There is growing public concern about personal data collected by both private and public sectors. People have very little control over what kinds of data are stored and how such da...
Abstract. A two-argument function is computed privately by two parties if after the computation, no party should know anything about the other inputs except for what he is able to ...
Transfer learning can be described as the tion of abstract knowledge from one learning domain or task and the reuse of that knowledge in a related domain or task. In categorizatio...
Kevin R. Canini, Mikhail M. Shashkov, Thomas L. Gr...
In cryptography, there has been tremendous success in building primitives out of homomorphic semantically-secure encryption schemes, using homomorphic properties in a blackbox way...
We consider the problem of revenue-optimal dynamic mechanism design in settings where agents' types evolve over time as a function of their (both public and private) experien...