Alert button
Picture for Justin Whitehouse

Justin Whitehouse

Alert button

Improved Self-Normalized Concentration in Hilbert Spaces: Sublinear Regret for GP-UCB

Add code
Bookmark button
Alert button
Jul 14, 2023
Justin Whitehouse, Zhiwei Steven Wu, Aaditya Ramdas

Viaarxiv icon

Adaptive Principal Component Regression with Applications to Panel Data

Add code
Bookmark button
Alert button
Jul 03, 2023
Anish Agarwal, Keegan Harris, Justin Whitehouse, Zhiwei Steven Wu

Viaarxiv icon

Brownian Noise Reduction: Maximizing Privacy Subject to Accuracy Constraints

Add code
Bookmark button
Alert button
Jun 15, 2022
Justin Whitehouse, Zhiwei Steven Wu, Aaditya Ramdas, Ryan Rogers

Figure 1 for Brownian Noise Reduction: Maximizing Privacy Subject to Accuracy Constraints
Figure 2 for Brownian Noise Reduction: Maximizing Privacy Subject to Accuracy Constraints
Figure 3 for Brownian Noise Reduction: Maximizing Privacy Subject to Accuracy Constraints
Figure 4 for Brownian Noise Reduction: Maximizing Privacy Subject to Accuracy Constraints
Viaarxiv icon

Fully Adaptive Composition in Differential Privacy

Add code
Bookmark button
Alert button
Mar 10, 2022
Justin Whitehouse, Aaditya Ramdas, Ryan Rogers, Zhiwei Steven Wu

Figure 1 for Fully Adaptive Composition in Differential Privacy
Figure 2 for Fully Adaptive Composition in Differential Privacy
Figure 3 for Fully Adaptive Composition in Differential Privacy
Viaarxiv icon

Efficient Formal Safety Analysis of Neural Networks

Add code
Bookmark button
Alert button
Oct 26, 2018
Shiqi Wang, Kexin Pei, Justin Whitehouse, Junfeng Yang, Suman Jana

Figure 1 for Efficient Formal Safety Analysis of Neural Networks
Figure 2 for Efficient Formal Safety Analysis of Neural Networks
Figure 3 for Efficient Formal Safety Analysis of Neural Networks
Figure 4 for Efficient Formal Safety Analysis of Neural Networks
Viaarxiv icon

Formal Security Analysis of Neural Networks using Symbolic Intervals

Add code
Bookmark button
Alert button
Jul 01, 2018
Shiqi Wang, Kexin Pei, Justin Whitehouse, Junfeng Yang, Suman Jana

Figure 1 for Formal Security Analysis of Neural Networks using Symbolic Intervals
Figure 2 for Formal Security Analysis of Neural Networks using Symbolic Intervals
Figure 3 for Formal Security Analysis of Neural Networks using Symbolic Intervals
Figure 4 for Formal Security Analysis of Neural Networks using Symbolic Intervals
Viaarxiv icon