Yuzhe Ma

Follow

Generating author description...

All published works
Action Title Year Authors
+ PDF Chat RL-MUL 2.0: Multiplier Design Optimization with Parallel Deep Reinforcement Learning and Space Reduction 2025 Dongsheng Zuo
Jiadong Zhu
Yikang Ouyang
Yuzhe Ma
+ PDF Chat UFO-MAC: A Unified Framework for Optimization of High-Performance Multipliers and Multiply-Accumulators 2024 Dongsheng Zuo
Jiadong Zhu
Chenglin Li
Yuzhe Ma
+ PDF Chat CAMO: Correlation-Aware Mask Optimization with Modulated Reinforcement Learning 2024 Xiaoxiao Liang
Haoyu Yang
Kang Liu
Bei Yu
Yuzhe Ma
+ PDF Chat RL-MUL: Multiplier Design Optimization with Deep Reinforcement Learning 2024 Dongsheng Zuo
Jiadong Zhu
Yikang Ouyang
Yuzhe Ma
+ PDF Chat BadRL: Sparse Targeted Backdoor Attack against Reinforcement Learning 2024 Jing Cui
Yufei Han
Yuzhe Ma
Jianbin Jiao
Junge Zhang
+ PDF Chat Physics-Informed Optical Kernel Regression Using Complex-valued Neural Fields 2023 Guojin Chen
Zehua Pei
Haoyu Yang
Yuzhe Ma
Bei Yu
Martin C. S. Wong
+ PDF Chat RL-MUL: Multiplier Design Optimization with Deep Reinforcement Learning 2023 Dongsheng Zuo
Yikang Ouyang
Yuzhe Ma
+ PDF Chat DevelSet: Deep Neural Level Set for Instant Mask Optimization 2023 Guojin Chen
Ziyang Yu
Hongduo Liu
Yuzhe Ma
Bei Yu
+ Adversarial Attacks on Adversarial Bandits 2023 Yuzhe Ma
Zhijin Zhou
+ Physics-Informed Optical Kernel Regression Using Complex-valued Neural Fields 2023 Guojin Chen
Zehua Pei
Haoyu Yang
Yuzhe Ma
Bei Yu
Martin D. F. Wong
+ DevelSet: Deep Neural Level Set for Instant Mask Optimization 2023 Guojin Chen
Ziyang Yu
Hongduo Liu
Yuzhe Ma
Bei Yu
+ AdaOPC: A Self-Adaptive Mask Optimization Framework For Real Design Patterns 2023 Wenqian Zhao
Xufeng Yao
Ziyang Yu
Guojin Chen
Yuzhe Ma
Bei Yu
Martin D. F. Wong
+ BadRL: Sparse Targeted Backdoor Attack Against Reinforcement Learning 2023 Jing Cui
Yufei Han
Yuzhe Ma
Jianbin Jiao
Junge Zhang
+ PDF Chat Game Redesign in No-regret Game Playing 2022 Yuzhe Ma
Young Wu
Xiaojin Zhu
+ Rethinking Graph Neural Networks for the Graph Coloring Problem 2022 Wei Li
Ruxuan Li
Yuzhe Ma
Siu On Chan
David Z. Pan
Bei Yu
+ Possible origin of extremely large magnetoresistance in the topological insulator CaBi2 single crystal 2022 Yuzhe Ma
Yulong Wang
Gang Wang
+ Observation of superconductivity in the noncentrosymmetric nodal chain semimetal Ba5In4Bi5 2022 Yuzhe Ma
Yulong Wang
Yuxin Wang
Soham Manni
Qisheng Lin
Linlin Wang
Kun Jiang
Sergey L. Bud’ko
P. C. Canfield
Gang Wang
+ PDF Chat DevelSet: Deep Neural Level Set for Instant Mask Optimization 2021 Guojin Chen
Ziyang Yu
Hongduo Liu
Yuzhe Ma
Bei Yu
+ PDF Chat DAMO: Deep Agile Mask Optimization for Full-Chip Scale 2021 Guojin Chen
Wanli Chen
Qi Sun
Yuzhe Ma
Haoyu Yang
Bei Yu
+ PDF Chat Machine Learning for Electronic Design Automation: A Survey 2021 Guyue Huang
Jingbo Hu
Yifan He
Jialong Liu
Mingyuan Ma
Zhaoyang Shen
Juejian Wu
Yuanfan Xu
Hengrui Zhang
Kai Zhong
