-
1
-
-
84860244324
-
Information-theoretic lower bounds on the oracle complexity of convex optimization
-
A. Agarwal, P. L. Bartlett, P. Ravikumar, and M. J. Wainwright. 2012. Information-theoretic lower bounds on the oracle complexity of convex optimization. IEEE Trans. Inf. Theory 58, 5, 3235-3249.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.5
, pp. 3235-3249
-
-
Agarwal, A.1
Bartlett, P.L.2
Ravikumar, P.3
Wainwright, M.J.4
-
2
-
-
0037403111
-
Mirror descent and nonlinear projected subgradient methods for convex optimization
-
A. Beck and M. Teboulle. 2003. Mirror descent and nonlinear projected subgradient methods for convex optimization. Oper. Res. Lett. 31, 167-175.
-
(2003)
Oper. Res. Lett.
, vol.31
, pp. 167-175
-
-
Beck, A.1
Teboulle, M.2
-
9
-
-
79960972282
-
Risk-utility paradigms for statistical disclosure limitation: How to think, but not how to act
-
L. H. Cox, A. F. Karr, and S. K. Kinney. 2011. Risk-utility paradigms for statistical disclosure limitation: How to think, but not how to act. Int. Stat. Rev. 79, 2, 160-199.
-
(2011)
Int. Stat. Rev.
, vol.79
, Issue.2
, pp. 160-199
-
-
Cox, L.H.1
Karr, A.F.2
Kinney, S.K.3
-
13
-
-
84950825763
-
Disclosure-limited data dissemination
-
G. T. Duncan and D. Lambert. 1986. Disclosure-limited data dissemination. J. Amer. Stat. Assoc. 81, 393, 10-18.
-
(1986)
J. Amer. Stat. Assoc.
, vol.81
, Issue.393
, pp. 10-18
-
-
Duncan, G.T.1
Lambert, D.2
-
15
-
-
70349305273
-
Differential privacy: A survey of results
-
Theory and Applications of Models of Computation, Springer
-
C. Dwork. 2008. Differential privacy: A survey of results. In Theory and Applications of Models of Computation, Lecture Notes in Computer Science Series, vol. 4978, Springer, 1-19.
-
(2008)
Lecture Notes in Computer Science Series
, vol.4978
, pp. 1-19
-
-
Dwork, C.1
-
20
-
-
0002646970
-
On the question of statistical confidentiality
-
I. P. Fellegi. 1972. On the question of statistical confidentiality. J. Amer. Stat. Assoc. 67, 337, 7-18.
-
(1972)
J. Amer. Stat. Assoc.
, vol.67
, Issue.337
, pp. 7-18
-
-
Fellegi, I.P.1
-
28
-
-
33747456679
-
A framework for evaluating the utility of data altered to protect confidentiality
-
A. F. Karr, C. N. Kohnen, A. Oganian, J. P. Reiter, and A. P. Sanil. 2006. A framework for evaluating the utility of data altered to protect confidentiality. Amer. Statistician 60, 3, 224-232.
-
(2006)
Amer. Statistician
, vol.60
, Issue.3
, pp. 224-232
-
-
Karr, A.F.1
Kohnen, C.N.2
Oganian, A.3
Reiter, J.P.4
Sanil, A.P.5
-
29
-
-
79960379430
-
What can we learn privately?
-
S. P. Kasiviswanathan, H. K. Lee, K. Nissim, S. Raskhodnikova, and A. Smith. 2011. What can we learn privately? SIAM J. Comput. 40, 3, 793-826.
-
(2011)
SIAM J. Comput.
, vol.40
, Issue.3
, pp. 793-826
-
-
Kasiviswanathan, S.P.1
Lee, H.K.2
Nissim, K.3
Raskhodnikova, S.4
Smith, A.5
-
31
-
-
0032202014
-
Efficient noise-tolerant learning from statistical queries
-
M. Kearns. 1998. Efficient noise-tolerant learning from statistical queries. J. ACM 45, 6, 983-1006.
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 983-1006
-
-
Kearns, M.1
-
33
-
-
0001786903
-
Convergence of estimates under dimensionality restrictions
-
L. Le Cam. 1973. Convergence of estimates under dimensionality restrictions. Ann. Stat. 1, 1, 38-53.
-
(1973)
Ann. Stat.
, vol.1
, Issue.1
, pp. 38-53
-
-
Le Cam, L.1
-
34
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. V. Poor, and S. Shamai. 2008. Information theoretic security. Found. Trends Commun. Inf. Theory 5, 4, 355-580.
-
(2008)
Found. Trends Commun. Inf. Theory
, vol.5
, Issue.4
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
35
-
-
0000740544
-
Uniqueness of solution in linear programming
-
O. L. Mangasarian. 1979. Uniqueness of solution in linear programming. Linear Algebra Appl. 25, 151-162.
-
(1979)
Linear Algebra Appl.
