暂无分享,去创建一个
Ling Huang | Peter L. Bartlett | Benjamin I. P. Rubinstein | Nina Taft | P. Bartlett | Ling Huang | N. Taft
[1] W. Rudin,et al. Fourier Analysis on Groups. , 1965 .
[2] J. Lamperti. ON CONVERGENCE OF STOCHASTIC PROCESSES , 1962 .
[3] G. Wahba,et al. Some results on Tchebycheffian spline functions , 1971 .
[4] Luc Devroye,et al. Distribution-free performance bounds for potential function rules , 1979, IEEE Trans. Inf. Theory.
[5] Michael Kearns,et al. Efficient noise-tolerant learning from statistical queries , 1993, STOC.
[6] László Györfi,et al. A Probabilistic Theory of Pattern Recognition , 1996, Stochastic Modelling and Applied Probability.
[7] Jon A. Wellner,et al. Weak Convergence and Empirical Processes: With Applications to Statistics , 1996 .
[8] J. C. BurgesChristopher. A Tutorial on Support Vector Machines for Pattern Recognition , 1998 .
[9] Dana Ron,et al. Algorithmic Stability and Sanity-Check Bounds for Leave-One-Out Cross-Validation , 1997, Neural Computation.
[10] M. Kearns,et al. Algorithmic stability and sanity-check bounds for leave-one-out cross-validation , 1999 .
[11] T. Poggio,et al. Multiclass cancer diagnosis using tumor gene expression signatures , 2001, Proceedings of the National Academy of Sciences of the United States of America.
[12] Partha Niyogi,et al. Almost-everywhere Algorithmic Stability and Generalization Error , 2002, UAI.
[13] André Elisseeff,et al. Stability and Generalization , 2002, J. Mach. Learn. Res..
[14] Thorsten Joachims,et al. Optimizing search engines using clickthrough data , 2002, KDD.
[15] Dustin Boswell,et al. Introduction to Support Vector Machines , 2002 .
[16] Irit Dinur,et al. Revealing information while preserving privacy , 2003, PODS.
[17] Anthony Widjaja,et al. Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond , 2003, IEEE Transactions on Neural Networks.
[18] Cynthia Dwork,et al. Practical privacy: the SuLQ framework , 2005, PODS.
[19] Kenji Araki,et al. A SVM-based personal recommendation system for TV programs , 2006, 2006 12th International Multi-Media Modelling Conference.
[20] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[21] Kunle Olukotun,et al. Map-Reduce for Machine Learning on Multicore , 2006, NIPS.
[22] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[23] Radford M. Neal. Pattern Recognition and Machine Learning , 2007, Technometrics.
[24] Benjamin Recht,et al. Random Features for Large-Scale Kernel Machines , 2007, NIPS.
[25] Olivier Chapelle,et al. Training a Support Vector Machine in the Primal , 2007, Neural Computation.
[26] Cynthia Dwork,et al. The price of privacy and the limits of LP decoding , 2007, STOC '07.
[27] Cynthia Dwork,et al. Privacy, accuracy, and consistency too: a holistic solution to contingency table release , 2007, PODS.
[28] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[29] A. Blum,et al. A learning theory approach to non-interactive database privacy , 2008, STOC.
[30] Michalis Faloutsos,et al. Internet traffic classification demystified: myths, caveats, and the best practices , 2008, CoNEXT '08.
[31] Sofya Raskhodnikova,et al. What Can We Learn Privately? , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.
[32] Kamalika Chaudhuri,et al. Privacy-preserving logistic regression , 2008, NIPS.
[33] Cynthia Dwork,et al. New Efficient Attacks on Statistical Disclosure Control Mechanisms , 2008, CRYPTO.
[34] Ilya Mironov,et al. Differentially private recommender systems: building privacy into the net , 2009, KDD.
[35] Moni Naor,et al. On the complexity of differentially private data release: efficient algorithms and hardness results , 2009, STOC '09.
[36] Anand D. Sarwate,et al. Differentially Private Support Vector Machines , 2009, ArXiv.
[37] Cynthia Dwork,et al. Differential privacy and robust statistics , 2009, STOC '09.
[38] Kunal Talwar,et al. On the geometry of differential privacy , 2009, STOC '10.
[39] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[40] Anand D. Sarwate,et al. Differentially Private Empirical Risk Minimization , 2009, J. Mach. Learn. Res..
[41] Armin Biere,et al. On the Complexity of , 2012 .
[42] Amos Beimel,et al. Bounds on the sample complexity for private learning and private data release , 2010, Machine Learning.