Vatsal Shah

According to our database1, Vatsal Shah authored at least 14 papers between 2014 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Recoverability Landscape of Tree Structured Markov Random Fields under Symmetric Noise.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2022

2021
Robust Estimation of Tree Structured Markov Random Fields.
CoRR, 2021

2020
On Generalization of Adaptive Methods for Over-parameterized Linear Regression.
CoRR, 2020

Robust Estimation of Tree Structured Ising Models.
CoRR, 2020

Negative Sampling in Semi-Supervised learning.
Proceedings of the 37th International Conference on Machine Learning, 2020

Choosing the Sample with Lowest Loss makes SGD Robust.
Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics, 2020

2019
A Rhythm-Based Serious Game for Fine Motor Rehabilitation Using Leap Motion.
Proceedings of the 58th Annual Conference of the Society of Instrument and Control Engineers of Japan, 2019

Ontological Approach for Knowledge Extraction from Clinical Documents.
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019

2018
An Iterative Approach for Shadow Removal in Document Images.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Creation of Unambiguous Centralized Knowledge Base from UMLS Metathesaurus.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2018

Automated Clinical Documentation Improvement.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2018

2017
Matrix Factorization with Side and Higher Order Information.
CoRR, 2017

2016
Trading-off variance and complexity in stochastic gradient descent.
CoRR, 2016

2014
A modular multi-location anonymized traffic monitoring tool for a WiFi network.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014


  Loading...