Follow
Kunal Talwar
Kunal Talwar
Verified email at apple.com - Homepage
Title
Cited by
Cited by
Year
{TensorFlow}: A System for {Large-Scale} Machine Learning
M Abadi, P Barham, J Chen, Z Chen, A Davis, J Dean, M Devin, ...
12th USENIX symposium on operating systems design and implementation (OSDI …, 2016
38001*2016
Deep learning with differential privacy
M Abadi, A Chu, I Goodfellow, HB McMahan, I Mironov, K Talwar, L Zhang
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
29122016
Mechanism design via differential privacy
F McSherry, K Talwar
48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), 94-103, 2007
21802007
Quincy: fair scheduling for distributed computing clusters
M Isard, V Prabhakaran, J Currey, U Wieder, K Talwar, A Goldberg
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
11292009
A tight bound on approximating arbitrary metrics by tree metrics
J Fakcharoenphol, S Rao, K Talwar
Journal of Computer and System Sciences 69 (3), 485-497, 2004
9312004
The complexity of pure Nash equilibria
A Fabrikant, C Papadimitriou, K Talwar
Proceedings of the thirty-sixth annual ACM symposium on Theory of computing …, 2004
7942004
Learning differentially private recurrent language models
HB McMahan, D Ramage, K Talwar, L Zhang
arXiv preprint arXiv:1710.06963, 2017
687*2017
Semi-supervised knowledge transfer for deep learning from private training data
N Papernot, M Abadi, U Erlingsson, I Goodfellow, K Talwar
arXiv preprint arXiv:1610.05755, 2016
6562016
Tensorflow: Large-scale machine learning on heterogeneous distributed systems. arXiv 2016
M Abadi, A Agarwal, P Barham, E Brevdo, Z Chen, C Citro, GS Corrado, ...
arXiv preprint arXiv:1603.04467, 2019
6212019
Detecting format string vulnerabilities with type qualifiers
U Shankar, K Talwar, JS Foster, D Wagner
10th USENIX Security Symposium (USENIX Security 01), 2001
6012001
Privacy, accuracy, and consistency too: a holistic solution to contingency table release
B Barak, K Chaudhuri, C Dwork, S Kale, F McSherry, K Talwar
Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on …, 2007
5242007
Adversarially robust generalization requires more data
L Schmidt, S Santurkar, D Tsipras, K Talwar, A Madry
Advances in neural information processing systems 31, 2018
4992018
On the geometry of differential privacy
M Hardt, K Talwar
Proceedings of the forty-second ACM symposium on Theory of computing, 705-714, 2010
3712010
Scalable private learning with pate
N Papernot, S Song, I Mironov, A Raghunathan, K Talwar, Ú Erlingsson
arXiv preprint arXiv:1802.08908, 2018
3652018
An approximate truthful mechanism for combinatorial auctions with single parameter agents
A Archer, C Papadimitriou, K Talwar, É Tardos
Internet Mathematics 1 (2), 129-150, 2004
2992004
Analyze gauss: optimal bounds for privacy-preserving principal component analysis
C Dwork, K Talwar, A Thakurta, L Zhang
Proceedings of the forty-sixth annual ACM symposium on Theory of computing …, 2014
2252014
Heuristics for vector bin packing
R Panigrahy, K Talwar, L Uyeda, U Wieder
research. microsoft. com, 2011
2232011
Differentially private combinatorial optimization
A Gupta, K Ligett, F McSherry, A Roth, K Talwar
Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete …, 2010
219*2010
Amplification by shuffling: From local to central differential privacy via anonymity
Ú Erlingsson, V Feldman, I Mironov, A Raghunathan, K Talwar, ...
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete …, 2019
2172019
Bypassing the embedding: algorithms for low dimensional metrics
K Talwar
Proceedings of the thirty-sixth annual ACM symposium on Theory of computing …, 2004
2152004
The system can't perform the operation now. Try again later.
Articles 1–20