Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Waves in isotropic Totalistic Cellular Automata: Application to Real-Time robot Navigation., , , , and . Adv. Complex Syst., 19 (4-5): 1650012:1-1650012:18 (2016)Personalizing Text-to-Image Generation via Aesthetic Gradients.. CoRR, (2022)Configurable Safety Tuning of Language Models with Synthetic Preference Data.. CoRR, (2024)Distilled Self-Critique of LLMs with Synthetic Data: a Bayesian Perspective.. Tiny Papers @ ICLR, OpenReview.net, (2024)Merging Improves Self-Critique Against Jailbreak Attacks.. CoRR, (2024)Adversarial Machine Learning: Perspectives from Adversarial Risk Analysis., , , and . CoRR, (2020)Protecting Classifiers From Attacks. A Bayesian Approach., , , , and . CoRR, (2020)Reinforcement Learning under Threats., , and . AAAI, page 9939-9940. AAAI Press, (2019)How do tuna schools associate to dFADs? A study using echo-sounder buoys to identify global patterns., , , , , , and . CoRR, (2022)Detecting Model Changes in Organisational Processes: A Cloud-Based Approach., , , , , , , and . ESOCC, volume 14183 of Lecture Notes in Computer Science, page 231-236. Springer, (2023)