+ PDF Chat Sequential Attacks on Kalman Filter-based Forward Collision Warning Systems 2021 Yuzhe Ma
Jon Sharp
Ruizhe Wang
Earlence Fernandes
Xiaojin Zhu
+ PDF Chat The Sample Complexity of Teaching by Reinforcement on Q-Learning 2021 Xuezhou Zhang
Shubham Bharti
Yuzhe Ma
Adish Singla
Xiaojin Zhu
+ Machine Learning for Electronic Design Automation: A Survey 2021 Guyue Huang
Jingbo Hu
Yifan He
Jialong Liu
Mingyuan Ma
Zhaoyang Shen
Juejian Wu
Yuanfan Xu
Hengrui Zhang
Kai Zhong
+ Game Redesign in No-regret Game Playing 2021 Yuzhe Ma
Young Wu
Xiaojin Zhu
+ OpenMPL: An Open-Source Layout Decomposer 2020 Wei Li
Yuzhe Ma
Qi Sun
Lu Zhang
Yibo Lin
Iris Hui-Ru Jiang
Bei Yu
David Z. Pan
+ PDF Chat VLSI mask optimization: From shallow to deep learning 2020 Haoyu Yang
Wei Zhong
Yuzhe Ma
Hao Geng
Ran Chen
Wanli Chen
Bei Yu
+ PDF Chat DAMO 2020 Guojin Chen
Wanli Chen
Yuzhe Ma
Haoyu Yang
Bei Yu
+ PDF Chat Adversarial Perturbation Attacks on ML-based CAD 2020 Kang Liu
Haoyu Yang
Yuzhe Ma
Benjamin Tan
Bei Yu
Evangeline F. Y. Young
Ramesh Karri
Siddharth Garg
+ The Teaching Dimension of Q-learning 2020 Xuezhou Zhang
Shubham Bharti
Yuzhe Ma
Adish Singla
Xiaojin Zhu
+ Adaptive Reward-Poisoning Attacks against Reinforcement Learning 2020 Xuezhou Zhang
Yuzhe Ma
Adish Singla
Xiaojin Zhu
+ PDF Chat VLSI Mask Optimization: From Shallow To Deep Learning 2020 Haoyu Yang
Wei Zhong
Yuzhe Ma
Hao Geng
Ran Chen
Wanli Chen
Bei Yu
+ Adaptive Reward-Poisoning Attacks against Reinforcement Learning 2020 Xuezhou Zhang
Yuzhe Ma
Adish Singla
Junwei Zhu
+ Task-agnostic Exploration in Reinforcement Learning 2020 Xuezhou Zhang
Yuzhe Ma
Adish Singla
+ Using Machine Teaching to Investigate Human Assumptions when Teaching Reinforcement Learners 2020 Yun-Shiuan Chuang
Xuezhou Zhang
Yuzhe Ma
Mark K. Ho
Joseph L. Austerweil
Xiaojin Zhu
+ Sequential Attacks on Kalman Filter-based Forward Collision Warning Systems 2020 Yuzhe Ma
Jon Sharp
Ruizhe Wang
Earlence Fernandes
Xiaojin Zhu
+ The Sample Complexity of Teaching-by-Reinforcement on Q-Learning 2020 Xuezhou Zhang
Shubham Bharti
Yuzhe Ma
Adish Singla
Xiaojin Zhu
+ Using Machine Teaching to Investigate Human Assumptions when Teaching Reinforcement Learners 2020 Yun-Shiuan Chuang
Xuezhou Zhang
Yuzhe Ma
Mark K. Ho
Joseph L. Austerweil
Junwei Zhu
+ PDF Chat A Unified Approximation Framework for Compressing and Accelerating Deep Neural Networks 2019 Yuzhe Ma
Ran Chen
Wei Li
Fanhua Shang
Wenjian Yu
Minsik Cho
Bei Yu
+ PDF Chat CAD Tool Design Space Exploration via Bayesian Optimization 2019 Yuzhe Ma
Ziyang Yu
Bei Yu
+ Data Poisoning against Differentially-Private Learners: Attacks and Defenses 2019 Yuzhe Ma
Xiaojin Zhu
Justin Hsu
+ PDF Chat Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization 2019 Yufei Han
Yuzhe Ma
Christopher Gates
Kevin Roundy
Yun Shen
+ PDF Chat Are Adversarial Perturbations a Showstopper for ML-Based CAD? A Case Study on CNN-Based Lithographic Hotspot Detection. 2019 Kang Liu
Haoyu Yang
Yuzhe Ma
Benjamin Tan
Bei Yu
Evangeline F. Y. Young
Ramesh Karri
