Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Who Leaked the Model? Tracking IP Infringers in Accountable Federated Learning., , , , , and . CoRR, (2023)Algorithm of Thoughts: Enhancing Exploration of Ideas in Large Language Models., , , , , and . CoRR, (2023)An Empirical and Comparative Analysis of Data Valuation with Scalable Algorithms., , , , , and . CoRR, (2019)Learnability of Learning Performance and Its Application to Data Valuation., , and . CoRR, (2021)A Safe Harbor for AI Evaluation and Red Teaming., , , , , , , , , and 13 other author(s). CoRR, (2024)Performance Scaling via Optimal Transport: Enabling Data Selection from Partially Revealed Sources., , , and . CoRR, (2023)SoundLoc: Acoustic Method for Indoor Localization without Infrastructure., , and . CoRR, (2014)PresenceSense: zero-training algorithm for individual presence detection based on power monitoring., , , , and . BuildSys@SenSys, page 1-10. ACM, (2014)InfoBERT: Improving Robustness of Language Models from An Information Theoretic Perspective., , , , , , and . ICLR, OpenReview.net, (2021)Data Banzhaf: A Robust Data Valuation Framework for Machine Learning., and . AISTATS, volume 206 of Proceedings of Machine Learning Research, page 6388-6421. PMLR, (2023)