Author of the publication

Learning to Generate Image Source-Agnostic Universal Adversarial Perturbations.

, , , , , , and . IJCAI, page 1714-1720. ijcai.org, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How can AI Automate End-to-End Data Science?, , , , , , , , , and 2 other author(s). CoRR, (2019)Survey on Applications of Multi-Armed and Contextual Bandits., , and . CEC, page 1-8. IEEE, (2020)Using multi-armed bandits to learn ethical priorities for online AI systems., , , and . IBM J. Res. Dev., 63 (4/5): 1:1-1:13 (2019)Double-Linear Thompson Sampling for Context-Attentive Bandits., , , , and . ICASSP, page 3450-3454. IEEE, (2021)Online Hyper-Parameter Tuning for the Contextual Bandit., and . ICASSP, page 3445-3449. IEEE, (2021)Hybrid-ε-greedy for Mobile Context-Aware Recommender System., , and . PAKDD (1), volume 7301 of Lecture Notes in Computer Science, page 468-479. Springer, (2012)Linear Upper Confident Bound with Missing Reward: Online Learning with Less Data., , and . IJCNN, page 1-6. IEEE, (2022)SupervisorBot: NLP-Annotated Real-Time Recommendations of Psychotherapy Treatment Strategies with Deep Reinforcement Learning., , and . IJCAI, page 7149-7153. ijcai.org, (2023)Toward Optimal Solution for the Context-Attentive Bandit Problem., , , , and . IJCAI, page 3493-3500. ijcai.org, (2021)Multi-armed Bandit Problem with Known Trend., and . CoRR, (2015)