Picture for Andras Gyorgy

Andras Gyorgy

TBDFiltering: Sample-Efficient Tree-Based Data Filtering

Add code
Jan 29, 2026
Viaarxiv icon

What Can Grokking Teach Us About Learning Under Nonstationarity?

Add code
Jul 26, 2025
Viaarxiv icon

Partition Tree Weighting for Non-Stationary Stochastic Bandits

Add code
Feb 26, 2025
Figure 1 for Partition Tree Weighting for Non-Stationary Stochastic Bandits
Figure 2 for Partition Tree Weighting for Non-Stationary Stochastic Bandits
Figure 3 for Partition Tree Weighting for Non-Stationary Stochastic Bandits
Figure 4 for Partition Tree Weighting for Non-Stationary Stochastic Bandits
Viaarxiv icon

A New Look at Dynamic Regret for Non-Stationary Stochastic Bandits

Add code
Jan 17, 2022
Viaarxiv icon

Learning to Minimize Age of Information over an Unreliable Channel with Energy Harvesting

Add code
Jun 30, 2021
Figure 1 for Learning to Minimize Age of Information over an Unreliable Channel with Energy Harvesting
Figure 2 for Learning to Minimize Age of Information over an Unreliable Channel with Energy Harvesting
Figure 3 for Learning to Minimize Age of Information over an Unreliable Channel with Energy Harvesting
Figure 4 for Learning to Minimize Age of Information over an Unreliable Channel with Energy Harvesting
Viaarxiv icon

On Multi-objective Policy Optimization as a Tool for Reinforcement Learning

Add code
Jun 15, 2021
Figure 1 for On Multi-objective Policy Optimization as a Tool for Reinforcement Learning
Figure 2 for On Multi-objective Policy Optimization as a Tool for Reinforcement Learning
Figure 3 for On Multi-objective Policy Optimization as a Tool for Reinforcement Learning
Figure 4 for On Multi-objective Policy Optimization as a Tool for Reinforcement Learning
Viaarxiv icon

Defending Against Image Corruptions Through Adversarial Augmentations

Add code
Apr 20, 2021
Figure 1 for Defending Against Image Corruptions Through Adversarial Augmentations
Figure 2 for Defending Against Image Corruptions Through Adversarial Augmentations
Figure 3 for Defending Against Image Corruptions Through Adversarial Augmentations
Figure 4 for Defending Against Image Corruptions Through Adversarial Augmentations
Viaarxiv icon

A Reinforcement Learning Approach to Age of Information in Multi-User Networks with HARQ

Add code
Feb 19, 2021
Figure 1 for A Reinforcement Learning Approach to Age of Information in Multi-User Networks with HARQ
Figure 2 for A Reinforcement Learning Approach to Age of Information in Multi-User Networks with HARQ
Figure 3 for A Reinforcement Learning Approach to Age of Information in Multi-User Networks with HARQ
Figure 4 for A Reinforcement Learning Approach to Age of Information in Multi-User Networks with HARQ
Viaarxiv icon

Perceptually Constrained Adversarial Attacks

Add code
Feb 14, 2021
Figure 1 for Perceptually Constrained Adversarial Attacks
Figure 2 for Perceptually Constrained Adversarial Attacks
Figure 3 for Perceptually Constrained Adversarial Attacks
Figure 4 for Perceptually Constrained Adversarial Attacks
Viaarxiv icon

Non-Stationary Bandits with Intermediate Observations

Add code
Jun 03, 2020
Figure 1 for Non-Stationary Bandits with Intermediate Observations
Figure 2 for Non-Stationary Bandits with Intermediate Observations
Figure 3 for Non-Stationary Bandits with Intermediate Observations
Figure 4 for Non-Stationary Bandits with Intermediate Observations
Viaarxiv icon