Author of the publication

The Security of Latent Dirichlet Allocation.

, and . AISTATS, volume 38 of JMLR Workshop and Conference Proceedings, JMLR.org, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research and Simulation of Surface Fitting Algorithm Based on Surface Patches Splicing., , , and . AsiaSim (2), volume 324 of Communications in Computer and Information Science, page 286-295. Springer, (2012)Machine Teaching for Bayesian Learners.. CoRR, (2013)Corleone: hands-off crowdsourcing for entity matching., , , , , , and . SIGMOD Conference, page 601-612. ACM, (2014)Semi-Supervised Learning.. Encyclopedia of Machine Learning, Springer, (2010)Online Manifold Regularization: A New Learning Setting and Empirical Study., , and . ECML/PKDD (1), volume 5211 of Lecture Notes in Computer Science, page 393-407. Springer, (2008)Data Poisoning Attacks against Autoregressive Models., , and . AAAI, page 1452-1458. AAAI Press, (2016)The Sample Complexity of Teaching by Reinforcement on Q-Learning., , , , and . AAAI, page 10939-10947. AAAI Press, (2021)Data Poisoning to Fake a Nash Equilibria for Markov Games., , , and . AAAI, page 15979-15987. AAAI Press, (2024)Parameter identification of Hammerstein model for vibration control of piezoelectric blades based on PSO algorithm., , , and . RICAI, page 1042-1046. ACM, (2022)Who Wrote This Code? Identifying the Authors of Program Binaries., , and . ESORICS, volume 6879 of Lecture Notes in Computer Science, page 172-189. Springer, (2011)