Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting Unreliable Predictions by Shattering a Neural Network., , , , , and . CoRR, (2021)Maxwell's Demon at Work: Efficient Pruning by Leveraging Saturation of Neurons., , , , , and . CoRR, (2024)Probing Transfer in Deep Reinforcement Learning without Task Engineering., , , , and . CoLLAs, volume 199 of Proceedings of Machine Learning Research, page 1231-1254. PMLR, (2022)Adapting Auxiliary Losses Using Gradient Similarity, , , , and . (2018)cite arxiv:1812.02224.Identifying and attacking the saddle point problem in high-dimensional non-convex optimization, , , , , and . (2014)cite arxiv:1406.2572Comment: The theoretical review and analysis in this article draw heavily from arXiv:1405.4604 cs.LG.Revisiting Natural Gradient for Deep Networks, and . (2013)cite arxiv:1301.3584.Mix & Match Agent Curricula for Reinforcement Learning., , , , , , , and . ICML, volume 80 of Proceedings of Machine Learning Research, page 1095-1103. PMLR, (2018)Model compression via distillation and quantization., , and . ICLR (Poster), OpenReview.net, (2018)Malware classification with recurrent networks., , , , and . ICASSP, page 1916-1920. IEEE, (2015)Multiplicative Interactions and Where to Find Them., , , , , , , , and . ICLR, OpenReview.net, (2020)