Quantcast
Browsing all 1561 articles
Browse latest View live

Efficient, noise-tolerant, and private learning via boosting

Efficient, noise-tolerant, and private learning via boosting Bun, Mark; Carmosino, Marco Leandro; Sorrell, Jessica We introduce a simple framework for designing private boosting algorithms. We give...

View Article


Hypothesis testing interpretations and Renyi differential privacy

Hypothesis testing interpretations and Renyi differential privacy Balle, Borja; Barthe, Gilles; Gaboardi, Marco; Hsu, Justin; Sato, Tetsuya Differential privacy is a de facto standard in data privacy,...

View Article


The large-error approximate degree of AC^0

The large-error approximate degree of AC^0 Bun, Mark; Thaler, Justin

View Article

Private hypothesis selection

Private hypothesis selection Bun, Mark; Kamath, Gautam; Steinke, Thomas; Wu, Zhiwei Steven We provide a differentially private algorithm for hypothesis selection. Given samples from an unknown...

View Article

Guest column

Guest column Bun, Mark; Thaler, Justin The approximate degree of a Boolean function f captures how well f can be approximated pointwise by low-degree polynomials. This article surveys what we know...

View Article


Incorporating unlabeled data into distributionally-robust learning

Incorporating unlabeled data into distributionally-robust learning Frogner, Charlie; Claici, Sebastian; Chien, Edward; Solomon, Justin We study a robust alternative to empirical risk minimization...

View Article

Resolving pronouns in Twitter streams: context can help!

Resolving pronouns in Twitter streams: context can help! Wijaya, Derry Tanti; Andy, Anietie; Callison-Burch, Chris Many people live-tweet televised events like Presidential debates and popular TV-shows...

View Article

A progesterone biosensor derived from microbial screening

A progesterone biosensor derived from microbial screening Grazon, C.; Baer, R.C.; Kuzmanović, U.; Nguyen, T.; Chen, M.; Zamani, M.; Chern, M.; Aquino, P.; Zhang, X.; Lecommandoux, S.; Fan, Andy;...

View Article


Some properties of sets in the plane closed under linear extrapolation by a...

Some properties of sets in the plane closed under linear extrapolation by a fixed parameter Fenner, Stephen; Green, Frederic; Gurjar, R.; Homer, Steven Fix any 𝛌⊆ ℂ. We say that a set S ⊆ ℂ is 𝛌-convex...

View Article


Guaranteed validity for empirical approaches to adaptive data analysis

Guaranteed validity for empirical approaches to adaptive data analysis Rogers, Ryan; Roth, Aaron; Smith, Adam; Srebro, Nathan; Thakkar, Om; Woodworth, Blake We design a general framework for answering...

View Article

The Flajolet-Martin sketch itself preserves differential privacy: private...

The Flajolet-Martin sketch itself preserves differential privacy: private counting with minimal space Smith, Adam; Song, Shuang; Thakurta, Abhradeep

View Article

Erasure-resilient sublinear-time graph algorithms

Erasure-resilient sublinear-time graph algorithms Levi, Amit; Pallavoor, Ramesh Krishnan S.; Raskhodnikova, Sofya; Varma, Nithin We investigate sublinear-time algorithms that take partially erased...

View Article

Contemporary land use and land cover change impacts on global air quality

Contemporary land use and land cover change impacts on global air quality Geddes, Jeffrey; Wong, Anthony Our work explores the impact of two important dimensions of land system changes, land use and...

View Article


Effects of a large-scale, natural sediment deposition event on plant cover in...

Effects of a large-scale, natural sediment deposition event on plant cover in a Massachusetts salt marsh Moore, G.E.; Burdick, D.M.; Routhier, M.R.; Novak, Alyssa B.; Payne, A.R. In mid-winter 2018, an...

View Article

Introduction: what was Black Studies?

Introduction: what was Black Studies? Chude-Sokei, Louis

View Article


Change detection, a functional analysis perspective

Change detection, a functional analysis perspective Kon, Mark; Castrillon-Candas, Julio E. We develop a new approach for detecting changes in the behavior of stochastic processes and random fields...

View Article

General methods and properties to evaluate continuum limits of the 1D...

General methods and properties to evaluate continuum limits of the 1D discrete time quantum walk Manighalam, Michael; Kon, Mark Models of quantum walks which admit continuous time and continuous...

View Article


AdvMS: a multi-source multi-cost defense against adversarial attacks

AdvMS: a multi-source multi-cost defense against adversarial attacks Wang, Xiao; Wang, Siyue; Chen, Pin-Yu; Lin, Xue; Chin, Peter Designing effective defense against adversarial attacks is a crucial...

View Article

NodeDrop: a method for finding sufficient network architecture size

NodeDrop: a method for finding sufficient network architecture size Jensen, Louis; Harer, Jacob; Chin, Sang Determining an appropriate number of features for each layer in a neural network is an...

View Article

Dreaming with ARC

Dreaming with ARC Chin, Sang; Banburski, Andrzej; Poggio, Tomaso; Ghandi, Anshula; Alford, Simon; Dandekar, Sylee Current machine learning algorithms are highly specialized to whatever it is they are...

View Article
Browsing all 1561 articles
Browse latest View live