Author of the publication

Algorithm-Dependent Generalization Bounds for Overparameterized Deep Residual Networks.

, , and . NeurIPS, page 14769-14779. (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Moving Object Contour Detection Based on S-T Characteristics in Surveillance., , and . HCI (8), volume 4557 of Lecture Notes in Computer Science, page 575-583. Springer, (2007)Knowledge Migration Based Multi-population Cultural Algorithm., , , and . ICNC (4), page 331-335. IEEE Computer Society, (2009)Data Reliability Analysis for Flooding Transmission of Wireless Sensor Networks., and . ICICA (1), volume 307 of Communications in Computer and Information Science, page 476-483. Springer, (2012)An improved evolutionary multi-objective optimization method., , and . BIC-TA, page 464-468. IEEE, (2010)A Shot Boundary Detection Method Based on Color Space., , , and . ICEE, page 1647-1650. IEEE Computer Society, (2010)Satellite-Relayed Intercontinental Quantum Network, , , , , , , , , and 26 other author(s). Phys. Rev. Lett., (January 2018)Cluster-based distributed active current timer for hardware Trojan detection., , and . ISCAS, page 1010-1013. IEEE, (2013)ACRO-PUF: A Low-power, Reliable and Aging-Resilient Current Starved Inverter-Based Ring Oscillator Physical Unclonable Function., , and . IEEE Trans. Circuits Syst. I Regul. Pap., 64-I (12): 3138-3149 (2017)Complete classification for simple root cyclic codes over the local ring $Z_4v/v^2+2v$., and . Cryptogr. Commun., 12 (2): 301-319 (2020)Software defined optical networks secured by quantum key distribution (QKD)., , , and . ICCC, page 1-4. IEEE, (2017)