Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchical Online Intrusion Detection for SCADA Networks., , , , and . CoRR, (2016)Combining satellite imagery and machine learning to predict poverty, , , , , and . Science, 353 (6301): 790--794 (2016)Amino - A Distributed Runtime for Applications Running Dynamically Across Device, Edge and Cloud., , , , , and . SEC, page 361-366. IEEE, (2018)Wilds: A benchmark of in-the-wild distribution shifts, , , , , , , , , and 1 other author(s). International Conference on Machine Learning, page 5637--5664. PMLR, (2021)An Explanation of In-context Learning as Implicit Bayesian Inference., , , and . CoRR, (2021)Data Selection for Language Models via Importance Resampling., , , and . CoRR, (2023)Semi-supervised Deep Kernel Learning: Regression with Unlabeled Data by Minimizing Predictive Variance., , and . NeurIPS, page 5327-5338. (2018)Same Pre-training Loss, Better Downstream: Implicit Bias Matters for Language Models., , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 22188-22214. PMLR, (2023)Understanding and Mitigating the Tradeoff between Robustness and Accuracy., , , , and . ICML, volume 119 of Proceedings of Machine Learning Research, page 7909-7919. PMLR, (2020)Prompt Optimization via Adversarial In-Context Learning., , , , , , , , and . CoRR, (2023)