, vol.25
, pp. 151-162
-
-
Mangasarian, O.L.1
-
36
-
-
70450197241
-
Robust stochastic approximation approach to stochastic programming
-
A. Nemirovski, A. Juditsky, G. Lan, and A. Shapiro. 2009. Robust stochastic approximation approach to stochastic programming. SIAM J. Optimiz. 19, 4, 1574-1609.
-
(2009)
SIAM J. Optimiz.
, vol.19
, Issue.4
, pp. 1574-1609
-
-
Nemirovski, A.1
Juditsky, A.2
Lan, G.3
Shapiro, A.4
-
40
-
-
0026899240
-
Acceleration of stochastic approximation by averaging
-
B. T. Polyak and A. B. Juditsky. 1992. Acceleration of stochastic approximation by averaging. SIAM J. Cont. Optimiz. 30, 4, 838-855.
-
(1992)
SIAM J. Cont. Optimiz.
, vol.30
, Issue.4
, pp. 838-855
-
-
Polyak, B.T.1
Juditsky, A.B.2
-
41
-
-
29144432870
-
Estimating risks of identification disclosure in microdata
-
J. P. Reiter. 2005. Estimating risks of identification disclosure in microdata. J. Amer. Stat. Assoc. 100, 1103-1113.
-
(2005)
J. Amer. Stat. Assoc.
, vol.100
, pp. 1103-1113
-
-
Reiter, J.P.1
-
42
-
-
84877781092
-
Learning in a large function space: Privacypreserving mechanisms for SVM learning
-
B. I. P. Rubinstein, P. L. Bartlett, L. Huang, and N. Taft. 2012. Learning in a large function space: privacypreserving mechanisms for SVM learning. J. Priv. Confident. 4, 1, 65-100.
-
(2012)
J. Priv. Confident.
, vol.4
, Issue.1
, pp. 65-100
-
-
Rubinstein, B.I.P.1
Bartlett, P.L.2
Huang, L.3
Taft, N.4
-
43
-
-
79952434371
-
An information-theoretic approach to privacy
-
L. Sankar, S. R. Rajagopalan, and H. V. Poor. 2010. An information-theoretic approach to privacy. In Proceedings of the 48th Allerton Conference on Communication, Control, and Computing. 1220-1227.
-
(2010)
Proceedings of the 48th Allerton Conference on Communication, Control, and Computing
, pp. 1220-1227
-
-
Sankar, L.1
Rajagopalan, S.R.2
Poor, H.V.3
-
46
-
-
0001571745
-
Contributions to the theory of statistical estimation and testing hypotheses
-
A. Wald. 1939. Contributions to the theory of statistical estimation and testing hypotheses. Ann. Math. Stat. 10, 4, 299-326.
-
(1939)
Ann. Math. Stat.
, vol.10
, Issue.4
, pp. 299-326
-
-
Wald, A.1
-
47
-
-
0013776710
-
Randomized response: A survey technique for eliminating evasive answer bias
-
S. Warner. 1965. Randomized response: A survey technique for eliminating evasive answer bias. J. Amer. Stat. Assoc. 60, 309, 63-69.
-
(1965)
J. Amer. Stat. Assoc.
, vol.60
, Issue.309
, pp. 63-69
-
-
Warner, S.1
-
48
-
-
77952555772
-
A statistical framework for differential privacy
-
L. Wasserman and S. Zhou. 2010. A statistical framework for differential privacy. J. Amer. Stat. Assoc. 105, 489, 375-389.
-
(2010)
J. Amer. Stat. Assoc.
, vol.105
, Issue.489
, pp. 375-389
-
-
Wasserman, L.1
Zhou, S.2
-
49
-
-
0033233737
-
Information-theoretic determination of minimax rates of convergence
-
Y. Yang and A. Barron. 1999. Information-theoretic determination of minimax rates of convergence. Ann. Statics 27, 5, 1564-1599.
-
(1999)
Ann. Statics
, vol.27
, Issue.5
, pp. 1564-1599
-
-
Yang, Y.1
Barron, A.2
-
50
-
-
17644388356
-
Assouad, Fano, and Le Cam
-
Springer-Verlag
-
B. Yu. 1997. Assouad, Fano, and Le Cam. In Festschrift for Lucien Le Cam. Springer-Verlag, 423-435.
-
(1997)
Festschrift for Lucien Le Cam
, pp. 423-435
-
-
Yu, B.1
-
51
-
-
61349111475
-
Compressed regression
-
S. Zhou, J. Lafferty, and L. Wasserman. 2009a. Compressed regression. IEEE Trans. Inf. Theory 55, 2, 846-866.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.2
, pp. 846-866
-
-
Zhou, S.1
Lafferty, J.2
Wasserman, L.3
|