Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Top Arm Identification in Multi-Armed Bandits with Batch Arm Pulls., , , and . AISTATS, volume 51 of JMLR Workshop and Conference Proceedings, page 139-148. JMLR.org, (2016)S2: An Efficient Graph Based Active Learning Algorithm with Application to Nonparametric Classification., , and . COLT, volume 40 of JMLR Workshop and Conference Proceedings, page 503-522. JMLR.org, (2015)The Teaching Dimension of Linear Learners., , and . ICML, volume 48 of JMLR Workshop and Conference Proceedings, page 117-126. JMLR.org, (2016)Statistical Debugging Using Latent Topic Models., , , and . ECML, volume 4701 of Lecture Notes in Computer Science, page 6-17. Springer, (2007)Who Wrote This Code? Identifying the Authors of Program Binaries., , and . ESORICS, volume 6879 of Lecture Notes in Computer Science, page 172-189. Springer, (2011)A Framework for Incorporating General Domain Knowledge into Latent Dirichlet Allocation Using First-Order Logic., , , and . IJCAI, page 1171-1177. IJCAI/AAAI, (2011)Data Poisoning Attacks against Autoregressive Models., , and . AAAI, page 1452-1458. AAAI Press, (2016)The Sample Complexity of Teaching by Reinforcement on Q-Learning., , , , and . AAAI, page 10939-10947. AAAI Press, (2021)Data Poisoning to Fake a Nash Equilibria for Markov Games., , , and . AAAI, page 15979-15987. AAAI Press, (2024)Parameter identification of Hammerstein model for vibration control of piezoelectric blades based on PSO algorithm., , , and . RICAI, page 1042-1046. ACM, (2022)