Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Communication Algorithms via Deep Learning., , , , , and . ICLR (Poster), OpenReview.net, (2018)Learning One-hidden-layer Neural Networks under General Input Distributions., , , and . AISTATS, volume 89 of Proceedings of Machine Learning Research, page 1950-1959. PMLR, (2019)Gossip PCA., , and . SIGMETRICS, page 209-220. ACM, (2011)Proof-of-Stake Longest Chain Protocols: Security vs Predictability., , , , , , , and . ConsensusDay@CCS, page 29-42. ACM, (2022)Matrix Completion from Noisy Entries., , and . J. Mach. Learn. Res., (2010)Private (Stochastic) Non-Convex Optimization Revisited: Second-Order Stationary Points and Excess Risks., , , and . CoRR, (2023)Joint Channel Coding and Modulation via Deep Learning., , , , , and . SPAWC, page 1-5. IEEE, (2020)Learning to Generate Image Embeddings with User-Level Differential Privacy., , , , , , , , and . CVPR, page 7969-7980. IEEE, (2023)Budget-optimal crowdsourcing using low-rank matrix approximations., , and . Allerton, page 284-291. IEEE, (2011)Learning One-hidden-layer Neural Networks under General Input Distributions., , , and . CoRR, (2018)