In this paper, we study the Empirical Risk Minimization (ERM) problem in the non-interactive Local Differential Privacy (LDP) model. Previous research on this problem (Smith et al., 2017) indicates that the sample complexity, to achieve error , needs to be exponentially depending on the dimensionality p for general loss functions. In this paper, we make two attempts to resolve this issue by investigating conditions on the loss functions that allow us to remove such a limit. In our first attempt, we show that if the loss function is (∞, T)-smooth, by using the Bernstein polynomial approximation we can avoid the exponential dependency in the term of . We then propose player-efficient algorithms with 1-bit communication complexity and ...
We prove new upper and lower bounds on the sample complexity of (ε, δ) differentially private algori...
In this paper, we study the problem of PAC learning halfspaces in the non-interactive local differen...
In this thesis, we study when algorithmic tasks can be performed on sensitive data while protecting ...
In this paper, we initiate a systematic investigation of differentially private algorithms for conve...
Local differential privacy (LDP) is a model where users send privatized data to an untrusted central...
In this paper, we study the problem of differen-tially private risk minimization where the goal is t...
This paper studies the problem of federated learning (FL) in the absence of a trustworthy server/cli...
We study two basic statistical tasks in non-interactive local differential privacy (LDP): learning a...
Differential privacy is concerned about the prediction quality while measuring the privacy impact on...
In this paper, we study private optimization problems for non-smooth convex functions $F(x)=\mathbb{...
We study the optimal sample complexity of a given workload of linear queries under the constraints o...
Motivated by the increasing concern about privacy in nowadays data-intensive online learning systems...
In this paper, we study the Differentially Private Empirical Risk Minimization (DP-ERM) problem with...
A central challenge in differential privacy is to design computationally efficient non-interactive a...
Differential privacy is the now de facto industry standard for ensuring privacy while publicly relea...
We prove new upper and lower bounds on the sample complexity of (ε, δ) differentially private algori...
In this paper, we study the problem of PAC learning halfspaces in the non-interactive local differen...
In this thesis, we study when algorithmic tasks can be performed on sensitive data while protecting ...
In this paper, we initiate a systematic investigation of differentially private algorithms for conve...
Local differential privacy (LDP) is a model where users send privatized data to an untrusted central...
In this paper, we study the problem of differen-tially private risk minimization where the goal is t...
This paper studies the problem of federated learning (FL) in the absence of a trustworthy server/cli...
We study two basic statistical tasks in non-interactive local differential privacy (LDP): learning a...
Differential privacy is concerned about the prediction quality while measuring the privacy impact on...
In this paper, we study private optimization problems for non-smooth convex functions $F(x)=\mathbb{...
We study the optimal sample complexity of a given workload of linear queries under the constraints o...
Motivated by the increasing concern about privacy in nowadays data-intensive online learning systems...
In this paper, we study the Differentially Private Empirical Risk Minimization (DP-ERM) problem with...
A central challenge in differential privacy is to design computationally efficient non-interactive a...
Differential privacy is the now de facto industry standard for ensuring privacy while publicly relea...
We prove new upper and lower bounds on the sample complexity of (ε, δ) differentially private algori...
In this paper, we study the problem of PAC learning halfspaces in the non-interactive local differen...
In this thesis, we study when algorithmic tasks can be performed on sensitive data while protecting ...