Prescriptive analytics with differential privacy
暂无分享,去创建一个
Santu Rana | Thin Nguyen | Ramachandra Kaimal | Sunil Gupta | Svetha Venkatesh | Haripriya Harikumar | S. Rana | S. Gupta | S. Venkatesh | Thin Nguyen | Haripriya Harikumar | R. Kaimal | Santu Rana
[1] Santu Rana,et al. Scalable Backdoor Detection in Neural Networks , 2020, ECML/PKDD.
[2] Dimitris Bertsimas,et al. From Predictive to Prescriptive Analytics , 2014, Manag. Sci..
[3] Santu Rana,et al. Bayesian Optimization with Unknown Search Space , 2019, NeurIPS.
[4] Jishen Zhao,et al. DeepInspect: A Black-box Trojan Detection and Mitigation Framework for Deep Neural Networks , 2019, IJCAI.
[5] Ben Y. Zhao,et al. Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[6] Peng Liu,et al. Multidimensional Correlation Hierarchical Differential Privacy for Medical Data with Multiple Privacy Requirements , 2018 .
[7] Fang Liu,et al. Generalized Gaussian Mechanism for Differential Privacy , 2016, IEEE Transactions on Knowledge and Data Engineering.
[8] Svetha Venkatesh,et al. Differentially Private Prescriptive Analytics , 2018, 2018 IEEE International Conference on Data Mining (ICDM).
[9] Svetha Venkatesh,et al. Prescriptive Analytics Through Constrained Bayesian Optimization , 2018, PAKDD.
[10] Neil D. Lawrence,et al. Differentially Private Regression with Gaussian Processes , 2018, AISTATS.
[11] Benjamin Van Roy,et al. A Tutorial on Thompson Sampling , 2017, Found. Trends Mach. Learn..
[12] Philip S. Yu,et al. $\textsf{LoPub}$ : High-Dimensional Crowdsourced Data Publication With Local Differential Privacy , 2016, IEEE Transactions on Information Forensics and Security.
[13] Stefan Spinler,et al. Prescriptive analytics in airline operations: Arrival time prediction and cost index optimization for short-haul flights , 2018 .
[14] Roger N. Anderson. 'Petroleum Analytics Learning Machine' for optimizing the Internet of Things of today's digital oil field-to-refinery petroleum system , 2017, 2017 IEEE International Conference on Big Data (Big Data).
[15] Pei-Ju Wu,et al. The green fleet optimization model for a low-carbon economy: A prescriptive analytics , 2017, 2017 International Conference on Applied System Innovation (ICASI).
[16] William Nick Street,et al. Generalized Inverse Classification , 2016, SDM.
[17] William Nick Street,et al. A Budget-Constrained Inverse Classification Framework for Smooth Classifiers , 2016, 2017 IEEE International Conference on Data Mining Workshops (ICDMW).
[18] Svetha Venkatesh,et al. Extracting Key Challenges in Achieving Sobriety Through Shared Subspace Learning , 2016, ADMA.
[19] Svetha Venkatesh,et al. Understanding Behavioral Differences Between Short and Long-Term Drinking Abstainers from Social Media , 2016, ADMA.
[20] Andreas Wespi,et al. Security 360°: Enterprise security for the cognitive era , 2016, IBM J. Res. Dev..
[21] Neil D. Lawrence,et al. Differentially Private Gaussian Processes , 2016, ArXiv.
[22] Tarun Kumar,et al. Asset health management using predictive and prescriptive analytics for the electric power grid , 2016, IBM J. Res. Dev..
[23] Nando de Freitas,et al. Taking the Human Out of the Loop: A Review of Bayesian Optimization , 2016, Proceedings of the IEEE.
[24] Svetha Venkatesh,et al. Differentially Private Random Forest with High Utility , 2015, 2015 IEEE International Conference on Data Mining.
[25] Sungho Shin,et al. Design of Marketing Scenario Planning Based on Business Big Data Analysis , 2015, HCI.
[26] Roman Garnett,et al. Differentially Private Bayesian Optimization , 2015, ICML.
