Alert button
Picture for Ziwei Guan

Ziwei Guan

Alert button

A Constrained Optimization Approach to Bilevel Optimization with Multiple Inner Minima

Mar 01, 2022
Daouda Sow, Kaiyi Ji, Ziwei Guan, Yingbin Liang

Figure 1 for A Constrained Optimization Approach to Bilevel Optimization with Multiple Inner Minima
Figure 2 for A Constrained Optimization Approach to Bilevel Optimization with Multiple Inner Minima
Figure 3 for A Constrained Optimization Approach to Bilevel Optimization with Multiple Inner Minima
Viaarxiv icon

Faster Algorithm and Sharper Analysis for Constrained Markov Decision Process

Oct 20, 2021
Tianjiao Li, Ziwei Guan, Shaofeng Zou, Tengyu Xu, Yingbin Liang, Guanghui Lan

Figure 1 for Faster Algorithm and Sharper Analysis for Constrained Markov Decision Process
Viaarxiv icon

PER-ETD: A Polynomially Efficient Emphatic Temporal Difference Learning Method

Oct 13, 2021
Ziwei Guan, Tengyu Xu, Yingbin Liang

Figure 1 for PER-ETD: A Polynomially Efficient Emphatic Temporal Difference Learning Method
Figure 2 for PER-ETD: A Polynomially Efficient Emphatic Temporal Difference Learning Method
Figure 3 for PER-ETD: A Polynomially Efficient Emphatic Temporal Difference Learning Method
Figure 4 for PER-ETD: A Polynomially Efficient Emphatic Temporal Difference Learning Method
Viaarxiv icon

When Will Generative Adversarial Imitation Learning Algorithms Attain Global Convergence

Jun 25, 2020
Ziwei Guan, Tengyu Xu, Yingbin Liang

Figure 1 for When Will Generative Adversarial Imitation Learning Algorithms Attain Global Convergence
Viaarxiv icon

Robust Stochastic Bandit Algorithms under Probabilistic Unbounded Adversarial Attack

Feb 17, 2020
Ziwei Guan, Kaiyi Ji, Donald J Bucci Jr, Timothy Y Hu, Joseph Palombo, Michael Liston, Yingbin Liang

Figure 1 for Robust Stochastic Bandit Algorithms under Probabilistic Unbounded Adversarial Attack
Figure 2 for Robust Stochastic Bandit Algorithms under Probabilistic Unbounded Adversarial Attack
Figure 3 for Robust Stochastic Bandit Algorithms under Probabilistic Unbounded Adversarial Attack
Figure 4 for Robust Stochastic Bandit Algorithms under Probabilistic Unbounded Adversarial Attack
Viaarxiv icon