Author of the publication

Provably Secure Steganography (Extended Abstract)

, , and . Advances in Cryptology -- CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, page 77--92. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimating Class Membership Probabilities using Classifier Learners., and . AISTATS, Society for Artificial Intelligence and Statistics, (2005)Efficient programmable learning to search., , and . CoRR, (2014)Normalized Online Learning., , and . CoRR, (2014)Learning Performance of Prediction Markets with Kelly Bettors, , and . CoRR, (2012)Microchoice Bounds and Self Bounding Learning Algorithms., and . COLT, page 209-214. ACM, (1999)Exploration scavenging., , and . ICML, volume 307 of ACM International Conference Proceeding Series, page 528-535. ACM, (2008)A comparison of tight generalization error bounds., and . ICML, volume 119 of ACM International Conference Proceeding Series, page 409-416. ACM, (2005)Warm-starting Contextual Bandits: Robustly Combining Supervised and Bandit Feedback., , , , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 7335-7344. PMLR, (2019)Sensitive Error Correcting Output Codes., and . COLT, volume 3559 of Lecture Notes in Computer Science, page 158-172. Springer, (2005)The Cross Validation Problem.. COLT, volume 3559 of Lecture Notes in Computer Science, page 687-688. Springer, (2005)