Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Model evaluation for extreme risks., , , , , , , , , and 11 other author(s). CoRR, (2023)Deep Reinforcement Learning from Human Preferences., , , , , and . NIPS, page 4299-4307. (2017)Lossless Fault-Tolerant Data Structures with Additive Overhead., , and . WADS, volume 6844 of Lecture Notes in Computer Science, page 243-254. Springer, (2011)Reflective Oracles: A Foundation for Game Theory in Artificial Intelligence., , and . LORI, volume 9394 of Lecture Notes in Computer Science, page 411-415. Springer, (2015)Provably manipulation-resistant reputation systems.. COLT, volume 49 of JMLR Workshop and Conference Proceedings, page 670-697. JMLR.org, (2016)Supervising strong learners by amplifying weak experts., , and . CoRR, (2018)Provably Manipulation-Resistant Reputation Systems.. CoRR, (2014)Learning to summarize with human feedback., , , , , , , , and . NeurIPS, (2020)Training language models to follow instructions with human feedback., , , , , , , , , and 10 other author(s). NeurIPS, (2022)A Connection between Generative Adversarial Networks, Inverse Reinforcement Learning, and Energy-Based Models., , , and . CoRR, (2016)