Author of the publication

Variational Inference and Model Selection with Generalized Evidence Bounds.

, , , , and . ICML, volume 80 of Proceedings of Machine Learning Research, page 892-901. PMLR, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extended KCI attack against two-party key establishment protocols., and . Inf. Process. Lett., 111 (15): 744-747 (2011)Security of the TCG Privacy-CA Solution., and . EUC, page 609-616. IEEE Computer Society, (2010)Fine-grained information flow control using attributes., , , , , and . Inf. Sci., (2019)Weaknesses in two group Diffie-Hellman key exchange protocols., and . IACR Cryptology ePrint Archive, (2005)Parsing ambiguities in authentication and key establishment protocols., and . IACR Cryptology ePrint Archive, (2008)Delegation of Decryption Rights with Revocability from Learning with Errors., , , , , , and . IACR Cryptology ePrint Archive, (2018)A DAA Scheme Requiring Less TPM Resources.. IACR Cryptology ePrint Archive, (2010)Security of the Enhanced TCG Privacy-CA Solution., , and . TGC, volume 7173 of Lecture Notes in Computer Science, page 121-141. Springer, (2011)A trusted process to digitally sign a document., , , and . NSPW, page 79-86. ACM, (2001)07421 Executive Summary -- Formal Protocol Verification Applied., , and . Formal Protocol Verification Applied, volume 07421 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)