In this paper, we study representation learning in partially observable
...
We propose a provable defense mechanism against backdoor policies in
rei...
We study multi-agent general-sum Markov games with nonlinear function
ap...
Online influence maximization aims to maximize the influence spread of a...
Bilevel optimization have gained growing interests, with numerous
applic...
Directed Evolution (DE), a landmark wet-lab method originated in 1960s,
...
We consider a distributed reinforcement learning setting where multiple
...
We study the problem of representational transfer in RL, where an agent ...
Off-Policy Evaluation (OPE) serves as one of the cornerstones in
Reinfor...
Policy gradient (PG) estimation becomes a challenge when we are not allo...
We present BRIEE (Block-structured Representation learning with Interlea...
This work studies the question of Representation Learning in RL: how can...
We study the adversarial robustness in offline reinforcement learning. G...
In E-commerce, a key challenge in text generation is to find a good trad...
We study black-box reward poisoning attacks against reinforcement learni...
We study the problem of robust reinforcement learning under adversarial
...
Successful teaching requires an assumption of how the learner learns - h...
Efficient exploration is one of the main challenges in reinforcement lea...
In this paper, we initiate the study of sample complexity of teaching, t...
Deep neural networks (DNNs) are powerful black-box predictors that have
...
In reward-poisoning attacks against reinforcement learning (RL), an atta...
We study a security threat to batch reinforcement learning and control w...
We study data poisoning attacks in the online learning setting where the...
We introduce a form of steganography in the domain of machine learning w...
Generalized additive models (GAMs) are favored in many regression and bi...
Given a sequential learning algorithm and a target model, sequential mac...
We call a learner super-teachable if a teacher can trim down an iid trai...
Training set bugs are flaws in the data that adversely affect machine
le...