Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implicit Factoring with Shared Most Significant and Middle Bits., , and . Public Key Cryptography, volume 6056 of Lecture Notes in Computer Science, page 70-87. Springer, (2010)Self-Attentional Credit Assignment for Transfer in Reinforcement Learning., , , and . IJCAI, page 2655-2661. ijcai.org, (2020)Scheduled for July 2020, Yokohama, Japan, postponed due to the Corona pandemic..An Adaptive Chosen-plaintext Attack of the Improved Cellular Message Encryption Algorithm., and . Int. J. Netw. Secur., 9 (2): 173-179 (2009)Speak, Read and Prompt: High-Fidelity Text-to-Speech with Minimal Supervision., , , , , , , , and . CoRR, (2023)AudioLM: A Language Modeling Approach to Audio Generation., , , , , , , , , and 1 other author(s). IEEE ACM Trans. Audio Speech Lang. Process., (2023)Cryptanalysis of the Improved Cellular Message Encryption Algorithm., and . IACR Cryptology ePrint Archive, (2008)Credit Assignment as a Proxy for Transfer in Reinforcement Learning., , , and . CoRR, (2019)SEED RL: Scalable and Efficient Deep-RL with Accelerated Central Inference., , , , and . CoRR, (2019)Solving N-Player Dynamic Routing Games with Congestion: A Mean-Field Approach., , , , , , , , , and . AAMAS, page 1557-1559. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), (2022)What Matters In On-Policy Reinforcement Learning? A Large-Scale Empirical Study., , , , , , , , , and 2 other author(s). CoRR, (2020)