no code implementations • 6 Feb 2022 • Michael Curry, Tuomas Sandholm, John Dickerson
We present an architecture that supports multiple bidders and is perfectly strategyproof, but cannot necessarily represent the optimal mechanism.
no code implementations • 3 Jan 2022 • Michael Curry, Alexander Trott, Soham Phade, Yu Bai, Stephan Zheng
We validate the learned solutions are $\epsilon$-meta-equilibria through best-response analyses, show that they align with economic intuitions, and show our approach can learn a spectrum of qualitatively distinct $\epsilon$-meta-equilibria in open RBC models.
no code implementations • 1 Jan 2021 • Arpit Amit Bansal, Ping-Yeh Chiang, Michael Curry, Hossein Souri, Rama Chellappa, John P Dickerson, Rajiv Jain, Tom Goldstein
Watermarking is a commonly used strategy to protect creators' rights to digital images, videos and audio.
no code implementations • NeurIPS 2020 • Ping-Yeh Chiang, Michael Curry, Ahmed Abdelkader, Aounon Kumar, John Dickerson, Tom Goldstein
Despite the vulnerability of object detectors to adversarial attacks, very few defenses are known to date.
1 code implementation • NeurIPS 2020 • Duncan C McElfresh, Michael Curry, Tuomas Sandholm, John P Dickerson
In barter exchanges, participants swap goods with one another without exchanging money; exchanges are often facilitated by a central clearinghouse, with the goal of maximizing the aggregate quality (or number) of swaps.