Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sequential Deep Belief Networks., and . ICASSP, page 4265-4268. IEEE, (2012)Interactive Control of Diverse Complex Characters with Neural Networks., , , , and . NIPS, page 3132-3140. (2015)One-shot Empirical Privacy Estimation for Federated Learning., , , , , and . ICLR, OpenReview.net, (2024)Scalable training of L1-regularized log-linear models., and . ICML, volume 227 of ACM International Conference Proceeding Series, page 33-40. ACM, (2007)A Conditional Random Field Word Segmenter for Sighan Bakeoff 2005., , , , and . SIGHAN@IJCNLP 2005, ACL, (2005)Differentially Private Learning with Adaptive Clipping., , , and . NeurIPS, page 17455-17466. (2021)One-shot Empirical Privacy Estimation for Federated Learning., , , , , and . CoRR, (2023)A Portfolio Approach to Algorithm Selection, , , , and . Proceedings of IJCAI-03, 18th International Joint Conference on Artificial Intelligence, San Francisco, US, Morgan Kaufmann, (2003)A Portfolio Approach to Algorithm Selection., , , , and . IJCAI, page 1542. Morgan Kaufmann, (2003)Tregex and Tsurgeon: tools for querying and manipulating tree data structures., and . LREC, page 2231-2234. European Language Resources Association (ELRA), (2006)