Show newer

Kalman meets Bellman: Improving Policy Evaluation through Value Tracking. (arXiv:2002.07171v1 [cs.LG]) arxiv.org/abs/2002.07171

How Impersonators Exploit Instagram to Generate Fake Engagement?. (arXiv:2002.07173v1 [cs.SI]) arxiv.org/abs/2002.07173

Ripple Walk Training: A Subgraph-based training framework for Large and Deep Graph Neural Network. (arXiv:2002.07206v1 [cs.LG]) arxiv.org/abs/2002.07206

Robust Stochastic Bandit Algorithms under Probabilistic Unbounded Adversarial Attack. (arXiv:2002.07214v1 [cs.LG]) arxiv.org/abs/2002.07214

Decision-Making with Auto-Encoding Variational Bayes. (arXiv:2002.07217v1 [stat.ML]) arxiv.org/abs/2002.07217

Evolutionary Optimization of Deep Learning Activation Functions. (arXiv:2002.07224v1 [cs.LG]) arxiv.org/abs/2002.07224

On the Discrepancy between Density Estimation and Sequence Generation. (arXiv:2002.07233v1 [cs.LG]) arxiv.org/abs/2002.07233

Regularized Training and Tight Certification for Randomized Smoothed Classifier with Provable Robustness. (arXiv:2002.07246v1 [stat.ML]) arxiv.org/abs/2002.07246

An implicit function learning approach for parametric modal regression. (arXiv:2002.06195v1 [stat.ML]) arxiv.org/abs/2002.06195

Fast Fair Regression via Efficient Approximations of Mutual Information. (arXiv:2002.06200v1 [cs.LG]) arxiv.org/abs/2002.06200

A Bayesian time-to-event pharmacokinetic model for phase I dose-escalation trials with multiple schedules. (arXiv:2002.06204v1 [stat.ME]) arxiv.org/abs/2002.06204

Attentive Item2Vec: Neural Attentive User Representations. (arXiv:2002.06205v1 [cs.IR]) arxiv.org/abs/2002.06205

Resource Management in Wireless Networks via Multi-Agent Deep Reinforcement Learning. (arXiv:2002.06215v1 [cs.LG]) arxiv.org/abs/2002.06215

Electricity Theft Detection with self-attention. (arXiv:2002.06219v1 [cs.LG]) arxiv.org/abs/2002.06219

Top-K Training of GANs: Improving Generators by Making Critics Less Critical. (arXiv:2002.06224v1 [stat.ML]) arxiv.org/abs/2002.06224

Wind speed prediction using a hybrid model of the multi-layer perceptron and whale optimization algorithm. (arXiv:2002.06226v1 [cs.LG]) arxiv.org/abs/2002.06226

On State Variables, Bandit Problems and POMDPs. (arXiv:2002.06238v1 [cs.LG]) arxiv.org/abs/2002.06238

Using Simulation to Analyze Interrupted Time Series Designs. (arXiv:2002.05746v1 [stat.ME]) arxiv.org/abs/2002.05746

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.