Siddharth Garg
+ Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization 2019 Yufei Han
Yuzhe Ma
Christopher Gates
Kevin Roundy
Yun Shen
+ Data Poisoning against Differentially-Private Learners: Attacks and Defenses 2019 Yuzhe Ma
Xiaojin Zhu
Justin Hsu
+ Policy poisoning in batch reinforcement learning and control 2019 Yuzhe Ma
Xuezhou Zhang
Wen Sun
Junwei Zhu
+ Policy Poisoning in Batch Reinforcement Learning and Control 2019 Yuzhe Ma
Xuezhou Zhang
Wen Sun
Xiaojin Zhu
+ VLSI Mask Optimization: From Shallow To Deep Learning 2019 Haoyu Yang
Wei Zhong
Yuzhe Ma
Hao Geng
Ran Chen
Wanli Chen
Bei Yu
+ CAD Tool Design Space Exploration via Bayesian Optimization 2019 Yuzhe Ma
Ziyang Yu
Bei Yu
+ Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization 2019 Yufei Han
Yuzhe Ma
Christopher Gates
Kevin Roundy
Yun Shen
+ PDF Chat Cross-Layer Optimization for High Speed Adders: A Pareto Driven Machine Learning Approach 2018 Yuzhe Ma
Subhendu Roy
Jin Miao
Jiamin Chen
Bei Yu
+ PDF Chat Recent advances in convolutional neural network acceleration 2018 Qianru Zhang
Meng Zhang
Tinghuan Chen
Zhifei Sun
Yuzhe Ma
Bei Yu
+ A Unified Approximation Framework for Deep Neural Networks. 2018 Yuzhe Ma
Ran Chen
Wei Li
Fanhua Shang
Wenjian Yu
Minsik Cho
Bei Yu
+ A Unified Approximation Framework for Non-Linear Deep Neural Networks 2018 Yuzhe Ma
Ran Chen
Wei Li
Fanhua Shang
Wenjian Yu
Minsik Cho
Bei Yu
+ Teacher Improves Learning by Selecting a Training Subset 2018 Yuzhe Ma
Robert Nowak
Philippe Rigollet
Xuezhou Zhang
Xiaojin Zhu
+ Teacher Improves Learning by Selecting a Training Subset 2018 Yuzhe Ma
Robert D. Nowak
Philippe Rigollet
Xuezhou Zhang
Xiaojin Zhu
+ Data Poisoning Attacks in Contextual Bandits 2018 Yuzhe Ma
Kwang-Sung Jun
Lihong Li
Xiaojin Zhu
+ OpenMPL: An Open Source Layout Decomposer 2018 Wei Li
Yuzhe Ma
Qi Sun
Yibo Lin
Iris Hui-Ru Jiang
Bei Yu
David Z. Pan
+ Recent Advances in Convolutional Neural Network Acceleration 2018 Qianru Zhang
Meng Zhang
Tinghuan Chen
Zhifei Sun
Yuzhe Ma
Bei Yu
+ Cross-layer Optimization for High Speed Adders: A Pareto Driven Machine Learning Approach 2018 Yuzhe Ma
Subhendu Roy
Jin Miao
Jiamin Chen
Bei Yu
+ Adversarial Attacks on Stochastic Bandits 2018 Kwang-Sung Jun
Lihong Li
Yuzhe Ma
Xiaojin Zhu
+ Training Set Camouflage 2018 Ayon Sen
Scott Alfeld
Xuezhou Zhang
Ara Vartanian
Yuzhe Ma
Xiaojin Zhu
+ PDF Chat Data Poisoning Attacks in Contextual Bandits 2018 Yuzhe Ma
Kwang-Sung Jun
Lihong Li
Xiaojin Zhu
+ A Unified Approximation Framework for Compressing and Accelerating Deep Neural Networks 2018 Yuzhe Ma
Ran Chen
Wei Li
Fanhua Shang
Wenjian Yu
Minsik Cho
Bei Yu
Common Coauthors
Commonly Cited References
Action Title Year Authors # of times referenced
+ PDF Chat Data Poisoning Attacks in Contextual Bandits 2018 Yuzhe Ma
Kwang-Sung Jun
Lihong Li
Xiaojin Zhu
7
+ Online Data Poisoning Attack 2019 Xuezhou Zhang
Xiaojin Zhu
Laurent Lessard
6
+ PDF Chat Deep Residual Learning for Image Recognition 2016 Kaiming He
