With the feature size continuously shrinking in advanced technology node...
Lithography is fundamental to integrated circuit fabrication, necessitat...
We study a security threat to adversarial multi-armed bandits, in which ...
Graph coloring, a classical and critical NP-hard problem, is the problem...
We study the game redesign problem in which an external designer has the...
Kalman Filter (KF) is widely used in various domains to perform sequenti...
Successful teaching requires an assumption of how the learner learns - h...
Continuous scaling of the VLSI system leaves a great challenge on
manufa...
Efficient exploration is one of the main challenges in reinforcement lea...
In this paper, we initiate the study of sample complexity of teaching, t...
In reward-poisoning attacks against reinforcement learning (RL), an atta...
VLSI mask optimization is one of the most critical stages in
manufactura...
The design complexity is increasing as the technology node keeps scaling...
We study a security threat to batch reinforcement learning and control w...
There is substantial interest in the use of machine learning (ML) based
...
In this work, we define a collaborative and privacy-preserving machine
t...
Data poisoning attacks aim to manipulate the model produced by a learnin...
We introduce a form of steganography in the domain of machine learning w...
We study adversarial attacks that manipulate the reward signals to contr...
Multiple patterning lithography has been widely adopted in advanced
tech...
We study offline data poisoning attacks in contextual bandits, a class o...
Deep neural networks (DNNs) have achieved significant success in a varie...
Deep neural networks (DNNs) have achieved significant success in a varie...
In recent years, convolutional neural networks (CNNs) have shown great
p...
In spite of maturity to the modern electronic design automation (EDA) to...
We call a learner super-teachable if a teacher can trim down an iid trai...