In this paper we consider the setting where machine learning models are
...
In this work, we consider a sequence of stochastic optimization problems...
A new measure of information leakage for quantum encoding of classical d...
A novel definition for data privacy in quantum computing based on quantu...
Stochastic programs where the uncertainty distribution must be inferred ...
We consider safety in simultaneous learning and control of discrete-time...
In this paper, preys with stochastic evasion policies are considered. Th...
It is known that for a discrete channel with correlated additive noise, ...
Lack of trust between organisations and privacy concerns about their dat...
In many learning based control methodologies, learning the unknown dynam...
This paper considers the problem of publishing data X while protecting
c...
We use disparate impact, i.e., the extent that the probability of observ...
We use gradient sparsification to reduce the adverse effect of different...
The newly emerged machine learning (e.g. deep learning) methods have bec...
We consider private function evaluation to provide query responses based...
Local differential privacy has become the gold-standard of privacy liter...
Linear queries can be submitted to a server containing private data. The...
We consider machine learning, particularly regression, using
locally-dif...
Distributionally-robust optimization is often studied for a fixed set of...
It is known that for a discrete channel with correlated additive noise, ...
We propose an operational measure of information leakage in a non-stocha...
We investigate bounded state estimation of linear systems over finite-st...
We consider training machine learning models using Training data located...
Machine Learning (ML) techniques are used by most data-driven organisati...
We use distributionally-robust optimization for machine learning to miti...
Machine learning models have been shown to be vulnerable to membership
i...
We consider the problem of publicly releasing a dataset for support vect...
We consider a non-stochastic privacy-preserving problem in which an adve...
In this paper, we define noiseless privacy, as a non-stochastic rival to...
We prove that the expected estimation error of non-intrusive load monito...
For evolving datasets with continual reports, the composition rule for
d...
Privacy is under threat from artificial intelligence revolution fueled b...
In this paper, we define discounted differential privacy, as an alternat...
In this paper, we employ a game-theoretic model to analyze the interacti...
In this paper, we apply machine learning to distributed private data own...
In this paper, we consider privacy against hypothesis testing adversarie...
This paper is about an encryption based approach to the secure implement...
Worst-case models of erasure and symmetric channels are investigated, in...
This paper presents a secure and private implementation of linear
time-i...
A non-stochastic privacy metric using non-stochastic information theory ...
The problem of preserving the privacy of individual entries of a databas...