Alert button
Picture for Kamalika Chaudhuri

Kamalika Chaudhuri

Alert button

Forgetting Data from Pre-trained GANs

Jun 29, 2022
Zhifeng Kong, Kamalika Chaudhuri

Figure 1 for Forgetting Data from Pre-trained GANs
Figure 2 for Forgetting Data from Pre-trained GANs
Figure 3 for Forgetting Data from Pre-trained GANs
Figure 4 for Forgetting Data from Pre-trained GANs
Viaarxiv icon

Thompson Sampling for Robust Transfer in Multi-Task Bandits

Jun 17, 2022
Zhi Wang, Chicheng Zhang, Kamalika Chaudhuri

Figure 1 for Thompson Sampling for Robust Transfer in Multi-Task Bandits
Figure 2 for Thompson Sampling for Robust Transfer in Multi-Task Bandits
Figure 3 for Thompson Sampling for Robust Transfer in Multi-Task Bandits
Figure 4 for Thompson Sampling for Robust Transfer in Multi-Task Bandits
Viaarxiv icon

A Learning-Theoretic Framework for Certified Auditing of Machine Learning Models

Jun 09, 2022
Chhavi Yadav, Michal Moshkovitz, Kamalika Chaudhuri

Figure 1 for A Learning-Theoretic Framework for Certified Auditing of Machine Learning Models
Figure 2 for A Learning-Theoretic Framework for Certified Auditing of Machine Learning Models
Figure 3 for A Learning-Theoretic Framework for Certified Auditing of Machine Learning Models
Figure 4 for A Learning-Theoretic Framework for Certified Auditing of Machine Learning Models
Viaarxiv icon

Throwing Away Data Improves Worst-Class Error in Imbalanced Classification

May 23, 2022
Martin Arjovsky, Kamalika Chaudhuri, David Lopez-Paz

Figure 1 for Throwing Away Data Improves Worst-Class Error in Imbalanced Classification
Figure 2 for Throwing Away Data Improves Worst-Class Error in Imbalanced Classification
Figure 3 for Throwing Away Data Improves Worst-Class Error in Imbalanced Classification
Figure 4 for Throwing Away Data Improves Worst-Class Error in Imbalanced Classification
Viaarxiv icon

Sentence-level Privacy for Document Embeddings

May 10, 2022
Casey Meehan, Khalil Mrini, Kamalika Chaudhuri

Figure 1 for Sentence-level Privacy for Document Embeddings
Figure 2 for Sentence-level Privacy for Document Embeddings
Figure 3 for Sentence-level Privacy for Document Embeddings
Figure 4 for Sentence-level Privacy for Document Embeddings
Viaarxiv icon

Privacy-Aware Compression for Federated Data Analysis

Mar 15, 2022
Kamalika Chaudhuri, Chuan Guo, Mike Rabbat

Figure 1 for Privacy-Aware Compression for Federated Data Analysis
Figure 2 for Privacy-Aware Compression for Federated Data Analysis
Figure 3 for Privacy-Aware Compression for Federated Data Analysis
Figure 4 for Privacy-Aware Compression for Federated Data Analysis
Viaarxiv icon

Understanding Rare Spurious Correlations in Neural Networks

Feb 10, 2022
Yao-Yuan Yang, Kamalika Chaudhuri

Figure 1 for Understanding Rare Spurious Correlations in Neural Networks
Figure 2 for Understanding Rare Spurious Correlations in Neural Networks
Figure 3 for Understanding Rare Spurious Correlations in Neural Networks
Figure 4 for Understanding Rare Spurious Correlations in Neural Networks
Viaarxiv icon

Bounding Training Data Reconstruction in Private (Deep) Learning

Jan 28, 2022
Chuan Guo, Brian Karrer, Kamalika Chaudhuri, Laurens van der Maaten

Figure 1 for Bounding Training Data Reconstruction in Private (Deep) Learning
Figure 2 for Bounding Training Data Reconstruction in Private (Deep) Learning
Figure 3 for Bounding Training Data Reconstruction in Private (Deep) Learning
Figure 4 for Bounding Training Data Reconstruction in Private (Deep) Learning
Viaarxiv icon

Privacy Amplification by Subsampling in Time Domain

Jan 13, 2022
Tatsuki Koga, Casey Meehan, Kamalika Chaudhuri

Figure 1 for Privacy Amplification by Subsampling in Time Domain
Figure 2 for Privacy Amplification by Subsampling in Time Domain
Figure 3 for Privacy Amplification by Subsampling in Time Domain
Figure 4 for Privacy Amplification by Subsampling in Time Domain
Viaarxiv icon

Privacy Amplification via Shuffling for Linear Contextual Bandits

Dec 11, 2021
Evrard Garcelon, Kamalika Chaudhuri, Vianney Perchet, Matteo Pirotta

Figure 1 for Privacy Amplification via Shuffling for Linear Contextual Bandits
Figure 2 for Privacy Amplification via Shuffling for Linear Contextual Bandits
Viaarxiv icon