Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The food locker: an innovative, user-centered approach to address food insecurity on campus., , , , and . SIGDOC, page 34:1-34:6. ACM, (2019)PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation., , , , and . USENIX Security Symposium, page 789-806. USENIX Association, (2020)SGD-X: A Benchmark for Robust Generalization in Schema-Guided Dialogue Systems., , , , , and . AAAI, page 10938-10946. AAAI Press, (2022)RLAIF vs. RLHF: Scaling Reinforcement Learning from Human Feedback with AI Feedback., , , , , , , , , and 1 other author(s). ICML, OpenReview.net, (2024)RLPF: Reinforcement Learning from Prediction Feedback for User Summarization with LLMs., , , , , , , , , and . CoRR, (2024)Rlaif: Scaling reinforcement learning from human feedback with ai feedback, , , , , , , and . arXiv preprint arXiv:2309.00267, (2023)Improved Electrical Reliability and Performance Enhancements in SiGe HBTs Using Dummy BEOL Metal Layers., , , and . BCICTS, page 62-65. IEEE, (2022)A free energy principle for the brain, , and . Journal of Physiology-Paris, 100 (1-3): 70--87 (2006)Theoretical and Computational Neuroscience: Understanding Brain Functions.Show, Don't Tell: Demonstrations Outperform Descriptions for Schema-Guided Task-Oriented Dialogue., , , , , and . NAACL-HLT, page 4541-4549. Association for Computational Linguistics, (2022)ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 273-290. USENIX Association, (2018)