Xiangyu Zhang
Shaoqing Ren
Jian Sun
5
+ PDF Chat Cross-Layer Optimization for High Speed Adders: A Pareto Driven Machine Learning Approach 2018 Yuzhe Ma
Subhendu Roy
Jin Miao
Jiamin Chen
Bei Yu
5
+ PDF Chat VLSI Mask Optimization: From Shallow To Deep Learning 2020 Haoyu Yang
Wei Zhong
Yuzhe Ma
Hao Geng
Ran Chen
Wanli Chen
Bei Yu
5
+ Policy Poisoning in Batch Reinforcement Learning and Control 2019 Yuzhe Ma
Xuezhou Zhang
Wen Sun
Xiaojin Zhu
5
+ PDF Chat Layout Decomposition for Triple Patterning Lithography 2015 Bei Yu
Kun Yuan
Duo Ding
David Z. Pan
5
+ PDF Chat Going deeper with convolutions 2015 Christian Szegedy
Wei Liu
Yangqing Jia
Pierre Sermanet
Scott Reed
Dragomir Anguelov
Dumitru Erhan
Vincent Vanhoucke
Andrew Rabinovich
4
+ PDF Chat Machine Teaching for Inverse Reinforcement Learning: Algorithms and Applications 2019 Daniel S. Brown
Scott Niekum
4
+ An Overview of Machine Teaching 2018 Xiaojin Zhu
Adish Singla
Sandra Zilles
Anna N. Rafferty
4
+ Compression of Deep Convolutional Neural Networks for Fast and Low Power Mobile Applications 2015 Yong‐Deok Kim
Eunhyeok Park
Sungjoo Yoo
Tae‐Lim Choi
Yang Lu
Dongjun Shin
4
+ Adaptive Reward-Poisoning Attacks against Reinforcement Learning 2020 Xuezhou Zhang
Yuzhe Ma
Adish Singla
Junwei Zhu
4
+ Adversarial Attacks on Stochastic Bandits 2018 Kwang-Sung Jun
Lihong Li
Yuzhe Ma
Xiaojin Zhu
4
+ PDF Chat UNet++: A Nested U-Net Architecture for Medical Image Segmentation 2018 Zongwei Zhou
Md Mahfuzur Rahman Siddiquee
Nima Tajbakhsh
Jianming Liang
4
+ Data Poisoning Attacks against Online Learning 2018 Yizhen Wang
Kamalika Chaudhuri
4
+ Iterative Machine Teaching 2017 Weiyang Liu
Bo Dai
Ahmad Humayun
Charlene Tay
Yu Chen
Linda B. Smith
James M. Rehg
Le Song
4
+ Very Deep Convolutional Networks for Large-Scale Image Recognition 2014 Karen Simonyan
Andrew Zisserman
4
+ Is Q-learning Provably Efficient? 2018 Chi Jin
Zeyuan Allen-Zhu
SĂ©bastien Bubeck
Michael I. Jordan
4
+ Interactive Teaching Algorithms for Inverse Reinforcement Learning 2019 Parameswaran Kamalaruban
Rati Devidze
Volkan Cevher
Adish Singla
4
+ Explaining and Harnessing Adversarial Examples 2014 Ian Goodfellow
Jonathon Shlens
Christian Szegedy
3
+ PDF Chat Gaussian Process Optimization in the Bandit Setting: No Regret and Experimental Design 2009 Niranjan Srinivas
Andreas Krause
Sham M. Kakade
Matthias Seeger
3
+ PDF Chat A contextual-bandit approach to personalized news article recommendation 2010 Lihong Li
Wei Chu
John Langford
Robert E. Schapire
3
+ Adaptive Reward-Poisoning Attacks against Reinforcement Learning 2020 Xuezhou Zhang
Yuzhe Ma
Adish Singla
Xiaojin Zhu
3
+ Policy Teaching via Environment Poisoning: Training-time Adversarial Attacks against Reinforcement Learning 2020 Amin Rakhsha
Goran Radanović
Rati Devidze
Junwei Zhu
Adish Singla
3
+ Policy poisoning in batch reinforcement learning and control 2019 Yuzhe Ma
Xuezhou Zhang
Wen Sun
Junwei Zhu
3
+ Network In Network 2013 Min Lin
Qiang Chen
Shuicheng Yan
