Picture for Yevgeniy Vorobeychik

Yevgeniy Vorobeychik

Using Simple Incentives to Improve Two-Sided Fairness in Ridesharing Systems

Add code
Mar 25, 2023
Viaarxiv icon

Certified Robust Control under Adversarial Perturbations

Add code
Feb 04, 2023
Viaarxiv icon

Certifying Safety in Reinforcement Learning under Adversarial Perturbation Attacks

Add code
Dec 28, 2022
Figure 1 for Certifying Safety in Reinforcement Learning under Adversarial Perturbation Attacks
Viaarxiv icon

A Visual Active Search Framework for Geospatial Exploration

Add code
Nov 28, 2022
Figure 1 for A Visual Active Search Framework for Geospatial Exploration
Figure 2 for A Visual Active Search Framework for Geospatial Exploration
Figure 3 for A Visual Active Search Framework for Geospatial Exploration
Figure 4 for A Visual Active Search Framework for Geospatial Exploration
Viaarxiv icon

Reward Delay Attacks on Deep Reinforcement Learning

Add code
Sep 08, 2022
Figure 1 for Reward Delay Attacks on Deep Reinforcement Learning
Figure 2 for Reward Delay Attacks on Deep Reinforcement Learning
Figure 3 for Reward Delay Attacks on Deep Reinforcement Learning
Figure 4 for Reward Delay Attacks on Deep Reinforcement Learning
Viaarxiv icon

Robust Deep Reinforcement Learning through Bootstrapped Opportunistic Curriculum

Add code
Jun 21, 2022
Figure 1 for Robust Deep Reinforcement Learning through Bootstrapped Opportunistic Curriculum
Figure 2 for Robust Deep Reinforcement Learning through Bootstrapped Opportunistic Curriculum
Figure 3 for Robust Deep Reinforcement Learning through Bootstrapped Opportunistic Curriculum
Figure 4 for Robust Deep Reinforcement Learning through Bootstrapped Opportunistic Curriculum
Viaarxiv icon

Proceedings of the Artificial Intelligence for Cyber Security (AICS) Workshop at AAAI 2022

Add code
Mar 01, 2022
Viaarxiv icon

Networked Restless Multi-Armed Bandits for Mobile Interventions

Add code
Jan 28, 2022
Figure 1 for Networked Restless Multi-Armed Bandits for Mobile Interventions
Figure 2 for Networked Restless Multi-Armed Bandits for Mobile Interventions
Figure 3 for Networked Restless Multi-Armed Bandits for Mobile Interventions
Figure 4 for Networked Restless Multi-Armed Bandits for Mobile Interventions
Viaarxiv icon

Unfairness Despite Awareness: Group-Fair Classification with Strategic Agents

Add code
Dec 06, 2021
Figure 1 for Unfairness Despite Awareness: Group-Fair Classification with Strategic Agents
Figure 2 for Unfairness Despite Awareness: Group-Fair Classification with Strategic Agents
Figure 3 for Unfairness Despite Awareness: Group-Fair Classification with Strategic Agents
Figure 4 for Unfairness Despite Awareness: Group-Fair Classification with Strategic Agents
Viaarxiv icon

PROVES: Establishing Image Provenance using Semantic Signatures

Add code
Oct 21, 2021
Figure 1 for PROVES: Establishing Image Provenance using Semantic Signatures
Figure 2 for PROVES: Establishing Image Provenance using Semantic Signatures
Figure 3 for PROVES: Establishing Image Provenance using Semantic Signatures
Figure 4 for PROVES: Establishing Image Provenance using Semantic Signatures
Viaarxiv icon