Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Complexity of Reconnaissance Blind Chess., , and . CoRR, (2018)Adaptive Stress Testing: Finding Likely Failure Events with Reinforcement Learning., , , , , , , and . J. Artif. Intell. Res., (2020)On the Difficulty of Validating Voting Machine Software with Software., , and . EVT, USENIX Association, (2007)A Security Analysis of the Internet Chess Club., , and . IEEE Secur. Priv., 4 (1): 46-52 (2006)Continuous Mean-Zero Disagreement-Regularized Imitation Learning (CMZ-DRIL)., , , and . CoRR, (2024)Detecting code alteration by creating a temporary memory bottleneck., , and . IEEE Trans. Inf. Forensics Secur., 4 (4): 638-650 (2009)The Machine Reconnaissance Blind Chess Tournament of NeurIPS 2022., , , , , , , , , and 2 other author(s). NeurIPS (Competition and Demos), volume 220 of Proceedings of Machine Learning Research, page 119-132. PMLR, (2021)Designing for Audit: A Voting Machine with a Tiny TCB., , and . Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 312-319. Springer, (2010)Coercion Resistant End-to-end Voting., , and . Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, page 344-361. Springer, (2009)A Risk-Sensitive Approach to Policy Optimization., , , , and . CoRR, (2022)