共 18 条
- [1] Abernethy J. D., 2014, C LEARNING THEORY, P807
- [2] Abernethy Jacob, 2008, P 21 ANN C LEARN THE
- [4] [Anonymous], 2012, COLT
- [5] Auer P, 2003, SIAM J COMPUT, V32, P48, DOI 10.1137/S0097539701398375
- [6] Regret Analysis of Stochastic and Nonstochastic Multi-armed Bandit Problems [J]. FOUNDATIONS AND TRENDS IN MACHINE LEARNING, 2012, 5 (01): : 1 - 122
- [7] Bubeck Sebastien., 2012, COLT, V23, p41.1
- [8] Calibrating noise to sensitivity in private data analysis [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 265 - 284
- [9] Analyze Gauss: Optimal Bounds for Privacy-Preserving Principal Component Analysis [J]. STOC'14: PROCEEDINGS OF THE 46TH ANNUAL 2014 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2014, : 11 - 20
- [10] The Algorithmic Foundations of Differential Privacy [J]. FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2013, 9 (3-4): : 211 - 406