Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defending against Whitebox Adversarial Attacks via Randomized Discretization., and . AISTATS, volume 89 of Proceedings of Machine Learning Research, page 684-693. PMLR, (2019)Benchmarking and Improving Generator-Validator Consistency of Language Models., , , , and . CoRR, (2023)A Safe Harbor for AI Evaluation and Red Teaming., , , , , , , , , and 13 other author(s). CoRR, (2024)PRODIGY: Enabling In-context Learning Over Graphs., , , , , , and . CoRR, (2023)Learning Dependency-Based Compositional Semantics.. University of California, Berkeley, USA, (2011)Reinforcement Learning on Web Interfaces using Workflow-Guided Exploration., , , , and . ICLR (Poster), OpenReview.net, (2018)Understanding Black-box Predictions via Influence Functions., and . ICML, volume 70 of Proceedings of Machine Learning Research, page 1885-1894. PMLR, (2017)World of Bits: An Open-Domain Platform for Web-Based Agents., , , , and . ICML, volume 70 of Proceedings of Machine Learning Research, page 3135-3144. PMLR, (2017)Synthesizing Program Input Grammars., , , and . CoRR, (2016)A Tight Analysis of Greedy Yields Subexponential Time Approximation for Uniform Decision Tree., , and . SODA, page 102-121. SIAM, (2020)