Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Truth or backpropaganda? An empirical investigation of deep learning theory., , , , and . ICLR, OpenReview.net, (2020)Can You Learn an Algorithm? Generalizing from Easy to Hard Problems with Recurrent Networks., , , , , , and . NeurIPS, page 6695-6706. (2021)The Uncanny Similarity of Recurrence and Depth., , , , and . ICLR, OpenReview.net, (2022)Transformers Can Do Arithmetic with the Right Embeddings., , , , , , , , , and 1 other author(s). CoRR, (2024)Rethinking LLM Memorization through the Lens of Adversarial Compression., , , , and . CoRR, (2024)Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses., , , , , , , , and . CoRR, (2020)Universal Guidance for Diffusion Models., , , , , , and . CVPR Workshops, page 843-852. IEEE, (2023)Headless Horseman: Adversarial Attacks on Transfer Learning Models., , , , , , , and . ICASSP, page 3087-3091. IEEE, (2020)Benchmarking ChatGPT on Algorithmic Reasoning., , and . CoRR, (2024)Adversarial attacks on machine learning systems for high-frequency trading., , , and . ICAIF, page 2:1-2:9. ACM, (2021)