Comment

Journal of the American Statistical Association(2018)

引用 0|浏览0
暂无评分
摘要
Kasiviswanathan, S. P., Lee,H.K.,Nissim,K., Raskhodnikova, S., and Smith, A. (2011), “What Can We Learn Privately?” SIAM Journal on Computing, 40, 793–826. [182] King, G., Pan, J., and Roberts,M. (2013), “HowCensorship in China Allows Government Criticism But Silences Collective Expression,” American Political Science Review, 107, 1–18. [199] ——— (2014), “Reverse-Engineering Censorship in China: Randomized Experimentation and Participant Observation,” Science, 345. doi:10.1126/science.1251722. [199] Le Cam, L. (1973), “Convergence of Estimates Under Dimensionality Restrictions,” Annals of Statistics, 1, 38–53. [185] Lehmann, E. L. (1999), Elements of Large Sample Theory, New York: Springer. [194] Levy, R., and Manning, C. D. (2003), “Is It Harder to Parse Chinese, or the Chinese Treebank?” in Proceedings of the 41st Annual Meeting on Association for Computational Linguistics, Association for Computational Linguistics, pp. 439–446. [199] Loh, P.-L., and Wainwright, M. J. (2012), “High-Dimensional Regression With Noisy and Missing Data: Provable Guarantees With Nonconvexity,” Annals of Statistics, 40, 1637–1664. [193] Massey, J. (1990), “Causality, Feedback and Directed Information,” in Proceedings of the International Symposium on Information Theory and its Applications (ISITA), pp. 303–305. [200] McGregor, A., Mironov, I., Pitassi, T., Reingold, O., Talwar, K., and Vadhan, S. (2010), “The Limits of Two-Party Differential Privacy,” in 51st Annual Symposium on Foundations of Computer Science, IEEE, pp. 81– 90. [188] Negahban, S., Ravikumar, P., Wainwright, M., and Yu, B. (2012), “A Unified Framework for High-Dimensional Analysis of MEstimators With Decomposable Regularizers,” Statistical Science, 27, 538–557. [190] Nemirovski, A., Juditsky, A., Lan, G., and Shapiro, A. (2009), “Robust Stochastic Approximation Approach to Stochastic Programming,” SIAM Journal on Optimization, 19, 1574–1609. [187,193] Permuter, H. H., Kim, Y.-H., and Weissman, T. (2011), “Interpretations of Directed Information in Portfolio Theory, Data Compression, and Hypothesis Testing,” IEEE Transactions on Information Theory, 57, 3248–3259. [200] Polyak, B. T., and Juditsky, A. B. (1992), “Acceleration of Stochastic Approximation by Averaging,” SIAM Journal on Control and Optimization, 30, 838–855. [184,193] Rubinstein, B. I. P., Bartlett, P. L., Huang, L., and Taft, N. (2012), “Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning,” Journal of Privacy and Confidentiality, 4, 65–100. [182] Scott, D. (1979), “OnOptimal andData-BasedHistograms,” Biometrika, 66, 605–610. [195] Smith, A. (2011), “Privacy-Preserving Statistical Estimation With Optimal Convergence Rates,” in Proceedings of the Forty-Third Annual ACM Symposium on the Theory of Computing, ACM, pp. 813–822. [182,183] Substance Abuse, Mental Health Services Administration. (2013), “Drug Abuse Warning Network 2011: National Estimates of DrugRelated Emergency Department Visits,” Technical Report SMA 13-4760, U.S. Department of Health and Human Services. Available at http://www.samhsa.gov/data/emergency-department-datadawn/reports?tab=47 [198] Tsybakov, A. B. (2009), Introduction to Nonparametric Estimation, New York: Springer. [185,194,195] U. of California., (2010), “Annual Report on Employee Compensation, 2014,” Available at http://compensation.universityofcalifornia.edu/ payroll2014/. [196] Warner, S. (1965), “Randomized Response: A Survey Technique for Eliminating Evasive Answer Bias,” Journal of the American Statistical Association, 60, 63–69. [183,185,187] Wasserman, L., and Zhou, S. (2010), “A Statistical Framework for Differential Privacy,” Journal of the American Statistical Association, 105, 375– 389. [182,185,195] Yang, Y., and Barron, A. (1999), “Information-Theoretic Determination of Minimax Rates of Convergence,” Annals of Statistics, 27, 1564–1599. [194] Yang, X., Fienberg, S. E., and Rinaldo, A. (2012) “Differential Privacy for ProtectingMulti-dimensional ContingencyTableData: Extensions and Applications,” Journal of Privacy and Confidentiality, 4, Article 5. [183] Yu, B. (1997), “Assouad, Fano, and LeCam,” in Festschrift for Lucien LeCam, eds. D. Pollard, G. Yang, E. Torgersøn, New York: Springer-Verlag, pp. 423–435. [183,185,188,192,194]
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要