Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy, accuracy, and consistency too: a holistic solution to contingency table release., , , , , and . PODS, page 273-282. ACM, (2007)Close Category Generalization., , , and . CoRR, (2020)Sample Complexity of Adversarially Robust Linear Classification on Separated Data., , and . CoRR, (2020)Robust Empirical Risk Minimization with Tolerance., , , , and . ALT, volume 201 of Proceedings of Machine Learning Research, page 182-203. PMLR, (2023)Crowdsourcing Feature Discovery via Adaptively Chosen Comparisons., , and . HCOMP, page 198-205. AAAI Press, (2015)Communication-Efficient Triangle Counting under Local Differential Privacy., , and . USENIX Security Symposium, page 537-554. USENIX Association, (2022)Online Bipartite Perfect Matching With Augmentations., , , and . INFOCOM, page 1044-1052. IEEE, (2009)Stochastic gradient descent with differentially private updates., , and . GlobalSIP, page 245-248. IEEE, (2013)Active Learning with Logged Data., , and . ICML, volume 80 of Proceedings of Machine Learning Research, page 5517-5526. PMLR, (2018)Extrinsic Jensen-Shannon divergence and noisy Bayesian active learning., , and . Allerton, page 1128-1135. IEEE, (2013)