Differentially Private Bayesian Optimization
References
Auer, Peter, Cesa-Bianchi, Nicolo, and Fischer, Paul.
Finite-time analysis of the multiarmed bandit problem.
Machine learning, 47(2-3):235–256, 2002.
Azimi, Javad, Jalali, Ali, and Fern, Xiaoli Z. Hybrid batch
bayesian optimization. In ICML 2012, pp. 1215–1222.
ACM, 2012.
Bardenet, R
´
emi, Brendel, M
´
aty
´
as, K
´
egl, Bal
´
azs, and Se-
bag, Mich
`
ele. Collaborative hyperparameter tuning. In
ICML, 2013.
Bassily, Raef, Smith, Adam, and Thakurta, Abhradeep.
Private empirical risk minimization, revisited. arXiv
preprint arXiv:1405.7085, 2014.
Bergstra, James and Bengio, Yoshua. Random search
for hyper-parameter optimization. JMLR, 13:281–305,
2012.
Bonilla, Edwin, Chai, Kian Ming, and Williams, Christo-
pher. Multi-task gaussian process prediction. In NIPS,
2008.
Bull, Adam D. Convergence rates of efficient global opti-
mization algorithms. JMLR, 12:2879–2904, 2011.
Chaudhuri, Kamalika and Vinterbo, Staal A. A stability-
based validation procedure for differentially private ma-
chine learning. In Advances in Neural Information Pro-
cessing Systems, pp. 2652–2660, 2013.
Chaudhuri, Kamalika, Monteleoni, Claire, and Sarwate,
Anand D. Differentially private empirical risk minimiza-
tion. JMLR, 12:1069–1109, 2011.
Chong, Miao M, Abraham, Ajith, and Paprzycki,
Marcin. Traffic accident analysis using machine learning
paradigms. Informatica (Slovenia), 29(1):89–98, 2005.
Cortes, Corinna and Vapnik, Vladimir. Support-vector net-
works. Machine learning, 20(3):273–297, 1995.
de Freitas, Nando, Smola, Alex, and Zoghi, Masrour. Ex-
ponential regret bounds for gaussian process bandits
with deterministic observations. In ICML, 2012.
Dinur, Irit and Nissim, Kobbi. Revealing information while
preserving privacy. In Proceedings of the SIGMOD-
SIGACT-SIGART symposium on principles of database
systems, pp. 202–210. ACM, 2003.
Duchi, John C, Jordan, Michael I, and Wainwright, Mar-
tin J. Local privacy and statistical minimax rates. In
FOCS, pp. 429–438. IEEE, 2013.
Dwork, Cynthia and Roth, Aaron. The algorithmic founda-
tions of differential privacy. Theoretical Computer Sci-
ence, 9(3-4):211–407, 2013.
Dwork, Cynthia, Kenthapadi, Krishnaram, McSherry,
Frank, Mironov, Ilya, and Naor, Moni. Our data, our-
selves: Privacy via distributed noise generation. In Ad-
vances in Cryptology-EUROCRYPT 2006, pp. 486–503.
Springer, 2006a.
Dwork, Cynthia, McSherry, Frank, Nissim, Kobbi, and
Smith, Adam. Calibrating noise to sensitivity in private
data analysis. In Theory of Cryptography, pp. 265–284.
Springer, 2006b.
Ganta, Srivatsava Ranjit, Kasiviswanathan, Shiva Prasad,
and Smith, Adam. Composition attacks and auxiliary in-
formation in data privacy. In KDD, pp. 265–273. ACM,
2008.
Gardner, Jacob, Kusner, Matt, Xu, Zhixiang, Weinberger,
Kilian, and Cunningham, John. Bayesian optimization
with inequality constraints. In ICML, pp. 937–945, 2014.
Hoffman, Matthew, Shahriari, Bobak, and de Freitas,
Nando. On correlation and budget constraints in model-
based bandit optimization with application to automatic
machine learning. In AISTATS, pp. 365–374, 2014.
Huang, Xiaolin, Shi, Lei, and Suykens, Johan AK. Ramp
loss linear programming support vector machine. The
Journal of Machine Learning Research, 15(1):2185–
2211, 2014.
Hutter, Frank, Hoos, H. Holger, and Leyton-Brown, Kevin.
Sequential model-based optimization for general algo-
rithm configuration. In Learning and Intelligent Opti-
mization, pp. 507–523. Springer, 2011.
Jain, Prateek and Thakurta, Abhradeep. Differentially pri-
vate learning with kernels. In ICML, pp. 118–126, 2013.
Jain, Prateek and Thakurta, Abhradeep Guha. (near) di-
mension independent risk bounds for differentially pri-
vate learning. In ICML, pp. 476–484, 2014.
Jain, Prateek, Kothari, Pravesh, and Thakurta, Abhradeep.
Differentially private online learning. COLT, 2012.
Kifer, Daniel, Smith, Adam, and Thakurta, Abhradeep.
Private convex empirical risk minimization and high-
dimensional regression. JMLR, 1:41, 2012.
Krause, Andreas, Singh, Ajit, and Guestrin, Carlos. Near-
optimal sensor placements in gaussian processes: The-
ory, efficient algorithms and empirical studies. JMLR, 9:
235–284, 2008.