Author of the publication

Can You Learn an Algorithm? Generalizing from Easy to Hard Problems with Recurrent Networks.

, , , , , , and . NeurIPS, page 6695-6706. (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strong Data Augmentation Sanitizes Poisoning and Backdoor Attacks Without an Accuracy Tradeoff., , , , , , , and . CoRR, (2020)Thinking Deeply with Recurrence: Generalizing from Easy to Hard Sequential Reasoning Problems., , , and . CoRR, (2021)A Performance-Driven Benchmark for Feature Selection in Tabular Deep Learning., , , , , , , and . CoRR, (2023)Canary in a Coalmine: Better Membership Inference with Ensembled Adversarial Queries., , , , , , and . CoRR, (2022)What Can We Learn from Unlearnable Datasets?, , , , and . CoRR, (2023)End-to-end Algorithm Synthesis with Recurrent Networks: Logical Extrapolation Without Overthinking., , , , , , and . CoRR, (2022)Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses., , , , , , , , and . IEEE Trans. Pattern Anal. Mach. Intell., 45 (2): 1563-1580 (2023)Adversarial Robustness and Robust Meta-Learning for Neural Networks.. University of Maryland, College Park, MD, USA, (2020)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/26070).Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses., , , , , , , , and . CoRR, (2020)Decepticons: Corrupted Transformers Breach Privacy in Federated Learning for Language Models., , , , , , and . CoRR, (2022)