Efficient, noise-tolerant, and private learning via boosting
Efficient, noise-tolerant, and private learning via boosting Bun, Mark; Carmosino, Marco Leandro; Sorrell, Jessica We introduce a simple framework for designing private boosting algorithms. We give...
View ArticleHypothesis testing interpretations and Renyi differential privacy
Hypothesis testing interpretations and Renyi differential privacy Balle, Borja; Barthe, Gilles; Gaboardi, Marco; Hsu, Justin; Sato, Tetsuya Differential privacy is a de facto standard in data privacy,...
View ArticleThe large-error approximate degree of AC^0
The large-error approximate degree of AC^0 Bun, Mark; Thaler, Justin
View ArticlePrivate hypothesis selection
Private hypothesis selection Bun, Mark; Kamath, Gautam; Steinke, Thomas; Wu, Zhiwei Steven We provide a differentially private algorithm for hypothesis selection. Given samples from an unknown...
View ArticleGuest column
Guest column Bun, Mark; Thaler, Justin The approximate degree of a Boolean function f captures how well f can be approximated pointwise by low-degree polynomials. This article surveys what we know...
View ArticleIncorporating unlabeled data into distributionally-robust learning
Incorporating unlabeled data into distributionally-robust learning Frogner, Charlie; Claici, Sebastian; Chien, Edward; Solomon, Justin We study a robust alternative to empirical risk minimization...
View ArticleResolving pronouns in Twitter streams: context can help!
Resolving pronouns in Twitter streams: context can help! Wijaya, Derry Tanti; Andy, Anietie; Callison-Burch, Chris Many people live-tweet televised events like Presidential debates and popular TV-shows...
View ArticleA progesterone biosensor derived from microbial screening
A progesterone biosensor derived from microbial screening Grazon, C.; Baer, R.C.; Kuzmanović, U.; Nguyen, T.; Chen, M.; Zamani, M.; Chern, M.; Aquino, P.; Zhang, X.; Lecommandoux, S.; Fan, Andy;...
View ArticleSome properties of sets in the plane closed under linear extrapolation by a...
Some properties of sets in the plane closed under linear extrapolation by a fixed parameter Fenner, Stephen; Green, Frederic; Gurjar, R.; Homer, Steven Fix any 𝛌⊆ ℂ. We say that a set S ⊆ ℂ is 𝛌-convex...
View ArticleGuaranteed validity for empirical approaches to adaptive data analysis
Guaranteed validity for empirical approaches to adaptive data analysis Rogers, Ryan; Roth, Aaron; Smith, Adam; Srebro, Nathan; Thakkar, Om; Woodworth, Blake We design a general framework for answering...
View ArticleThe Flajolet-Martin sketch itself preserves differential privacy: private...
The Flajolet-Martin sketch itself preserves differential privacy: private counting with minimal space Smith, Adam; Song, Shuang; Thakurta, Abhradeep
View ArticleErasure-resilient sublinear-time graph algorithms
Erasure-resilient sublinear-time graph algorithms Levi, Amit; Pallavoor, Ramesh Krishnan S.; Raskhodnikova, Sofya; Varma, Nithin We investigate sublinear-time algorithms that take partially erased...
View ArticleContemporary land use and land cover change impacts on global air quality
Contemporary land use and land cover change impacts on global air quality Geddes, Jeffrey; Wong, Anthony Our work explores the impact of two important dimensions of land system changes, land use and...
View ArticleEffects of a large-scale, natural sediment deposition event on plant cover in...
Effects of a large-scale, natural sediment deposition event on plant cover in a Massachusetts salt marsh Moore, G.E.; Burdick, D.M.; Routhier, M.R.; Novak, Alyssa B.; Payne, A.R. In mid-winter 2018, an...
View ArticleIntroduction: what was Black Studies?
Introduction: what was Black Studies? Chude-Sokei, Louis
View ArticleChange detection, a functional analysis perspective
Change detection, a functional analysis perspective Kon, Mark; Castrillon-Candas, Julio E. We develop a new approach for detecting changes in the behavior of stochastic processes and random fields...
View ArticleGeneral methods and properties to evaluate continuum limits of the 1D...
General methods and properties to evaluate continuum limits of the 1D discrete time quantum walk Manighalam, Michael; Kon, Mark Models of quantum walks which admit continuous time and continuous...
View ArticleAdvMS: a multi-source multi-cost defense against adversarial attacks
AdvMS: a multi-source multi-cost defense against adversarial attacks Wang, Xiao; Wang, Siyue; Chen, Pin-Yu; Lin, Xue; Chin, Peter Designing effective defense against adversarial attacks is a crucial...
View ArticleNodeDrop: a method for finding sufficient network architecture size
NodeDrop: a method for finding sufficient network architecture size Jensen, Louis; Harer, Jacob; Chin, Sang Determining an appropriate number of features for each layer in a neural network is an...
View ArticleDreaming with ARC
Dreaming with ARC Chin, Sang; Banburski, Andrzej; Poggio, Tomaso; Ghandi, Anshula; Alford, Simon; Dandekar, Sylee Current machine learning algorithms are highly specialized to whatever it is they are...
View Article