Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Local distance metric learning for efficient conformal predictors., , and . MLSP, page 1-6. IEEE, (2012)Decentralized synchronization protocols with nearest neighbor communication., and . SenSys, page 62-68. ACM, (2004)Out-of-Distribution Robustness with Deep Recursive Filters., , and . ICRA, page 14134-14140. IEEE, (2021)Dynamic ping optimization for surveillance in multistatic sonar buoy networks with energy constraints., and . CDC, page 1109-1114. IEEE, (2008)Deep CPT-RL: Imparting Human-Like Risk Sensitivity to Artificial Agents., , and . SafeAI@AAAI, volume 2808 of CEUR Workshop Proceedings, CEUR-WS.org, (2021)A Risk-Sensitive Approach to Policy Optimization., , , , and . AAAI, page 15019-15027. AAAI Press, (2023)Automatic recognition and assignment of missile pieces in clutter., , and . IJCNN, page 3177-3181. IEEE, (1999)Jacks of All Trades, Masters of None: Addressing Distributional Shift and Obtrusiveness via Transparent Patch Attacks., , , , and . ECCV Workshops (1), volume 12535 of Lecture Notes in Computer Science, page 105-119. Springer, (2020)JHUAPL TAC-KBP2013 Slot Filler Validation System., , , and . TAC, NIST, (2013)Stochastic optimisation with inequality constraints using simultaneous perturbations and penalty functions., and . Int. J. Control, 81 (8): 1232-1238 (2008)