Adversarial attacks pose significant threats to deploying state-of-the-a...
In Semi-Supervised Semi-Private (SP) learning, the learner has access to...
Differential privacy is the de facto standard for protecting privacy in ...
Classical wisdom suggests that estimators should avoid fitting noise to
...
Popular iterative algorithms such as boosting methods and coordinate des...
It is widely believed that given the same labeling budget, active learni...
As machine learning algorithms are deployed on sensitive data in critica...
In safety critical applications, practitioners are reluctant to trust ne...
Good generalization performance on high-dimensional data crucially hinge...
Machine learning classifiers with high test accuracy often perform poorl...
We provide matching upper and lower bounds of order σ^2/log(d/n) for
the...
To successfully tackle challenging manipulation tasks, autonomous agents...
Numerous recent works show that overparameterization implicitly reduces
...
Kernel ridge regression is well-known to achieve minimax optimal rates i...
Machine learning models are often used in practice if they achieve good
...
Adversarial training augments the training set with perturbations to imp...
This work provides theoretical and empirical evidence that
invariance-in...
While adversarial training can improve robust accuracy (against an
adver...
We propose Regularized Learning under Label shifts (RLLS), a principled ...
In the online multiple testing problem, p-values corresponding to differ...
Early stopping of iterative algorithms is a widely-used form of
regulari...
We propose an alternative framework to existing setups for controlling f...
The Hidden Markov Model (HMM) is one of the mainstays of statistical mod...