Chinese
English
Research Fellow  |  Lu, Chi-Jen  
 
contact
vita
education
experience
interests
descriptions
activities
honors
publications
 
 
 
 
 
Publications
 
1. Ku-Chun Chou, Chao-Kai Chiang, Hsuan-Tien Lin, and Chi-Jen Lu, "Pseudo-reward algorithms for contextual bandits with linear payoff functions," Proceedings of the Asian Conference on Machine Learning (ACML), November 2014.
2. Shang-Tse Chen, Hsuan-Tien Lin, and Chi-Jen Lu, "Boosting with online binary learners for the multiclass bandit problem," Proceedings of the 31st International Conference on Machine Learning (ICML), June 2014.
3. Po-An Chen and Chi-Jen Lu, "Generalized mirror descents in congestion games with splittable flows," Proceedings of the 13th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), May 2014.
4. Chao-Kai Chiang, Chia-Jung Lee, and Chi-Jen Lu, "Beating bandits in gradually evolving worlds," Proceedings of the 26th Conference on Learning Theory (COLT), June 2013.
5. Jen-Hou Chou, Chi-Jen Lu, and Mu-En Wu, "Making profit in a prediction market," Proceedings of the 18th Annual International Computing and Combinatorics Conference (COCOON), Lecture Notes in Computer Science, August 2012.
6. Shang-Tse Chen, Hsuan-Tien Lin, and Chi-Jen Lu, "An online boosting algorithm with theoretical justifications," Proceedings of the 29th International Conference on Machine Learning (ICML), June 2012.
7. Chao-Kai Chiang, Tianbao Yang, Chia-Jung Lee, Mehrdad Mahdavi, Chi-Jen Lu, Rong Jin and Shenghuo Zhu, "Online optimization with gradual variations," Proceedings of the 25th Conference on Learning Theory (COLT), June 2012.
8. Chi-Jen Lu, "Hitting set generators for sparse polynomials over any finite fields," Proceedings of the 27th Annual IEEE Conference on Computational Complexity (CCC), June 2012.
9. Chia-Jung Lee, Chi-Jen Lu, and Shi-Chun Tsai, "Computational randomness from generalized hardcore sets," Proceedings of the 20th International Symposium on Fundamentals of Computation Theory (FCT), Lecture Notes in Computer Science, pages 78-89, 2011.
10. Chi-Jen Lu, Shi-Chun Tsai, and Hsin-Lung Wu, "Complexity of hard-core set proofs," Computational Complexity, volume 20, number 1, pages 145 – 171, 2011.
11. Chi-Jen Lu and Wei-Fu Lu, "Making online decisions with bounded memory," Proceedings of the 22nd International Conference on Algorithmic Learning Theory (ALT), Lecture Notes in Artificial Intelligence, pages 249-261, 2011.
12. Chia-Jung Lee, Chi-Jen Lu and Shi-Chun Tsai, "Extracting computational entropy and learning noisy linear functions," IEEE Transactions on Information Theory, volume 57, number 8, pages 5485-5496, 2011.
13. Fu Chang, Chien-Yang Guo, Xiao-Rong Lin, and Chi-Jen Lu, "Tree decomposition for large-scale SVM Problems," Journal of Machine Learning Research, volume 11, pages 2935−2972, October 2010.
14. Chao-Kai Chiang and Chi-Jen Lu, "Online Learning with Queries," Proceedings of the 21st ACM/SIAM Symposium on Discrete Algorithms (SODA), pages 616-629, January 2010.
15. Chia-Jung Lee, Chi-Jen Lu, and Shi-Chun Tsai, "Deterministic extractors for independent-symbol sources," IEEE Transactions on Information Theory, volume 56, number 12, pages 6501 – 6512, 2010.
16. Jen-Hou Chou and Chi-Jen Lu, "Communication requirements for stable marriages," Proceedings of the 7th International Conference on Algorithms and Complexity (CIAC), Lecture Notes in Computer Science, pages 371-382, 2010.
17. Chi-Jen Lu and Hsin-Lung Wu, "On the hardness against constant-depth linear-size circuits," Discrete Mathematics, Algorithms and Applications, volume 2, number 4, pages 515 – 526, 2010.
