Kunal Talwar
Kunal Talwar
Verified email at kunaltalwar.org - Homepage
Cited by
Cited by
Tensorflow: A system for large-scale machine learning
M Abadi, P Barham, J Chen, Z Chen, A Davis, J Dean, M Devin, ...
12th {USENIX} symposium on operating systems design and implementation …, 2016
Deep learning with differential privacy
M Abadi, A Chu, I Goodfellow, HB McMahan, I Mironov, K Talwar, L Zhang
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
Mechanism design via differential privacy
F McSherry, K Talwar
48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), 94-103, 2007
Quincy: fair scheduling for distributed computing clusters
M Isard, V Prabhakaran, J Currey, U Wieder, K Talwar, A Goldberg
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
A tight bound on approximating arbitrary metrics by tree metrics
J Fakcharoenphol, S Rao, K Talwar
Journal of Computer and System Sciences 69 (3), 485-497, 2004
The complexity of pure Nash equilibria
A Fabrikant, C Papadimitriou, K Talwar
Proceedings of the thirty-sixth annual ACM symposium on Theory of computing …, 2004
Detecting format string vulnerabilities with type qualifiers.
U Shankar, K Talwar, JS Foster, DA Wagner
USENIX Security Symposium, 201-220, 2001
Semi-supervised knowledge transfer for deep learning from private training data
N Papernot, M Abadi, U Erlingsson, I Goodfellow, K Talwar
arXiv preprint arXiv:1610.05755, 2016
Learning differentially private recurrent language models
HB McMahan, D Ramage, K Talwar, L Zhang
arXiv preprint arXiv:1710.06963, 2017
Privacy, accuracy, and consistency too: a holistic solution to contingency table release
B Barak, K Chaudhuri, C Dwork, S Kale, F McSherry, K Talwar
Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on …, 2007
Adversarially robust generalization requires more data
L Schmidt, S Santurkar, D Tsipras, K Talwar, A Mądry
arXiv preprint arXiv:1804.11285, 2018
On the geometry of differential privacy
M Hardt, K Talwar
Proceedings of the forty-second ACM symposium on Theory of computing, 705-714, 2010
Scalable private learning with pate
N Papernot, S Song, I Mironov, A Raghunathan, K Talwar, Ú Erlingsson
arXiv preprint arXiv:1802.08908, 2018
An approximate truthful mechanism for combinatorial auctions with single parameter agents
A Archer, C Papadimitriou, K Talwar, É Tardos
Internet Mathematics 1 (2), 129-150, 2004
Tensorflow: Large-scale machine learning on heterogeneous distributed systems. arXiv 2016
M Abadi, A Agarwal, P Barham, E Brevdo, Z Chen, C Citro, GS Corrado, ...
arXiv preprint arXiv:1603.04467, 2019
Analyze gauss: optimal bounds for privacy-preserving principal component analysis
C Dwork, K Talwar, A Thakurta, L Zhang
Proceedings of the forty-sixth annual ACM symposium on Theory of computing …, 2014
Bypassing the embedding: algorithms for low dimensional metrics
K Talwar
Proceedings of the thirty-sixth annual ACM symposium on Theory of computing …, 2004
Heuristics for vector bin packing
R Panigrahy, K Talwar, L Uyeda, U Wieder
research. microsoft. com, 2011
The price of privacy and the limits of LP decoding
C Dwork, F McSherry, K Talwar
Proceedings of the thirty-ninth annual ACM Symposium on Theory of Computing …, 2007
Differentially private combinatorial optimization
A Gupta, K Ligett, F McSherry, A Roth, K Talwar
Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete …, 2010
The system can't perform the operation now. Try again later.
Articles 1–20