Alert button
Picture for Lihong Li

Lihong Li

Alert button

Randomized Exploration in Generalized Linear Bandits

Jun 21, 2019
Branislav Kveton, Manzil Zaheer, Csaba Szepesvari, Lihong Li, Mohammad Ghavamzadeh, Craig Boutilier

Figure 1 for Randomized Exploration in Generalized Linear Bandits
Figure 2 for Randomized Exploration in Generalized Linear Bandits
Viaarxiv icon

DualDICE: Behavior-Agnostic Estimation of Discounted Stationary Distribution Corrections

Jun 10, 2019
Ofir Nachum, Yinlam Chow, Bo Dai, Lihong Li

Figure 1 for DualDICE: Behavior-Agnostic Estimation of Discounted Stationary Distribution Corrections
Figure 2 for DualDICE: Behavior-Agnostic Estimation of Discounted Stationary Distribution Corrections
Figure 3 for DualDICE: Behavior-Agnostic Estimation of Discounted Stationary Distribution Corrections
Figure 4 for DualDICE: Behavior-Agnostic Estimation of Discounted Stationary Distribution Corrections
Viaarxiv icon

A Kernel Loss for Solving the Bellman Equation

May 25, 2019
Yihao Feng, Lihong Li, Qiang Liu

Figure 1 for A Kernel Loss for Solving the Bellman Equation
Figure 2 for A Kernel Loss for Solving the Bellman Equation
Figure 3 for A Kernel Loss for Solving the Bellman Equation
Figure 4 for A Kernel Loss for Solving the Bellman Equation
Viaarxiv icon

Neural Logic Machines

Apr 26, 2019
Honghua Dong, Jiayuan Mao, Tian Lin, Chong Wang, Lihong Li, Denny Zhou

Figure 1 for Neural Logic Machines
Figure 2 for Neural Logic Machines
Figure 3 for Neural Logic Machines
Figure 4 for Neural Logic Machines
Viaarxiv icon

Policy Certificates: Towards Accountable Reinforcement Learning

Nov 07, 2018
Christoph Dann, Lihong Li, Wei Wei, Emma Brunskill

Figure 1 for Policy Certificates: Towards Accountable Reinforcement Learning
Figure 2 for Policy Certificates: Towards Accountable Reinforcement Learning
Figure 3 for Policy Certificates: Towards Accountable Reinforcement Learning
Figure 4 for Policy Certificates: Towards Accountable Reinforcement Learning
Viaarxiv icon

Breaking the Curse of Horizon: Infinite-Horizon Off-Policy Estimation

Oct 29, 2018
Qiang Liu, Lihong Li, Ziyang Tang, Dengyong Zhou

Figure 1 for Breaking the Curse of Horizon: Infinite-Horizon Off-Policy Estimation
Figure 2 for Breaking the Curse of Horizon: Infinite-Horizon Off-Policy Estimation
Figure 3 for Breaking the Curse of Horizon: Infinite-Horizon Off-Policy Estimation
Figure 4 for Breaking the Curse of Horizon: Infinite-Horizon Off-Policy Estimation
Viaarxiv icon

Adversarial Attacks on Stochastic Bandits

Oct 29, 2018
Kwang-Sung Jun, Lihong Li, Yuzhe Ma, Xiaojin Zhu

Figure 1 for Adversarial Attacks on Stochastic Bandits
Figure 2 for Adversarial Attacks on Stochastic Bandits
Viaarxiv icon

Subgoal Discovery for Hierarchical Dialogue Policy Learning

Sep 22, 2018
Da Tang, Xiujun Li, Jianfeng Gao, Chong Wang, Lihong Li, Tony Jebara

Figure 1 for Subgoal Discovery for Hierarchical Dialogue Policy Learning
Figure 2 for Subgoal Discovery for Hierarchical Dialogue Policy Learning
Figure 3 for Subgoal Discovery for Hierarchical Dialogue Policy Learning
Figure 4 for Subgoal Discovery for Hierarchical Dialogue Policy Learning
Viaarxiv icon

Neural Approaches to Conversational AI

Sep 21, 2018
Jianfeng Gao, Michel Galley, Lihong Li

Figure 1 for Neural Approaches to Conversational AI
Viaarxiv icon

Data Poisoning Attacks in Contextual Bandits

Aug 24, 2018
Yuzhe Ma, Kwang-Sung Jun, Lihong Li, Xiaojin Zhu

Figure 1 for Data Poisoning Attacks in Contextual Bandits
Figure 2 for Data Poisoning Attacks in Contextual Bandits
Figure 3 for Data Poisoning Attacks in Contextual Bandits
Figure 4 for Data Poisoning Attacks in Contextual Bandits
Viaarxiv icon