[27] Claudius Steinhardt,et al. Model-based decision support for optimal brochure pricing: applying advanced analytics in the tour operating industry , 2014, OR Spectr..
[28] Bernhard Mitschang,et al. Prescriptive Analytics for Recommendation-Based Business Process Optimization , 2014, BIS.
[29] Jasper Snoek,et al. Bayesian Optimization with Unknown Constraints , 2014, UAI.
[30] Myunggwon Hwang,et al. Research Advising System Based on Prescriptive Analytics , 2014 .
[31] Anand D. Sarwate,et al. Stochastic gradient descent with differentially private updates , 2013, 2013 IEEE Global Conference on Signal and Information Processing.
[32] Chih-Lin Chi,et al. Individualized Patient-centered Lifestyle Recommendations: an Expert System for Communicating Patient Specific Cardiovascular Risk Information and Prioritizing Lifestyle Options , 2022 .
[33] Chen Yang,et al. 10-year CVD risk prediction and minimization via InverseClassification , 2012, IHI '12.
[34] Ling Huang,et al. Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning , 2009, J. Priv. Confidentiality.
[35] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[36] Anand D. Sarwate,et al. Differentially Private Empirical Risk Minimization , 2009, J. Mach. Learn. Res..
[37] Nando de Freitas,et al. A Tutorial on Bayesian Optimization of Expensive Cost Functions, with Application to Active User Modeling and Hierarchical Reinforcement Learning , 2010, ArXiv.
[38] Assaf Schuster,et al. Data mining with differential privacy , 2010, KDD.
[39] Charu C. Aggarwal,et al. The Inverse Classification Problem , 2010, Journal of Computer Science and Technology.
[40] Andreas Krause,et al. Information-Theoretic Regret Bounds for Gaussian Process Optimization in the Bandit Setting , 2009, IEEE Transactions on Information Theory.
[41] Ling Liu,et al. Encyclopedia of Database Systems , 2009, Encyclopedia of Database Systems.
[42] Aaron Roth,et al. Differentially Private Approximation Algorithms , 2009, ArXiv.
[43] Kamalika Chaudhuri,et al. Privacy-preserving logistic regression , 2008, NIPS.
[44] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[45] Adam D. Smith,et al. Composition attacks and auxiliary information in data privacy , 2008, KDD.
[46] Daniel A. Spielman,et al. Spectral Graph Theory and its Applications , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[47] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[48] Cynthia Dwork,et al. Privacy, accuracy, and consistency too: a holistic solution to contingency table release , 2007, PODS.
[49] Kamalika Chaudhuri,et al. When Random Sampling Preserves Privacy , 2006, CRYPTO.
[50] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[51] T. Davenport. Competing on analytics. , 2006, Harvard business review.
[52] Cynthia Dwork,et al. Privacy-Preserving Datamining on Vertically Partitioned Databases , 2004, CRYPTO.
[53] Irit Dinur,et al. Revealing information while preserving privacy , 2003, PODS.
[54] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[55] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[56] R. Tibshirani. Regression Shrinkage and Selection via the Lasso , 1996 .
[57] Jonas Mockus,et al. Application of Bayesian approach to numerical methods of global and stochastic optimization , 1994, J. Glob. Optim..
[58] Henryk Wozniakowski,et al. The statistical security of a statistical database , 1984, TODS.
[59] Gultekin Özsoyoglu,et al. Auditing and Inference Control in Statistical Databases , 1982, IEEE Transactions on Software Engineering.
[60] Jonas Mockus,et al. On Bayesian Methods for Seeking the Extremum and their Application , 1977, IFIP Congress.
[61] Jonas Mockus,et al. On Bayesian Methods for Seeking the Extremum , 1974, Optimization Techniques.
[62] W. R. Thompson. ON THE LIKELIHOOD THAT ONE UNKNOWN PROBABILITY EXCEEDS ANOTHER IN VIEW OF THE EVIDENCE OF TWO SAMPLES , 1933 .