Author of the publication

Saving Stochastic Bandits from Poisoning Attacks via Limited Data Verification.

, , , and . AAAI, page 8054-8061. AAAI Press, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Caching Is Hard - Even in the Fault Model., , , and . Algorithmica, 63 (4): 781-794 (2012)Predicting advertiser bidding behaviors in sponsored search by rationality modeling., , , and . WWW, page 1433-1444. International World Wide Web Conferences Steering Committee / ACM, (2013)Imitative Attacker Deception in Stackelberg Security Games., and . IJCAI, page 528-534. ijcai.org, (2019)Multi-Feature Fusion Based Deepfake Face Forgery Video Detection., , , , and . Syst., 10 (2): 31 (2022)Markov Persuasion Processes with Endogenous Agent Beliefs., , and . CoRR, (2023)Learning Correlated Stackelberg Equilibrium in General-Sum Multi-Leader-Single-Follower Games., , and . CoRR, (2022)Multi-class fuzzy support matrix machine for classification in roller bearing fault diagnosis., , , , and . Adv. Eng. Informatics, (2022)Process mining framework with time perspective for understanding acute care: a case study of AIS in hospitals., , , , , , and . BMC Medical Informatics Decis. Mak., 21 (1): 354 (2021)C-DTW for Human Action Recognition Based on Nanogenerator., , and . Sensors, 23 (16): 7230 (August 2023)Identification of soybean based on Sentinel-1/2 SAR and MSI imagery under a complex planting structure., , , , , and . Ecol. Informatics, (2022)