Picture for Guanlin Liu

Guanlin Liu

Flaming-hot Initiation with Regular Execution Sampling for Large Language Models

Add code
Oct 28, 2024
Figure 1 for Flaming-hot Initiation with Regular Execution Sampling for Large Language Models
Figure 2 for Flaming-hot Initiation with Regular Execution Sampling for Large Language Models
Figure 3 for Flaming-hot Initiation with Regular Execution Sampling for Large Language Models
Figure 4 for Flaming-hot Initiation with Regular Execution Sampling for Large Language Models
Viaarxiv icon

Process Supervision-Guided Policy Optimization for Code Generation

Add code
Oct 23, 2024
Viaarxiv icon

Enhancing Multi-Step Reasoning Abilities of Language Models through Direct Q-Function Optimization

Add code
Oct 11, 2024
Viaarxiv icon

Optimal Cost Constrained Adversarial Attacks For Multiple Agent Systems

Add code
Nov 01, 2023
Viaarxiv icon

Efficient Action Robust Reinforcement Learning with Probabilistic Policy Execution Uncertainty

Add code
Jul 20, 2023
Viaarxiv icon

Efficient Adversarial Attacks on Online Multi-agent Reinforcement Learning

Add code
Jul 15, 2023
Viaarxiv icon

Efficient Action Poisoning Attacks on Linear Contextual Bandits

Add code
Dec 10, 2021
Figure 1 for Efficient Action Poisoning Attacks on Linear Contextual Bandits
Figure 2 for Efficient Action Poisoning Attacks on Linear Contextual Bandits
Figure 3 for Efficient Action Poisoning Attacks on Linear Contextual Bandits
Viaarxiv icon

Provably Efficient Black-Box Action Poisoning Attacks Against Reinforcement Learning

Add code
Oct 26, 2021
Figure 1 for Provably Efficient Black-Box Action Poisoning Attacks Against Reinforcement Learning
Viaarxiv icon

Action-Manipulation Attacks Against Stochastic Bandits: Attacks and Defense

Add code
Feb 21, 2020
Figure 1 for Action-Manipulation Attacks Against Stochastic Bandits: Attacks and Defense
Figure 2 for Action-Manipulation Attacks Against Stochastic Bandits: Attacks and Defense
Figure 3 for Action-Manipulation Attacks Against Stochastic Bandits: Attacks and Defense
Figure 4 for Action-Manipulation Attacks Against Stochastic Bandits: Attacks and Defense
Viaarxiv icon