Author of the publication

Variational Annealing of GANs: A Langevin Perspective.

, , , , , , , , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 6176-6185. PMLR, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient threshold password-authenticated secret sharing protocols for cloud computing., , , , , , , , and . J. Parallel Distributed Comput., (2019)Symmetric Variational Autoencoder and Connections to Adversarial Learning., , , , , and . CoRR, (2017)Understanding and Constructing Latent Modality Structures in Multi-Modal Representation Learning., , , , , , , , and . CVPR, page 7661-7671. IEEE, (2023)A Blockchain-Based Long-Term Time-Stamping Scheme., and . ESORICS (1), volume 13554 of Lecture Notes in Computer Science, page 3-24. Springer, (2022)Adversarial Perturbation with ResNet., , , , and . ACM Great Lakes Symposium on VLSI, page 549-554. ACM, (2020)Interactive Teaching Reform for "Principles of Automatic Control" Course Based on Professional Cases., , , , and . EDUCON, page 1-5. IEEE, (2023)DRoT: A Decentralised Root of Trust for Trusted Networks., , , , , and . ICICS, volume 14252 of Lecture Notes in Computer Science, page 683-701. Springer, (2023)Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme., and . IMACC, volume 3796 of Lecture Notes in Computer Science, page 442-459. Springer, (2005)A trusted process to digitally sign a document., , , and . NSPW, page 79-86. ACM, (2001)General and Efficient Certificateless Public Key Encryption Constructions., , , and . Pairing, volume 4575 of Lecture Notes in Computer Science, page 83-107. Springer, (2007)