Mitigating Bias in Adaptive Data Gathering via Differential Privacy
暂无分享,去创建一个
Seth Neel | Aaron Roth | Aaron Roth | S. Neel
[1] Xinkun Nie,et al. Why adaptively collected data have negative bias and how to correct for it , 2017, AISTATS.
[2] Aaron Roth,et al. Adaptive Learning with Robust Generalization Guarantees , 2016, COLT.
[3] Thomas Steinke,et al. Calibrating Noise to Variance in Adaptive Data Analysis , 2017, COLT.
[4] Sébastien Bubeck,et al. Regret Analysis of Stochastic and Nonstochastic Multi-armed Bandit Problems , 2012, Found. Trends Mach. Learn..
[5] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2016, J. Priv. Confidentiality.
[6] T. L. Lai Andherbertrobbins. Asymptotically Efficient Adaptive Allocation Rules , 2022 .
[7] R. Agrawal. Sample mean based index policies by O(log n) regret for the multi-armed bandit problem , 1995, Advances in Applied Probability.
[8] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[9] Jonathan Ullman,et al. Preventing False Discovery in Interactive Data Analysis Is Hard , 2014, 2014 IEEE 55th Annual Symposium on Foundations of Computer Science.
[10] Nikita Mishra,et al. Private Stochastic Multi-arm Bandits: From Theory to Practice , 2014 .
[11] Toniann Pitassi,et al. Preserving Statistical Validity in Adaptive Data Analysis , 2014, STOC.
[12] Avrim Blum,et al. The Ladder: A Reliable Leaderboard for Machine Learning Competitions , 2015, ICML.
[13] Wei Chu,et al. Contextual Bandits with Linear Payoff Functions , 2011, AISTATS.
[14] Jean-Yves Audibert,et al. Minimax Policies for Adversarial and Stochastic Bandits. , 2009, COLT 2009.
[15] Vasilis Syrgkanis,et al. Accurate Inference for Adaptive Linear Models , 2017, ICML.
[16] Aaron Roth,et al. Max-Information, Differential Privacy, and Post-selection Hypothesis Testing , 2016, 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS).
[17] Nikita Mishra,et al. (Nearly) Optimal Differentially Private Stochastic Multi-Arm Bandits , 2015, UAI.
[18] Christos Dimitrakakis,et al. Achieving Privacy in the Adversarial Multi-Armed Bandit , 2017, AAAI.
[19] Elaine Shi,et al. Private and Continual Release of Statistics , 2010, TSEC.
[20] Thomas Steinke,et al. Generalization for Adaptively-chosen Estimators via Stable Median , 2017, COLT.
[21] Toniann Pitassi,et al. The reusable holdout: Preserving validity in adaptive data analysis , 2015, Science.
[22] Jack Bowden,et al. Multi-armed Bandit Models for the Optimal Design of Clinical Trials: Benefits and Challenges. , 2015, Statistical science : a review journal of the Institute of Mathematical Statistics.
[23] Stephen E. Fienberg,et al. A Minimax Theory for Adaptive Data Analysis , 2016, ArXiv.
[24] James Zou,et al. Controlling Bias in Adaptive Data Analysis Using Information Theory , 2015, AISTATS.
[25] Raef Bassily,et al. Algorithmic stability for adaptive data analysis , 2015, STOC.
[26] Toniann Pitassi,et al. Generalization in Adaptive Data Analysis and Holdout Reuse , 2015, NIPS.
[27] Seth Neel,et al. Fair Algorithms for Infinite and Contextual Bandits , 2016, 1610.09559.
[28] Thomas Steinke,et al. Interactive fingerprinting codes and the hardness of preventing false discovery , 2014, 2016 Information Theory and Applications Workshop (ITA).
[29] Csaba Szepesvári,et al. Improved Algorithms for Linear Stochastic Bandits , 2011, NIPS.
[30] Christos Dimitrakakis,et al. Algorithms for Differentially Private Multi-Armed Bandits , 2015, AAAI.
[31] Susan Athey,et al. Estimation Considerations in Contextual Bandits , 2017, ArXiv.
[32] Wei Chu,et al. A contextual-bandit approach to personalized news article recommendation , 2010, WWW '10.
[33] Peter Auer,et al. Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.
[34] Alessandro Panconesi,et al. Concentration of Measure for the Analysis of Randomized Algorithms , 2009 .
[35] Moni Naor,et al. Differential privacy under continual observation , 2010, STOC '10.