Alert button
Picture for Thomas C. M. Lee

Thomas C. M. Lee

Alert button

Efficient Frameworks for Generalized Low-Rank Matrix Bandit Problems

Add code
Bookmark button
Alert button
Jan 14, 2024
Yue Kang, Cho-Jui Hsieh, Thomas C. M. Lee

Viaarxiv icon

Robust Lipschitz Bandits to Adversarial Corruptions

Add code
Bookmark button
Alert button
May 29, 2023
Yue Kang, Cho-Jui Hsieh, Thomas C. M. Lee

Figure 1 for Robust Lipschitz Bandits to Adversarial Corruptions
Figure 2 for Robust Lipschitz Bandits to Adversarial Corruptions
Figure 3 for Robust Lipschitz Bandits to Adversarial Corruptions
Figure 4 for Robust Lipschitz Bandits to Adversarial Corruptions
Viaarxiv icon

Online Continuous Hyperparameter Optimization for Contextual Bandits

Add code
Bookmark button
Alert button
Feb 18, 2023
Yue Kang, Cho-Jui Hsieh, Thomas C. M. Lee

Figure 1 for Online Continuous Hyperparameter Optimization for Contextual Bandits
Figure 2 for Online Continuous Hyperparameter Optimization for Contextual Bandits
Figure 3 for Online Continuous Hyperparameter Optimization for Contextual Bandits
Figure 4 for Online Continuous Hyperparameter Optimization for Contextual Bandits
Viaarxiv icon

Extending the Use of MDL for High-Dimensional Problems: Variable Selection, Robust Fitting, and Additive Modeling

Add code
Bookmark button
Alert button
Jan 26, 2022
Zhenyu Wei, Raymond K. W. Wong, Thomas C. M. Lee

Figure 1 for Extending the Use of MDL for High-Dimensional Problems: Variable Selection, Robust Fitting, and Additive Modeling
Figure 2 for Extending the Use of MDL for High-Dimensional Problems: Variable Selection, Robust Fitting, and Additive Modeling
Figure 3 for Extending the Use of MDL for High-Dimensional Problems: Variable Selection, Robust Fitting, and Additive Modeling
Figure 4 for Extending the Use of MDL for High-Dimensional Problems: Variable Selection, Robust Fitting, and Additive Modeling
Viaarxiv icon

A Review of Adversarial Attack and Defense for Classification Methods

Add code
Bookmark button
Alert button
Nov 18, 2021
Yao Li, Minhao Cheng, Cho-Jui Hsieh, Thomas C. M. Lee

Figure 1 for A Review of Adversarial Attack and Defense for Classification Methods
Figure 2 for A Review of Adversarial Attack and Defense for Classification Methods
Figure 3 for A Review of Adversarial Attack and Defense for Classification Methods
Figure 4 for A Review of Adversarial Attack and Defense for Classification Methods
Viaarxiv icon

Detecting Adversarial Examples with Bayesian Neural Network

Add code
Bookmark button
Alert button
May 28, 2021
Yao Li, Tongyi Tang, Cho-Jui Hsieh, Thomas C. M. Lee

Figure 1 for Detecting Adversarial Examples with Bayesian Neural Network
Figure 2 for Detecting Adversarial Examples with Bayesian Neural Network
Figure 3 for Detecting Adversarial Examples with Bayesian Neural Network
Figure 4 for Detecting Adversarial Examples with Bayesian Neural Network
Viaarxiv icon

Uncertainty Quantification in Ensembles of Honest Regression Trees using Generalized Fiducial Inference

Add code
Bookmark button
Alert button
Nov 14, 2019
Suofei Wu, Jan Hannig, Thomas C. M. Lee

Figure 1 for Uncertainty Quantification in Ensembles of Honest Regression Trees using Generalized Fiducial Inference
Figure 2 for Uncertainty Quantification in Ensembles of Honest Regression Trees using Generalized Fiducial Inference
Figure 3 for Uncertainty Quantification in Ensembles of Honest Regression Trees using Generalized Fiducial Inference
Figure 4 for Uncertainty Quantification in Ensembles of Honest Regression Trees using Generalized Fiducial Inference
Viaarxiv icon

Measuring the Algorithmic Convergence of Randomized Ensembles: The Regression Setting

Add code
Bookmark button
Alert button
Aug 04, 2019
Miles E. Lopes, Suofei Wu, Thomas C. M. Lee

Figure 1 for Measuring the Algorithmic Convergence of Randomized Ensembles: The Regression Setting
Figure 2 for Measuring the Algorithmic Convergence of Randomized Ensembles: The Regression Setting
Figure 3 for Measuring the Algorithmic Convergence of Randomized Ensembles: The Regression Setting
Figure 4 for Measuring the Algorithmic Convergence of Randomized Ensembles: The Regression Setting
Viaarxiv icon

Optimal Transport Classifier: Defending Against Adversarial Attacks by Regularized Deep Embedding

Add code
Bookmark button
Alert button
Dec 09, 2018
Yao Li, Martin Renqiang Min, Wenchao Yu, Cho-Jui Hsieh, Thomas C. M. Lee, Erik Kruus

Figure 1 for Optimal Transport Classifier: Defending Against Adversarial Attacks by Regularized Deep Embedding
Figure 2 for Optimal Transport Classifier: Defending Against Adversarial Attacks by Regularized Deep Embedding
Figure 3 for Optimal Transport Classifier: Defending Against Adversarial Attacks by Regularized Deep Embedding
Figure 4 for Optimal Transport Classifier: Defending Against Adversarial Attacks by Regularized Deep Embedding
Viaarxiv icon