18. Chi-Jen Lu and Hsin-Lung Wu, "On the hardness against constant-depth linear-size circuits," Proceedings of the 16th Annual International Computing and Combinatorics Conference (COCOON), Lecture Notes in Computer Science, pages 13-22, 2010.
19. Kai-Min Chung, Feng-Hao Liu, Chi-Jen Lu, and Bo-Yin Yang, "Efficient string-commitment from weak bit-commitment and full-spectrum amplification theorem for puzzles," Advances in Cryptology - ASIACRYPT, Lecture Notes in Computer Science, pages 268-282, 2010.
20. Chi-Jen Lu, "On the security loss in cryptographic reductions," Advances in Cryptology - EUROCRYPT, pages 72-87, 2009.
21. Chia-Jung Lee, Chi-Jen Lu and Shi-Chun Tsai, "Extracting computational entropy and learning noisy linear functions," Proceedings of the 15th International Computing and Combinatorics Conference (COCOON), Lecture Notes in Computer Science, pages 338-347, 2009.
22. Chi-Yuan Chan, Shan-Chyun Ku, Chi-Jen Lu, and Biing-Feng Wang, "Efficient algorithms for two generalized 2-median problems and the group median problem on trees," Theoretical Computer Science, volume 410, number 8-10, pages 867-876, 2009.
23. Chi-Jen Lu, Shi-Chun Tsai, and Hsin-Lung Wu, "On the complexity of hardness amplification," IEEE Transactions on Information Theory, volume 54, number 10, pages 4575-4586, October 2008.
24. Chun-Yuan Hsiao and Chi-Jen Lu and Leonid Reyzin, "Conditional computational entropy, or toward separating pseudoentropy from compressibility," Advances in Cryptology - EUROCRYPT, Lecture Notes in Computer Science, 2007.
25. Chi-Jen Lu, Shi-Chun Tsai, and Hsin-Lung Wu, "Impossibility results on weakly black-box hardness amplification," Proceedings of the 16th International Symposium on Fundamentals of Computation Theory (FCT),, Lecture Notes in Computer Science, 2007.
26. Chi-Jen Lu, Shi-Chun Tsai, and Hsin-Lung Wu, "Improved hardness amplification in NP," Theoretical Computer Science, volume 370, number 1-3, pages 293-298, 2007.
27. Chi-Jen Lu, Shi-Chun Tsai, and Hsin-Lung Wu, "On the complexity of hard-core set constructions," Proceedings of the 34th International Colloquium on Automata, Languages and Programming (ICALP), Lecture Notes in Computer Science, pages 183-194, 2007.
28. Chi-Jen Lu, "On the complexity of parallel hardness amplification for one-way functions," Proceedings of the 3rd Theory of Cryptography Conference (TCC), pages 462-481, 2006.
29. Yan-Cheng Chang, Chun-Yun Hsiao, and Chi-Jen Lu, "The impossibility of basing one-way permutations on central cryptographic primitives," Journal of Cryptology, volume 19, number 1, pages 97-114, 2006.
30. Fu Chang, Chin-Chin Lin, and Chi-Jen Lu, "Adaptive prototype learning algorithms: theoretical and experimental studies," Journal of Machine Learning Research, volume 7(Oct), pages pp. 2125-2148, 2006.
31. Chia-Jung Lee, Chi-Jen Lu, and Shi-Chun Tsai, "Deterministic extractors for independent-symbol sources," In Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP), pages 84-95, 2006.
32. Chia-Jung Lee, Chi-Jen Lu, Shi-Chun Tsai, and Wen-Guey Tzeng, "Extracting randomness from multiple independent sources," IEEE Transactions on Information Theory, volume 51, number 6, pages 2224-2227, 2005.
33. Chi-Jen Lu, Shi-Chun Tsai, and Hsin-Lung Wu, "On the Complexity of Hardness Amplification," Proceedings of the 20th Annual IEEE Conference on Computational Complexity (CCC), pages 170-182, 2005.
34. Yan-Cheng Chang and Chi-Jen Lu, "Oblivious polynomial evaluation and oblivious neural learning," Theoretical Computer Science, volume 341, number 1-3, pages 39-54, 2005.
35. Chi-Jen Lu, "Deterministic Hypergraph Coloring and its Applications," SIAM Journal on Discrete Mathematics, volume 18, number 2, pages 320-331, 2004.
