Christos Dimitrakakis
Title
Cited by
Cited by
Year
TORCS: The Open Racing Car Simulator, v1.3.5
B Wymann, E Espiť, C Guionneau, C Dimitrakakis, R Coulom, A Sumner
216*2013
Intrusion detection in MANET using classification algorithms: The effects of cost and model selection
A Mitrokotsa, C Dimitrakakis
Ad Hoc Networks 11 (1), 226-237, 2013
1032013
Personalized news recommendation with context trees
F Garcin, C Dimitrakakis, B Faltings
Proceedings of the 7th ACM conference on Recommender systems, 105-112, 2013
802013
Network self-organization explains the statistics and dynamics of synaptic connection strengths in cortex
P Zheng, C Dimitrakakis, J Triesch
PLoS computational biology 9 (1), 2013
772013
Bayesian multitask inverse reinforcement learning
C Dimitrakakis, C Rothkopf
Recent Advances in Reinforcement Learning, 2011
712011
Rollout sampling approximate policy iteration
C Dimitrakakis, MG Lagoudakis
Machine Learning 72 (3), 157-171, 2008
702008
Robust and private Bayesian inference
C Dimitrakakis, B Nelson, A Mitrokotsa, BIP Rubinstein
International Conference on Algorithmic Learning Theory, 291-305, 2014
662014
Preference elicitation and inverse reinforcement learning
C Rothkopf, C Dimitrakakis
Machine Learning and Knowledge Discovery in Databases, 34-48, 2011
572011
DUCT: An Upper Confidence Bound Approach to Distributed Constraint Optimization Problems.
B Ottens, C Dimitrakakis, B Faltings
AAAI, 2012
462012
On the differential privacy of Bayesian inference
Z Zhang, BIP Rubinstein, C Dimitrakakis
Thirtieth AAAI Conference on Artificial Intelligence, 2016
442016
Calibrated fairness in bandits
Y Liu, G Radanovic, C Dimitrakakis, D Mandal, DC Parkes
arXiv preprint arXiv:1707.01875, 2017
322017
Online adaptive policies for ensemble classifiers
C Dimitrakakis, S Bengio
Neurocomputing 64, 211-221, 2005
322005
Boosting HMMs with an application to speech recognition
C Dimitrakakis, S Bengio
Acoustics, Speech, and Signal Processing, 2004. Proceedings.(ICASSP'04†…, 2004
322004
Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels
A Mitrokotsa, C Dimitrakakis, P Peris-Lopez, JC Hernandez-Castro
Communications Letters, IEEE 14 (2), 121-123, 2010
312010
Algorithms for differentially private multi-armed bandits
ACY Tossou, C Dimitrakakis
Thirtieth AAAI Conference on Artificial Intelligence, 2016
272016
Bayesian variable order Markov models
C Dimitrakakis
Proceedings of the 13th International Conference on Artificial Intelligence†…, 2010
252010
Differential privacy for Bayesian inference through posterior sampling
C Dimitrakakis, B Nelson, Z Zhang, A Mitrokotsa, BIP Rubinstein
The Journal of Machine Learning Research 18 (1), 343-381, 2017
24*2017
Complexity of stochastic branch and bound methods for belief tree search in Bayesian reinforcement learning
C Dimitrakakis
Arxiv preprint arXiv:0912.5029, 2009
24*2009
On the leakage of information in biometric authentication
E Pagnin, C Dimitrakakis, A Abidin, A Mitrokotsa
International Conference on Cryptology in India, 265-280, 2014
232014
Expected loss analysis for authentication in constrained channels
C Dimitrakakis, A Mitrokotsa, S Vaudenay
Journal of Computer Security 23 (3), 309-329, 2015
19*2015
The system can't perform the operation now. Try again later.
Articles 1–20