRR, (2021)Towards an Interpretable Hierarchical Agent Framework using Semantic Goals., , , and . CoRR, (2022)Determining the Scale of Impact from Denial-of-Service Attacks in Real Time Using Twitter., , , and . CoRR, (2019)