TORCS: The Open Racing Car Simulator, v1.3.5 B Wymann, E Espié, C Guionneau, C Dimitrakakis, R Coulom, A Sumner | 543* | 2013 |
Personalized news recommendation with context trees F Garcin, C Dimitrakakis, B Faltings Proceedings of the 7th ACM Conference on Recommender Systems, 105-112, 2013 | 214 | 2013 |
Differential privacy for Bayesian inference through posterior sampling C Dimitrakakis, B Nelson, Z Zhang, A Mitrokotsa, BIP Rubinstein Journal of machine learning research 18 (11), 1-39, 2017 | 177* | 2017 |
Bayesian multitask inverse reinforcement learning C Dimitrakakis, C Rothkopf Recent Advances in Reinforcement Learning, 2011 | 135 | 2011 |
Intrusion detection in MANET using classification algorithms: The effects of cost and model selection A Mitrokotsa, C Dimitrakakis Ad hoc networks 11 (1), 226-237, 2013 | 130 | 2013 |
Calibrated fairness in bandits Y Liu, G Radanovic, C Dimitrakakis, D Mandal, DC Parkes arXiv preprint arXiv:1707.01875, 2017 | 123 | 2017 |
Network self-organization explains the statistics and dynamics of synaptic connection strengths in cortex P Zheng, C Dimitrakakis, J Triesch PLoS computational biology 9 (1), e1002848, 2013 | 118 | 2013 |
Algorithms for differentially private multi-armed bandits A Tossou, C Dimitrakakis Proceedings of the AAAI Conference on Artificial Intelligence 30 (1), 2016 | 117 | 2016 |
DUCT: An Upper Confidence Bound Approach to Distributed Constraint Optimization Problems B Ottens, C Dimitrakakis, B Faltings ACM Transactions on Intelligent Systems and Technology (TIST) 8 (5), 69, 2017 | 109 | 2017 |
DUCT: An Upper Confidence Bound Approach to Distributed Constraint Optimization Problems. B Ottens, C Dimitrakakis, B Faltings AAAI, 2012 | 109* | 2012 |
Preference elicitation and inverse reinforcement learning C Rothkopf, C Dimitrakakis Machine Learning and Knowledge Discovery in Databases, 34-48, 2011 | 108 | 2011 |
On the differential privacy of Bayesian inference Z Zhang, B Rubinstein, C Dimitrakakis Proceedings of the AAAI Conference on Artificial Intelligence 30 (1), 2016 | 105 | 2016 |
Rollout sampling approximate policy iteration C Dimitrakakis, MG Lagoudakis Machine Learning 72 (3), 157-171, 2008 | 81 | 2008 |
Achieving privacy in the adversarial multi-armed bandit A Tossou, C Dimitrakakis Proceedings of the AAAI Conference on Artificial Intelligence 31 (1), 2017 | 58 | 2017 |
Bayesian fairness C Dimitrakakis, Y Liu, DC Parkes, G Radanovic Proceedings of the AAAI Conference on Artificial Intelligence 33 (01), 509-516, 2019 | 49* | 2019 |
Differential privacy for multi-armed bandits: What is it and what is its cost? D Basu, C Dimitrakakis, A Tossou arXiv preprint arXiv:1905.12298, 2019 | 42 | 2019 |
On the leakage of information in biometric authentication E Pagnin, C Dimitrakakis, A Abidin, A Mitrokotsa International Conference on Cryptology in India, 265-280, 2014 | 39 | 2014 |
Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels A Mitrokotsa, C Dimitrakakis, P Peris-Lopez, JC Hernandez-Castro Communications Letters, IEEE 14 (2), 121-123, 2010 | 37 | 2010 |
Bayesian variable order Markov models C Dimitrakakis Proceedings of the 13th International Conference on Artificial Intelligence …, 2010 | 35 | 2010 |
Boosting HMMs with an application to speech recognition C Dimitrakakis, S Bengio Acoustics, Speech, and Signal Processing, 2004. Proceedings.(ICASSP'04 …, 2004 | 35 | 2004 |