In this work we analyze the sample complexity of classification by differentially private algorithms. Differential privacy is a strong and well-studied notion of privacy introduced by Dwork et al. [2006] that ensures that the output of an algorithm leaks little information about the data point provided by any of the participating individuals. Sample complexity of private PAC and agnostic learning was studied in a number of prior works starting with [Kasiviswanathan et al., 2011] but a number of basic questions still remain open [Beimel et al., 2010, Chaudhuri and Hsu, 2011, Beimel et al., 2013a,b]. Our main contribution is an equivalence between the sample complexity of differentially-private learn-ing of a concept class C (or SCDP(C)) and ...
In this paper, we study the problem of differen-tially private risk minimization where the goal is t...
In the context of assessing the generalization abilities of a randomized model or learning algorithm...
An order-revealing encryption scheme gives a public procedure by which two ciphertexts can be compar...
This work studies the problem of privacy-preserving classification – namely, learning a classifier f...
In this thesis, we study when algorithmic tasks can be performed on sensitive data while protecting ...
We prove new upper and lower bounds on the sample complexity of (ε, δ) differentially private algori...
<p>We consider the problem of PAC-learning from distributed data and analyze fundamental communicati...
We show a generic reduction from multiclass differentially private PAC learning to binary private PA...
We study two basic statistical tasks in non-interactive local differential privacy (LDP): learning a...
Learning problems form an important category of computational tasks that generalizes many of the com...
A recent line of work has shown a qualitative equivalence between differentially private PAC learnin...
In this paper, we study the problem of PAC learning halfspaces in the non-interactive local differen...
In a variety of PAC learning models, a tradeo between time and information seems to exist: with unl...
In this paper we deal with the problem of improving the recent milestone results on the estimation o...
Prior work on differential privacy analysis of randomized SGD algorithms relies on composition theor...
In this paper, we study the problem of differen-tially private risk minimization where the goal is t...
In the context of assessing the generalization abilities of a randomized model or learning algorithm...
An order-revealing encryption scheme gives a public procedure by which two ciphertexts can be compar...
This work studies the problem of privacy-preserving classification – namely, learning a classifier f...
In this thesis, we study when algorithmic tasks can be performed on sensitive data while protecting ...
We prove new upper and lower bounds on the sample complexity of (ε, δ) differentially private algori...
<p>We consider the problem of PAC-learning from distributed data and analyze fundamental communicati...
We show a generic reduction from multiclass differentially private PAC learning to binary private PA...
We study two basic statistical tasks in non-interactive local differential privacy (LDP): learning a...
Learning problems form an important category of computational tasks that generalizes many of the com...
A recent line of work has shown a qualitative equivalence between differentially private PAC learnin...
In this paper, we study the problem of PAC learning halfspaces in the non-interactive local differen...
In a variety of PAC learning models, a tradeo between time and information seems to exist: with unl...
In this paper we deal with the problem of improving the recent milestone results on the estimation o...
Prior work on differential privacy analysis of randomized SGD algorithms relies on composition theor...
In this paper, we study the problem of differen-tially private risk minimization where the goal is t...
In the context of assessing the generalization abilities of a randomized model or learning algorithm...
An order-revealing encryption scheme gives a public procedure by which two ciphertexts can be compar...