2025
Private Text Generation by Seeding Large Language Model Prompts.
CoRR, February, 2025
2024
Generating colloquial radiology reports with large language models.
,
,
,
,
,
,
,
,
,
,
,
,
,
J. Am. Medical Informatics Assoc., 2024
2023
Creating a Public Repository for Joining Private Data.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Fast Private Kernel Density Estimation via Locality Sensitive Quantization.
Proceedings of the International Conference on Machine Learning, 2023
Explaining a machine learning decision to physicians via counterfactuals.
Proceedings of the Conference on Health, Inference, and Learning, 2023
2019
Intervention-Aware Early Warning.
Proceedings of the 2019 IEEE International Conference on Data Mining, 2019
2018
SpotLight: Detecting Anomalies in Streaming Graphs.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018
Semi-Supervised Learning on Data Streams via Temporal Label Propagation.
Proceedings of the 35th International Conference on Machine Learning, 2018
2016
Equality and Social Mobility in Twitter Discussion Groups.
Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, 2016
Robust Random Cut Forest Based Anomaly Detection on Streams.
Proceedings of the 33nd International Conference on Machine Learning, 2016
Proceedings of the Data Stream Management - Processing High-Speed Data Streams, 2016
2014
Circumlocution in diagnostic medical queries.
Proceedings of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2014
Proceedings of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2014
Ranking Twitter discussion groups.
Proceedings of the second ACM conference on Online social networks, 2014
2013
Privacy via the Johnson-Lindenstrauss Transform.
J. Priv. Confidentiality, 2013
Denials leak information: Simulatable auditing.
J. Comput. Syst. Sci., 2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Estimating the relative utility of networks for predicting user activities.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013
2012
Domain bias in web search.
Proceedings of the Fifth International Conference on Web Search and Web Data Mining, 2012
Predicting Consumer Behavior in Commerce Search.
Proceedings of the 29th International Conference on Machine Learning, 2012
2011
Shopping for products you don't know you need.
Proceedings of the Forth International Conference on Web Search and Web Data Mining, 2011
2010
Releasing Private Contingency Tables.
J. Priv. Confidentiality, 2010
Secure Computation of the Median (and Other Elements of Specified Ranks).
J. Cryptol., 2010
2009
Releasing search queries and clicks privately.
Proceedings of the 18th International Conference on World Wide Web, 2009
Generating labels from clicks.
Proceedings of the Second International Conference on Web Search and Web Data Mining, 2009
Adapting to the Shifting Intent of Search Queries.
Proceedings of the Advances in Neural Information Processing Systems 22: 23rd Annual Conference on Neural Information Processing Systems 2009. Proceedings of a meeting held 7-10 December 2009, 2009
2008
A Survey of Query Auditing Techniques for Data Privacy.
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008
Privately Finding Specifications.
IEEE Trans. Software Eng., 2008
Finding Strongly Knit Clusters in Social Networks.
Internet Math., 2008
2007
Clustering Social Networks.
Proceedings of the Algorithms and Models for the Web-Graph, 5th International Workshop, 2007
2006
Towards Robustness in Query Auditing.
Proceedings of the 32nd International Conference on Very Large Data Bases, 2006
Privacy via pseudorandom sketches.
Proceedings of the Twenty-Fifth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2006
When Random Sampling Preserves Privacy.
Proceedings of the Advances in Cryptology, 2006
2005
Proceedings of the Twenty-fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2005
2004
A New Conceptual Clustering Framework.
Mach. Learn., 2004
Introduction: Special Issue on Theoretical Advances in Data Clustering.
Mach. Learn., 2004
Version spaces and the consistency problem.
Artif. Intell., 2004
Vision Paper: Enabling Privacy for the Paranoids.
,
,
,
,
,
,
,
,
,
,
Proceedings of the (e)Proceedings of the Thirtieth International Conference on Very Large Data Bases, VLDB 2004, Toronto, Canada, August 31, 2004
On Identifying Stable Ways to Configure Systems.
Proceedings of the 1st International Conference on Autonomic Computing (ICAC 2004), 2004
Secure Computation of the k th-Ranked Element.
Proceedings of the Advances in Cryptology, 2004
2003
Clustering Data Streams: Theory and Practice.
IEEE Trans. Knowl. Data Eng., 2003
On Finding Large Conjunctive Clusters.
Proceedings of the Computational Learning Theory and Kernel Machines, 2003
2002
Streaming-Data Algorithms for High-Quality Clustering.
Proceedings of the 18th International Conference on Data Engineering, San Jose, CA, USA, February 26, 2002
2001
Sublinear time approximate clustering.
Proceedings of the Twelfth Annual Symposium on Discrete Algorithms, 2001
2000
Proceedings of the 41st Annual Symposium on Foundations of Computer Science, 2000
1999
Efficient Read-Restricted Monotone CNF/DNF Dualization by Learning with Membership Queries.
Mach. Learn., 1999
1997
Learning From a Monotonous, Ignorant Teacher
PhD thesis, 1997
Generating all Maximal Independent Sets of Bounded-Degree Hypergraphs.
Proceedings of the Tenth Annual Conference on Computational Learning Theory, 1997
Version Spaces without Boundary Sets.
Proceedings of the Fourteenth National Conference on Artificial Intelligence and Ninth Innovative Applications of Artificial Intelligence Conference, 1997
1996
Learning from a Consistently Ignorant Teacher.
J. Comput. Syst. Sci., 1996