Skip to main content Skip to main navigation

Publications

Displaying results 1861 to 1870 of 14394.
  1. Hamish Flynn; David Reeb; Melih Kandemir; Jan Peters

    PAC-Bayes Bounds for Bandit Problems: A Survey and Experimental Comparison

    In: IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), Vol. 45, No. 12, Pages 15308-15327, arXiv, 2023.

  2. Agnes Gruenerbl; Jan Spilski; Giulia Barbareschi; Kai Kunze; Passant ElAgroudy; Thomas Lachmann; Paul Lukowicz

    2nd International Workshop on Mobile Cognitive-Augmenting and Cognition-Altering Technologies (CAT) in Human-Centered AI

    In: Yomna Abdelrahman; Passant Elagroudy; Florian Alt (Hrsg.). Adjunct Proceedings of the 27th International Conference on Mobile Human-Computer Interaction. ACM International Conference on Mobile Human-Computer Interaction (MobileHCI-2025), September 21-25, Sharm El'Shei, Egypt, ACM, 2025.

  3. Manuel Brack; Felix Friedrich; Katharina Kornmeier; Linoy Tsaban; Patrick Schramowski; Kristian Kersting; Apolinário Passos

    LEDITS++: Limitless Image Editing using Text-to-Image Models

    In: Computing Research Repository eprint Journal (CoRR), Vol. abs/2311.16711, Pages 1-21, arXiv, 2023.

  4. Yannik Keller; Jannis Blüml; Gopika Sudhakaran; Kristian Kersting

    From Images to Connections: Can DQN with GNNs learn the Strategic Game of Hex?

    In: Computing Research Repository eprint Journal (CoRR), Vol. abs/2311.13414, Pages 1-16, arXiv, 2023.

  5. Björn Deiseroth; Max Meuer; Nikolas Gritsch; Constantin Eichenberg; Patrick Schramowski; Matthias Aßenmacher; Kristian Kersting

    Divergent Token Metrics: Measuring degradation to prune away LLM components - and optimize quantization

    In: Computing Research Repository eprint Journal (CoRR), Vol. abs/2311.01544, Pages 1-20, arXiv, 2023.

  6. Moritz Willig; Matej Zecevic; Devendra Singh Dhami; Kristian Kersting

    Do Not Marginalize Mechanisms, Rather Consolidate!

    In: Computing Research Repository eprint Journal (CoRR), Vol. abs/2310.08377, Pages 1-19, arXiv, 2023.

  7. Defending Our Privacy With Backdoors

    In: Computing Research Repository eprint Journal (CoRR), Vol. abs/2310.08320, Pages 1-19, arXiv, 2023.

  8. Be Careful What You Smooth For: Label Smoothing Can Be a Privacy Shield but Also a Catalyst for Model Inversion Attacks

    In: Computing Research Repository eprint Journal (CoRR), Vol. abs/2310.06549, Pages 1-31, arXiv, 2023.

  9. Lukas Struppek; Martin B. Hentschel; Clifton Poth; Dominik Hintersdorf; Kristian Kersting

    Leveraging Diffusion-Based Image Variations for Robust Training on Poisoned Data

    In: Computing Research Repository eprint Journal (CoRR), Vol. abs/2310.06372, Pages 1-12, arXiv, 2023.

  10. Distilling Adversarial Prompts from Safety Benchmarks: Report for the Adversarial Nibbler Challenge

    In: Computing Research Repository eprint Journal (CoRR), Vol. abs/2309.11575, Pages 2-5, arXiv, 2023.