Learning prices for repeated auctions with strategic buyers K Amin, A Rostamizadeh, U Syed Advances in Neural Information Processing Systems 26, 2013 | 150 | 2013 |
Repeated contextual auctions with strategic buyers K Amin, A Rostamizadeh, U Syed Advances in Neural Information Processing Systems 27, 2014 | 116 | 2014 |
Budget optimization for sponsored search: Censored learning in mdps K Amin, M Kearns, P Key, A Schwaighofer Uncertainty in Artificial Intelligence: Proceedings of the Twenty-Eighth …, 2012 | 93 | 2012 |
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures S Venkatesan, M Albanese, K Amin, S Jajodia, M Wright 2016 IEEE conference on communications and network security (CNS), 198-206, 2016 | 72 | 2016 |
Repeated inverse reinforcement learning K Amin, N Jiang, S Singh Advances in neural information processing systems 30, 2017 | 62 | 2017 |
Multi-Agent Pathfinding as a Combinatorial Auction. O Amir, G Sharon, R Stern AAAI, 2003-2009, 2015 | 50 | 2015 |
Learning with user-level privacy D Levy, Z Sun, K Amin, S Kale, A Kulesza, M Mohri, AT Suresh Advances in Neural Information Processing Systems 34, 12466-12479, 2021 | 41 | 2021 |
Bounding user contributions: A bias-variance trade-off in differential privacy K Amin, A Kulesza, A Munoz, S Vassilvtiskii International Conference on Machine Learning, 263-271, 2019 | 41 | 2019 |
Differentially private covariance estimation K Amin, T Dick, A Kulesza, A Munoz, S Vassilvitskii Advances in Neural Information Processing Systems 32, 2019 | 34 | 2019 |
Learning from contagion (without timestamps) K Amin, H Heidari, M Kearns International Conference on Machine Learning, 1845-1853, 2014 | 31 | 2014 |
Online learning and profit maximization from revealed preferences K Amin, R Cummings, L Dworkin, M Kearns, A Roth Proceedings of the AAAI Conference on Artificial Intelligence 29 (1), 2015 | 29 | 2015 |
Pan-private uniformity testing K Amin, M Joseph, J Mao Conference on Learning Theory, 183-218, 2020 | 27 | 2020 |
Threshold bandits, with and without censored feedback JD Abernethy, K Amin, R Zhu Advances In Neural Information Processing Systems 29, 2016 | 27 | 2016 |
Budgeted prediction with expert advice K Amin, S Kale, G Tesauro, D Turaga Proceedings of the AAAI Conference on Artificial Intelligence 29 (1), 2015 | 23 | 2015 |
Graphical models for bandit problems K Amin, M Kearns, U Syed Uncertainty in Artificial Intelligence: Proceedings of the Twenty-Seventh …, 2012 | 23 | 2012 |
Bandits, query learning, and the haystack dimension K Amin, M Kearns, U Syed Proceedings of the 24th Annual Conference on Learning Theory, 87-106, 2011 | 23 | 2011 |
Towards resolving unidentifiability in inverse reinforcement learning K Amin, S Singh arXiv preprint arXiv:1601.06569, 2016 | 21 | 2016 |
Gradient methods for stackelberg security games K Amin, S Singh, MP Wellman Conference on Uncertainty in Artificial Intelligence, 2-11, 2016 | 18 | 2016 |
Large-scale bandit problems and KWIK learning J Abernethy, K Amin, M Kearns, M Draief International Conference on Machine Learning, 588-596, 2013 | 14 | 2013 |
Private covariance estimation via iterative eigenvector sampling K Amin, T Dick, A Kulesza, AM Medina, S Vassilvitskii 2018 NIPS workshop in Privacy-Preserving Machine Learning 250, 2018 | 7 | 2018 |