Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial examples from computational constraints, , and . (2018)cite arxiv:1805.10204Comment: 19 pages, 1 figure.Trace Reconstruction Revisited., , and . ESA, volume 8737 of Lecture Notes in Computer Science, page 689-700. Springer, (2014)A Robust Sparse Fourier Transform in the Continuous Setting., and . FOCS, page 583-600. IEEE Computer Society, (2015)Adversarial examples from computational constraints., , , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 831-840. PMLR, (2019)Markerless Outdoor Human Motion Capture Using Multiple Autonomous Micro Aerial Vehicles., , , , , , , and . ICCV, page 823-832. IEEE, (2019)Sparse recovery for Earth Mover Distance., , and . Allerton, page 1742-1744. IEEE, (2010)Testing Hereditary Properties of Sequences., , and . APPROX-RANDOM, volume 81 of LIPIcs, page 44:1-44:10. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Hardness and Algorithms for Robust and Sparse Optimization., , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 17926-17944. PMLR, (2022)Improved Concentration Bounds for Count-Sketch., and . SODA, page 669-686. SIAM, (2014)Efficient Sketches for the Set Query Problem.. SODA, page 41-56. SIAM, (2011)