Kunal Talwar
Kunal Talwar
Verified email at kunaltalwar.org - Homepage
Cited by
Cited by
Tensorflow: A system for large-scale machine learning
M Abadi, P Barham, J Chen, Z Chen, A Davis, J Dean, M Devin, ...
12th {USENIX} Symposium on Operating Systems Design and Implementation†…, 2016
TensorFlow: Large-scale machine learning on heterogeneous systems
M Abadi, A Agarwal, P Barham, E Brevdo, Z Chen, C Citro, GS Corrado, ...
Mechanism design via differential privacy
F McSherry, K Talwar
48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), 94-103, 2007
Deep learning with differential privacy
M Abadi, A Chu, I Goodfellow, HB McMahan, I Mironov, K Talwar, L Zhang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications†…, 2016
Quincy: fair scheduling for distributed computing clusters
M Isard, V Prabhakaran, J Currey, U Wieder, K Talwar, A Goldberg
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles†…, 2009
A tight bound on approximating arbitrary metrics by tree metrics
J Fakcharoenphol, S Rao, K Talwar
Journal of Computer and System Sciences 69 (3), 485-497, 2004
The complexity of pure Nash equilibria
A Fabrikant, C Papadimitriou, K Talwar
Proceedings of the thirty-sixth annual ACM symposium on Theory of computing†…, 2004
Detecting format string vulnerabilities with type qualifiers.
U Shankar, K Talwar, JS Foster, DA Wagner
USENIX Security Symposium, 201-220, 2001
Privacy, accuracy, and consistency too: a holistic solution to contingency table release
B Barak, K Chaudhuri, C Dwork, S Kale, F McSherry, K Talwar
Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on†…, 2007
An approximate truthful mechanism for combinatorial auctions with single parameter agents
A Archer, C Papadimitriou, K Talwar, … Tardos
Internet Mathematics 1 (2), 129-150, 2004
Semi-supervised knowledge transfer for deep learning from private training data
N Papernot, M Abadi, U Erlingsson, I Goodfellow, K Talwar
arXiv preprint arXiv:1610.05755, 2016
On the geometry of differential privacy
M Hardt, K Talwar
Proceedings of the forty-second ACM symposium on Theory of computing, 705-714, 2010
Bypassing the embedding: algorithms for low dimensional metrics
K Talwar
Proceedings of the thirty-sixth annual ACM symposium on Theory of computing†…, 2004
The price of privacy and the limits of LP decoding
C Dwork, F McSherry, K Talwar
Proceedings of the thirty-ninth annual ACM symposium on Theory of computing†…, 2007
Adversarially robust generalization requires more data
L Schmidt, S Santurkar, D Tsipras, K Talwar, A Madry
Advances in Neural Information Processing Systems, 5014-5026, 2018
Heuristics for vector bin packing
R Panigrahy, K Talwar, L Uyeda, U Wieder
research. microsoft. com, 2011
Paths, trees, and minimum latency tours
K Chaudhuri, B Godfrey, S Rao, K Talwar
44th Annual IEEE Symposium on Foundations of Computer Science, 2003†…, 2003
Click-fraud reducing auction via dual pricing
K Jain, K Talwar
US Patent App. 11/178,528, 2007
Learning differentially private recurrent language models
HB McMahan, D Ramage, K Talwar, L Zhang
arXiv preprint arXiv:1710.06963, 2017
Click fraud resistant methods for learning click-through rates
N Immorlica, K Jain, M Mahdian, K Talwar
International Workshop on Internet and Network Economics, 34-45, 2005
The system can't perform the operation now. Try again later.
Articles 1–20