Picture for Justin Whitehouse

Justin Whitehouse

Inference on Optimal Policy Values and Other Irregular Functionals via Smoothing

Add code
Jul 15, 2025
Viaarxiv icon

Orthogonal Causal Calibration

Add code
Jun 04, 2024
Viaarxiv icon

Multi-Armed Bandits with Network Interference

Add code
May 28, 2024
Figure 1 for Multi-Armed Bandits with Network Interference
Figure 2 for Multi-Armed Bandits with Network Interference
Viaarxiv icon

Improved Self-Normalized Concentration in Hilbert Spaces: Sublinear Regret for GP-UCB

Add code
Jul 14, 2023
Viaarxiv icon

Adaptive Principal Component Regression with Applications to Panel Data

Add code
Jul 03, 2023
Viaarxiv icon

Brownian Noise Reduction: Maximizing Privacy Subject to Accuracy Constraints

Add code
Jun 15, 2022
Figure 1 for Brownian Noise Reduction: Maximizing Privacy Subject to Accuracy Constraints
Figure 2 for Brownian Noise Reduction: Maximizing Privacy Subject to Accuracy Constraints
Figure 3 for Brownian Noise Reduction: Maximizing Privacy Subject to Accuracy Constraints
Figure 4 for Brownian Noise Reduction: Maximizing Privacy Subject to Accuracy Constraints
Viaarxiv icon

Fully Adaptive Composition in Differential Privacy

Add code
Mar 10, 2022
Figure 1 for Fully Adaptive Composition in Differential Privacy
Figure 2 for Fully Adaptive Composition in Differential Privacy
Figure 3 for Fully Adaptive Composition in Differential Privacy
Viaarxiv icon

Efficient Formal Safety Analysis of Neural Networks

Add code
Oct 26, 2018
Figure 1 for Efficient Formal Safety Analysis of Neural Networks
Figure 2 for Efficient Formal Safety Analysis of Neural Networks
Figure 3 for Efficient Formal Safety Analysis of Neural Networks
Figure 4 for Efficient Formal Safety Analysis of Neural Networks
Viaarxiv icon

Formal Security Analysis of Neural Networks using Symbolic Intervals

Add code
Jul 01, 2018
Figure 1 for Formal Security Analysis of Neural Networks using Symbolic Intervals
Figure 2 for Formal Security Analysis of Neural Networks using Symbolic Intervals
Figure 3 for Formal Security Analysis of Neural Networks using Symbolic Intervals
Figure 4 for Formal Security Analysis of Neural Networks using Symbolic Intervals
Viaarxiv icon