Author of the publication

An Optimal Online Algorithm For Retrieving Heavily Perturbed Statistical Databases In The Low-Dimensional Querying Model.

, , and . CIKM, page 1381-1390. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using a mixture of probabilistic decision trees for direct prediction of protein function., and . RECOMB, page 289-300. ACM, (2003)Deep Boosting., , and . ICML, volume 32 of JMLR Workshop and Conference Proceedings, page 1179-1187. JMLR.org, (2014)A Reduction from Apprenticeship Learning to Classification., and . NIPS, page 2253-2261. Curran Associates, Inc., (2010)Label differential privacy and private training data release., , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 3233-3251. PMLR, (2023)Learning with Deep Cascades., , and . ALT, volume 9355 of Lecture Notes in Computer Science, page 254-269. Springer, (2015)Where to Sell: Simulating Auctions From Learning Algorithms., , , and . EC, page 597-598. ACM, (2016)Repeated Contextual Auctions with Strategic Buyers., , and . NIPS, page 622-630. (2014)Graphical Models for Bandit Problems, , and . CoRR, (2012)Lexicographic Optimization: Algorithms and Stability., , and . AISTATS, volume 238 of Proceedings of Machine Learning Research, page 2503-2511. PMLR, (2024)There's something about MRAI: Timing diversity can exponentially worsen BGP convergence., , and . INFOCOM, page 2975-2983. IEEE, (2011)