Name
Papers
Collaborators
XIAOJIN ZHU
142
263
Citations 
PageRank 
Referers 
3586
222.74
7279
Referees 
References 
2240
1179
Search Limit
1001000
Title
Citations
PageRank
Year
Corruption-Robust Offline Reinforcement Learning00.342022
Discrete-time rate-dependent hysteresis modeling and parameter identification of piezoelectric actuators00.342022
Game Redesign in No-regret Game Playing00.342022
Two-Stream Spatial–Temporal Graph Convolutional Networks for Driver Drowsiness Detection00.342022
RffAe-S: Autoencoder Based on Random Fourier Feature With Separable Loss for Unsupervised Signal Modulation Clustering00.342022
Game Redesign in No-regret Game Playing.00.342022
Sequential Attacks On Kalman Filter-Based Forward Collision Warning Systems00.342021
Policy Gradient Bayesian Robust Optimization For Imitation Learning00.342021
Policy Teaching in Reinforcement Learning via Environment Poisoning Attacks00.342021
Adaptive Reward-Poisoning Attacks against Reinforcement Learning00.342020
Policy Teaching via Environment Poisoning: Training-time Adversarial Attacks against Reinforcement Learning00.342020
Multi-frequency micro-vibration control with hybrid adaptive control algorithm:00.342020
Optimal Attack Against Autoregressive Models By Manipulating The Environment00.342020
Teaching a black-box learner00.342019
Policy Poisoning in Batch Reinforcement Learning and Control00.342019
Data Poisoning against Differentially-Private Learners: Attacks and Defenses.30.442019
Fooling Computer Vision into Inferring the Wrong Body Mass Index.00.342019
Preference-Based Batch and Sequential Teaching: Towards a Unified View of Models00.342019
Training Set Debugging Using Trusted Items.10.352018
An Overview of Machine Teaching.60.412018
Machine Beats Human at Sequencing Visuals for Perceptual-Fluency Practice.00.342018
Learning Root Source with Marked Multivariate Hawkes Processes.00.342018
Are Key-Foreign Key Joins Safe to Avoid when Learning High-Capacity Classifiers?00.342018
Model, Data and Reward Repair: Trusted Machine Learning for Markov Decision Processes10.372018
An Optimal Control View of Adversarial Machine Learning.10.362018
Adversarial Attacks on Stochastic Bandits.20.372018
Program Synthesis from Visual Specification.00.342018
Are key-foreign key joins safe to avoid when learning high-capacity classifiers?00.342017
Explicit Defense Actions Against Test-Set Attacks.40.402017
Stop That Join! Discarding Dimension Tables when Learning High Capacity Classifiers.00.342017
Machine Teaching as Search.00.342016
Active Learning with Oracle Epiphany.00.342016
Data Poisoning Attacks against Autoregressive Models.250.822016
To Join or Not to Join?: Thinking Twice about Joins before Feature Selection210.722016
The Label Complexity of Mixed-Initiative Classifier Training.30.402016
The Teaching Dimension of Linear Learners90.482015
S2: An Efficient Graph Based Active Learning Algorithm with Application to Nonparametric Classification40.422015
Human Memory Search as Initial-Visit Emitting Random Walk00.342015
Optimal Teaching for Limited-Capacity Human Learners.140.872014
Crop Type Classification by Simultaneous Use of Satellite Images of Different Resolutions30.482014
Robust RegBayes: Selectively Incorporating First-Order Logic Domain Knowledge into Bayesian Models.160.652014
School Bullying in Twitter and Weibo: A Comparative Study.10.362014
Inferring air pollution by sniffing social media130.822014
Machine Teaching for Bayesian Learners.00.342013
Persistent homology: an introduction and a new text representation for natural language processing231.222013
An Examination of Regret in Bullying Tweets.90.632013
Machine Teaching for Bayesian Learners in the Exponential Family.211.142013
Socioscope: spatio-temporal signal recovery from social media (extended abstract)00.342013
Learning from Human-Generated Lists.30.412013
Research on peripheral nerve conduction block by high frequency alternating current stimulation00.342012
  • 1
  • 2