Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Kenji FukumizuThe Institute of Statistical MathematicsVerified email at ism.ac.jp
Kohei HayashiResearcher, Preferred NetworksVerified email at preferred.jp
Masahiro KatoThe University of TokyoVerified email at g.ecc.u-tokyo.ac.jp
Akiyoshi SannaiRIKEN / Keio UniversityVerified email at riken.jp
Rui ZhangThe Australian National University & CSIRO, AUVerified email at anu.edu.au
Krikamol MuandetCISPA - Helmholtz Center for Information SecurityVerified email at cispa.de
Bernhard SchölkopfDirector, Max Planck Institute for Intelligent Systems & ELLIS Institute Tübingen; Professor at ETHVerified email at tuebingen.mpg.de
Kengo KatoDepartment of Statistics and Data Science, Cornell UniversityVerified email at cornell.edu
Takanori MaeharaMeta, inc.Verified email at acm.org
Makoto KawanoThe University of TokyoVerified email at weblab.t.u-tokyo.ac.jp
Nan JiangAssistant Professor of Computer Science, UIUCVerified email at illinois.edu
Wen SunAssistant Professor, Cornell UniversityVerified email at cornell.edu
Nathan KallusCornell UniversityVerified email at cornell.edu
Tengyang XieUniversity of Wisconsin-Madison, Microsoft ResearchVerified email at cs.wisc.edu
Masatoshi UeharaCornell UniversityVerified email at cornell.edu
Yuichi YoshidaNational Institute of InformaticsVerified email at nii.ac.jp
Kenichiro McAlinnTemple UniversityVerified email at temple.edu
Kaito AriuCyberAgent, Inc. / KTH / kaitoariu@gmail.comVerified email at kth.se
Hirofumi OtaRutgers UniversityVerified email at rutgers.edu
Shota YasuiCyberAgent, inc.Verified email at cyberagent.co.jp