Kunal Talwar
Kunal Talwar
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
{TensorFlow}: a system for {Large-Scale} machine learning
M Abadi, P Barham, J Chen, Z Chen, A Davis, J Dean, M Devin, ...
12th USENIX symposium on operating systems design and implementation (OSDI …, 2016
Deep learning with differential privacy
M Abadi, A Chu, I Goodfellow, HB McMahan, I Mironov, K Talwar, L Zhang
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
Mechanism design via differential privacy
F McSherry, K Talwar
48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), 94-103, 2007
Learning differentially private recurrent language models
HB McMahan, D Ramage, K Talwar, L Zhang
arXiv preprint arXiv:1710.06963, 2017
Quincy: fair scheduling for distributed computing clusters
M Isard, V Prabhakaran, J Currey, U Wieder, K Talwar, A Goldberg
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
Semi-supervised knowledge transfer for deep learning from private training data
N Papernot, M Abadi, U Erlingsson, I Goodfellow, K Talwar
arXiv preprint arXiv:1610.05755, 2016
A tight bound on approximating arbitrary metrics by tree metrics
J Fakcharoenphol, S Rao, K Talwar
Proceedings of the thirty-fifth annual ACM symposium on Theory of computing …, 2003
The complexity of pure Nash equilibria
A Fabrikant, C Papadimitriou, K Talwar
Proceedings of the thirty-sixth annual ACM symposium on Theory of computing …, 2004
Adversarially robust generalization requires more data
L Schmidt, S Santurkar, D Tsipras, K Talwar, A Madry
Advances in neural information processing systems 31, 2018
TensorFlow: Large-scale machine learning on heterogeneous systems, software available from tensorflow. org (2015)
M Abadi, A Agarwal, P Barham, E Brevdo, Z Chen, C Citro, GS Corrado, ...
URL https://www. tensorflow. org, 2015
Scalable private learning with pate
N Papernot, S Song, I Mironov, A Raghunathan, K Talwar, Ú Erlingsson
arXiv preprint arXiv:1802.08908, 2018
Detecting format string vulnerabilities with type qualifiers
U Shankar, K Talwar, JS Foster, D Wagner
10th USENIX Security Symposium (USENIX Security 01), 2001
Privacy, accuracy, and consistency too: a holistic solution to contingency table release
B Barak, K Chaudhuri, C Dwork, S Kale, F McSherry, K Talwar
Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on …, 2007
On the geometry of differential privacy
M Hardt, K Talwar
Proceedings of the forty-second ACM symposium on Theory of computing, 705-714, 2010
Amplification by shuffling: From local to central differential privacy via anonymity
Ú Erlingsson, V Feldman, I Mironov, A Raghunathan, K Talwar, ...
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete …, 2019
TensorFlow: large-scale machine learning on heterogeneous distributed systems. 2015
M Abadi, A Agarwal, P Barham, E Brevdo, Z Chen, C Citro, GS Corrado, ...
URL http://download. tensorflow. org/paper/whitepaper2015. pdf, 12, 2015
Analyze gauss: optimal bounds for privacy-preserving principal component analysis
C Dwork, K Talwar, A Thakurta, L Zhang
Proceedings of the forty-sixth annual ACM symposium on Theory of computing …, 2014
An approximate truthful mechanism for combinatorial auctions with single parameter agents
A Archer, C Papadimitriou, K Talwar, É Tardos
Internet Mathematics 1 (2), 129-150, 2004
Differentially private combinatorial optimization
A Gupta, K Ligett, F McSherry, A Roth, K Talwar
Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete …, 2010
Heuristics for vector bin packing
R Panigrahy, K Talwar, L Uyeda, U Wieder
research. microsoft. com, 2011
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20