Picture for Cassidy Laidlaw

Cassidy Laidlaw

Preventing Reward Hacking with Occupancy Measure Regularization

Add code
Mar 05, 2024
Viaarxiv icon

Toward Computationally Efficient Inverse Reinforcement Learning via Reward Shaping

Add code
Dec 18, 2023
Viaarxiv icon

Distributional Preference Learning: Understanding and Accounting for Hidden Context in RLHF

Add code
Dec 13, 2023
Viaarxiv icon

The Effective Horizon Explains Deep RL Performance in Stochastic Environments

Add code
Dec 13, 2023
Figure 1 for The Effective Horizon Explains Deep RL Performance in Stochastic Environments
Figure 2 for The Effective Horizon Explains Deep RL Performance in Stochastic Environments
Figure 3 for The Effective Horizon Explains Deep RL Performance in Stochastic Environments
Figure 4 for The Effective Horizon Explains Deep RL Performance in Stochastic Environments
Viaarxiv icon

Bridging RL Theory and Practice with the Effective Horizon

Add code
Apr 19, 2023
Viaarxiv icon

The Boltzmann Policy Distribution: Accounting for Systematic Suboptimality in Human Models

Add code
Apr 22, 2022
Figure 1 for The Boltzmann Policy Distribution: Accounting for Systematic Suboptimality in Human Models
Figure 2 for The Boltzmann Policy Distribution: Accounting for Systematic Suboptimality in Human Models
Figure 3 for The Boltzmann Policy Distribution: Accounting for Systematic Suboptimality in Human Models
Figure 4 for The Boltzmann Policy Distribution: Accounting for Systematic Suboptimality in Human Models
Viaarxiv icon

Learning the Preferences of Uncertain Humans with Inverse Decision Theory

Add code
Jun 19, 2021
Figure 1 for Learning the Preferences of Uncertain Humans with Inverse Decision Theory
Figure 2 for Learning the Preferences of Uncertain Humans with Inverse Decision Theory
Figure 3 for Learning the Preferences of Uncertain Humans with Inverse Decision Theory
Figure 4 for Learning the Preferences of Uncertain Humans with Inverse Decision Theory
Viaarxiv icon

Perceptual Adversarial Robustness: Defense Against Unseen Threat Models

Add code
Jun 22, 2020
Figure 1 for Perceptual Adversarial Robustness: Defense Against Unseen Threat Models
Figure 2 for Perceptual Adversarial Robustness: Defense Against Unseen Threat Models
Figure 3 for Perceptual Adversarial Robustness: Defense Against Unseen Threat Models
Figure 4 for Perceptual Adversarial Robustness: Defense Against Unseen Threat Models
Viaarxiv icon

Playing it Safe: Adversarial Robustness with an Abstain Option

Add code
Nov 25, 2019
Figure 1 for Playing it Safe: Adversarial Robustness with an Abstain Option
Figure 2 for Playing it Safe: Adversarial Robustness with an Abstain Option
Figure 3 for Playing it Safe: Adversarial Robustness with an Abstain Option
Figure 4 for Playing it Safe: Adversarial Robustness with an Abstain Option
Viaarxiv icon

Functional Adversarial Attacks

Add code
May 29, 2019
Figure 1 for Functional Adversarial Attacks
Figure 2 for Functional Adversarial Attacks
Figure 3 for Functional Adversarial Attacks
Figure 4 for Functional Adversarial Attacks
Viaarxiv icon