3
+ Teaching Multiple Concepts to a Forgetful Learner 2018 Anette Hunziker
Yuxin Chen
Oisin Mac Aodha
Manuel Gomez-Rodriguez
Andreas Krause
Pietro Perona
Yisong Yue
Adish Singla
3
+ PDF Chat DAMO 2020 Guojin Chen
Wanli Chen
Yuzhe Ma
Haoyu Yang
Bei Yu
3
+ The teaching dimension of linear learners 2016 Ji Liu
Xiaojin Zhu
3
+ Convolutional neural networks with low-rank regularization 2016 Cheng Tai
Tong Xiao
Yi Zhang
Xiaogang Wang
E Weinan
3
+ Action Centered Contextual Bandits 2017 Kristjan Greenewald
Ambuj Tewari
Susan A. Murphy
Predrag Klasnja
3
+ Empirical Evaluation of Rectified Activations in Convolutional Network 2015 Bing Xu
Naiyan Wang
Tianqi Chen
Mu Li
3
+ Exploiting Linear Structure Within Convolutional Networks for Efficient Evaluation 2014 Emily Denton
Wojciech Zaremba
Joan Bruna
Yann LeCun
Rob Fergus
3
+ PDF Chat Developing synthesis flows without human knowledge 2018 Cunxi Yu
Houping Xiao
Giovanni De Micheli
3
+ Adam: A Method for Stochastic Optimization 2014 Diederik P. Kingma
Jimmy Ba
3
+ Poisoning Attacks against Support Vector Machines 2012 Battista Biggio
Blaine Nelson
Pavel Laskov
3
+ Stronger Data Poisoning Attacks Break Data Sanitization Defenses 2018 Pang Wei Koh
Jacob Steinhardt
Percy Liang
3
+ Adversarial Attacks on Neural Network Policies 2017 Sandy H. Huang
Nicolas Papernot
Ian Goodfellow
Yan Duan
Pieter Abbeel
3
+ Predicting Parameters in Deep Learning 2013 Misha Denil
Babak Shakibi
Laurent Dinh
Marc’Aurelio Ranzato
Nando de Freitas
3
+ Making Contextual Decisions with Low Technical Debt 2016 Alekh Agarwal
Sarah Bird
Markus Cozowicz
Luong Hoang
John Langford
Stephen Lee
Jiaji Li
Dan Melamed
Gal Oshri
Oswaldo Ribas
3
+ Algorithms for multi-armed bandit problems 2014 Volodymyr Kuleshov
Doina Precup
3
+ Is feature selection secure against training data poisoning? 2018 Xiao Huang
Battista Biggio
Gavin Brown
Giorgio Fumera
Claudia Eckert
Fabio Roli
3
+ PDF Chat Robust Recovery of Subspace Structures by Low-Rank Representation 2012 Guangcan Liu
Zhouchen Lin
Shuicheng Yan
Ju Sun
Yong Yu
Yi Ma
2
+ Speeding up Convolutional Neural Networks with Low Rank Expansions 2014 Max Jaderberg
Andrea Vedaldi
Andrew Zisserman
2
+ Deep Learning with Limited Numerical Precision 2015 Suyog Gupta
Ankur Agrawal
Kailash Gopalakrishnan
Pritish Narayanan
2
+ PDF Chat Fronts propagating with curvature-dependent speed: Algorithms based on Hamilton-Jacobi formulations 1988 Stanley Osher
James A. Sethian
2
+ PDF Chat Training and operation of an integrated neuromorphic network based on metal-oxide memristors 2015 M. Prezioso
Farshad Merrikh‐Bayat
Brian D. Hoskins
Gina C. Adam
Konstantin K. Likharev
Dmitri B. Strukov
2
+ PDF Chat Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems 2017 Yuan Chen
Soummya Kar
José M. F. Moura
2
+ PDF Chat Xception: Deep Learning with Depthwise Separable Convolutions 2017 François Chollet
2
+ An extension of Karmarkar's projective algorithm for convex quadratic programming 1989 Yinyu Ye
Edison Tse
2