Learning prices for repeated auctions with strategic buyers K Amin, A Rostamizadeh, U Syed Advances in neural information processing systems 26, 2013 | 186 | 2013 |
Repeated contextual auctions with strategic buyers K Amin, A Rostamizadeh, U Syed Advances in Neural Information Processing Systems 27, 2014 | 146 | 2014 |
Budget optimization for sponsored search: Censored learning in mdps K Amin, M Kearns, P Key, A Schwaighofer Uncertainty in Artificial Intelligence: Proceedings of the Twenty-Eighth …, 2012 | 100 | 2012 |
Learning with user-level privacy D Levy, Z Sun, K Amin, S Kale, A Kulesza, M Mohri, AT Suresh Advances in Neural Information Processing Systems 34, 12466-12479, 2021 | 87 | 2021 |
Repeated inverse reinforcement learning K Amin, N Jiang, S Singh Advances in neural information processing systems 30, 2017 | 85 | 2017 |
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures S Venkatesan, M Albanese, K Amin, S Jajodia, M Wright 2016 IEEE conference on communications and network security (CNS), 198-206, 2016 | 80 | 2016 |
Bounding user contributions: A bias-variance trade-off in differential privacy K Amin, A Kulesza, A Munoz, S Vassilvtiskii International Conference on Machine Learning, 263-271, 2019 | 71 | 2019 |
Multi-Agent Pathfinding as a Combinatorial Auction. O Amir, G Sharon, R Stern AAAI, 2003-2009, 2015 | 60 | 2015 |
Differentially private covariance estimation K Amin, T Dick, A Kulesza, A Munoz, S Vassilvitskii Advances in Neural Information Processing Systems 32, 2019 | 49 | 2019 |
Threshold bandits, with and without censored feedback JD Abernethy, K Amin, R Zhu Advances In Neural Information Processing Systems 29, 2016 | 38 | 2016 |
Pan-private uniformity testing K Amin, M Joseph, J Mao Conference on Learning Theory, 183-218, 2020 | 35 | 2020 |
Online learning and profit maximization from revealed preferences K Amin, R Cummings, L Dworkin, M Kearns, A Roth Proceedings of the AAAI Conference on Artificial Intelligence 29 (1), 2015 | 35 | 2015 |
Learning from contagion (without timestamps) K Amin, H Heidari, M Kearns International Conference on Machine Learning, 1845-1853, 2014 | 35 | 2014 |
Towards resolving unidentifiability in inverse reinforcement learning K Amin, S Singh arXiv preprint arXiv:1601.06569, 2016 | 29 | 2016 |
Budgeted prediction with expert advice K Amin, S Kale, G Tesauro, D Turaga Proceedings of the AAAI Conference on Artificial Intelligence 29 (1), 2015 | 25 | 2015 |
Bandits, query learning, and the haystack dimension K Amin, M Kearns, U Syed Proceedings of the 24th Annual Conference on Learning Theory, 87-106, 2011 | 24 | 2011 |
Graphical models for bandit problems K Amin, M Kearns, U Syed Uncertainty in Artificial Intelligence: Proceedings of the Twenty-Seventh …, 2012 | 22 | 2012 |
Gradient methods for stackelberg security games K Amin, S Singh, MP Wellman Conference on Uncertainty in Artificial Intelligence, 2-11, 2016 | 20 | 2016 |
Plume: differential privacy at scale K Amin, J Gillenwater, M Joseph, A Kulesza, S Vassilvitskii arXiv preprint arXiv:2201.11603, 2022 | 19 | 2022 |
Large-scale bandit problems and KWIK learning J Abernethy, K Amin, M Kearns, M Draief International Conference on Machine Learning, 588-596, 2013 | 14 | 2013 |