Data poisoning against differentially-private learners: Attacks and defenses Y Ma, X Zhu, J Hsu International Joint Conference on Artificial Intelligence (IJCAI), 2019 | 149 | 2019 |
Adversarial Attacks on Stochastic Bandits KS Jun, L Li, Y Ma, J Zhu Advances in Neural Information Processing Systems (NeurIPS), 2018 | 135 | 2018 |
Adaptive reward-poisoning attacks against reinforcement learning X Zhang, Y Ma, A Singla, X Zhu International Conference on Machine Learning (ICML), 2020 | 129 | 2020 |
Policy Poisoning in Batch Reinforcement Learning and Control Y Ma, X Zhang, W Sun, X Zhu Advances in Neural Information Processing Systems (NeurIPS), 2019 | 113 | 2019 |
Data poisoning attacks in contextual bandits Y Ma, KS Jun, L Li, X Zhu International Conference on Decision and Game Theory for Security (GameSec …, 2018 | 82 | 2018 |
Task-agnostic Exploration in Reinforcement Learning X Zhang, Y Ma, A Singla Advances in Neural Information Processing Systems (NeurIPS), 2020 | 48 | 2020 |
Sequential Attacks on Kalman Filter-based Forward Collision Warning Systems Y Ma, J Sharp, R Wang, E Fernandes, X Zhu AAAI Conference on Artificial Intelligence (AAAI), 2021 | 15 | 2021 |
Teacher Improves Learning by Selecting a Training Subset Y Ma, R Nowak, P Rigollet, X Zhang, X Zhu International Conference on Artificial Intelligence and Statistics (AISTATS), 2018 | 14 | 2018 |
The sample complexity of teaching by reinforcement on Q-learning X Zhang, S Bharti, Y Ma, A Singla, X Zhu AAAI Conference on Artificial Intelligence (AAAI) 35 (12), 10939-10947, 2021 | 11 | 2021 |
Game Redesign in No-regret Game Playing Y Ma, Y Wu, X Zhu International Joint Conference on Artificial Intelligence (IJCAI), 2022 | 8 | 2022 |
Adversarial Attacks on Adversarial Bandits Y Ma, Z Zhou International Conference on Learning Representation (ICLR) (𝗦𝗽𝗼𝘁𝗹𝗶𝗴𝗵𝘁), 2023 | 7 | 2023 |
Using Machine Teaching to Investigate Human Assumptions when Teaching Reinforcement Learners YS Chuang, X Zhang, Y Ma, MK Ho, JL Austerweil, X Zhu Annual Meeting of the Cognitive Science Society (CogSci), 2021 | 6 | 2021 |
Training Set Camouflage A Sen, S Alfeld, X Zhang, A Vartanian, Y Ma, X Zhu International Conference on Decision and Game Theory for Security (GameSec), 2018 | 6 | 2018 |
Systems and methods for preventing decentralized malware attacks Y Han, Y Ma, K Roundy, C Gates, Y Shen US Patent 11,025,666, 2021 | 3 | 2021 |
Adversarial Attacks in Sequential Decision Making and Control Y Ma The University of Wisconsin-Madison, 2021 | 3 | 2021 |
Neighbourhood-preserving Dimension Reduction via Localised Multidimensional Scaling Y Ma, K He, J Hopcroft, P Shi Theoretical Computer Science (TCS), 2017 | 3 | 2017 |
BadRL: Sparse Targeted Backdoor Attack Against Reinforcement Learning J Cui, Y Han, Y Ma, J Jiao, J Zhang AAAI Conference on Artificial Intelligence (AAAI), 2024 | 2 | 2024 |
Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization Y Han, Y Ma, C Gates, K Roundy, Y Shen International Joint Conference on Neural Networks (IJCNN), 2019 | | 2019 |
Nonlinear Dimension Reduction by Local Multidimensional Scaling Y Ma, K He, J Hopcroft, P Shi International Workshop on Frontiers in Algorithmics (FAW), 2016 | | 2016 |