36. Chi-Jen Lu, "Encryption against Storage-Bounded Adversaries from On-line Strong Extractors," Journal of Cryptology, volume 17, number 1, pages 27-42, 2004.
37. Fu Chang, Chun-Jen Chen, and Chi-Jen Lu, "A linear-time component-labeling algorithm using contour tracing technique," Computer Vision and Image Understanding, volume 93, number 2, pages 206-220, 2004.
38. Chi-Jen Lu, Omer Reingold, Salil Vadhan, and Avi Wigderson, "Extractors: Optimal up to Constant Factors," Proceedings of the 35th ACM Symposium on Theory of Computing (STOC), pages 602-611, 2003.
39. Chi-Jen Lu, "Hyper-Encryption against Space-Bounded Adversaries from On-line Strong Extractors," Advances in Cryptology - CRYPTO, pages 257-271, August 2002.
40. Yan-Cheng Chang, Chun-Yun Hsiao, Chi-Jen Lu, "On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives," Advances in Cryptology - ASIACRYPT, pages 110-124, 2002.
41. Chi-Jen Lu, "Improved Pseudorandom Generators for Combinatorial Rectangles," Combinatorica, volume 22, number 3, pages 417-434, 2002.
42. Shan-Chyun Ku, Chi-Jen Lu, Biing-Feng Wang, and Tzu-Chin Lin, "Efficient Algorithms for Two Generalized 2-Median Problems on Trees," Proceedings of the 12th Annual International Symposium on Algorithms And Computation (ISAAC), pages 768-778, 2001.
43. Chi-Jen Lu, "Derandomizing Arthur-Merlin Games under Uniform Assumptions," Computational Complexity, volume 10, number 3, pages 247-259, 2001.
44. Chi-Jen Lu and Shi-Chun Tsai, "A Note on Iterating an alpha-ary Gray Code," SIAM Journal on Discrete Mathematics, volume 14, number 2, pages 237-239, 2001.
45. Chi-Jen Lu, "An Exact Characterization of Symmetric Functions in qAC^0[2]," Theoretical Computer Science, volume 261, number 2, pages 297-303, 2001.
46. Yan-Cheng Chang and Chi-Jen Lu, "Oblivious Polynomial Evaluation and Oblivious Neural Learning," Advances in Cryptology - ASIACRYPT 2001, pages 369-384, 2001.
47. Tom Leighton, Chi-Jen Lu, Satish Rao, and Aravind Srinivasan, "New Algorithmic Aspects of the Local Lemma with Applications to Routing and Partitioning," SIAM Journal on Computing, volume 31, number 2, pages 626-641, 2001.
48. Chi-Jen Lu, "Derandomizing Arthur-Merlin Games under Uniform Assumptions.," the 11th Annual International Symposium on Algorithms And Computation (ISAAC), pages 302-312, 2000.
49. David A. Mix Barrington, Chi-Jen Lu, Peter Bro Miltersen, and Sven Skyum, "On Monotone Plannar Circuits," IEEE Conf on Computational Complexity, pages 24-31, 1999.
50. Chi-Jen Lu, "A deterministic approximation algorithm for a minmax integer programming problem," Proceedings of the 10th ACM/SIAM Symposium on Discrete Algorithms (SODA), pages 663-668, 1999.
51. Chi-Jen Lu, "Deterministic hypergraph coloring and its applications," Proceedings of the 2nd International Workshop on Randomization and Approximation Techniques in Computer Science (RANDOM), Lecture Notes in Computer Science, pages 35-46, 1998.
52. Dave Mix Barrington, Chi-Jen Lu, Peter Bro Miltersen, and Sven Skyum, "Searching Constant Width Mazes Captures the AC0-Hierarchy," Proceedings of the 15th Annual Symposium on Theoretical Aspects of Computer Science (STACS), pages 73-83, 1998.
53. Chi-Jen Lu, "Improved pseudorandom generators for combinatorial rectangles," Proceedings of the 25th International Colloquium on Automata, Languages, and Programming (ICALP), Lecture Notes in Computer Science, pages 223--234, 1998.
54. Chi-Jen Lu, "An exact characterization of symmetric functions in qAC^0[2]," Proceedings of the 4th Annual International Computing and Combinatorics Conference (COCOON), Lecture Notes in Computer Science, pages 167-173, 1998.
 
 
bg