Search

Showing total 33 results
33 results

Search Results

1. Extreme Compressive Sampling for Covariance Estimation.

2. Blind Group Testing.

3. Stability and Risk Bounds of Iterative Hard Thresholding.

4. Early Stopping for Kernel Boosting Algorithms: A General Analysis With Localized Complexities.

5. The Eigenvectors of Single-Spiked Complex Wishart Matrices: Finite and Asymptotic Analyses.

6. Optimal Spectral Shrinkage and PCA With Heteroscedastic Noise.

7. Secure Estimation Under Causative Attacks.

8. On the Adversarial Robustness of Robust Estimators.

9. Structures of Spurious Local Minima in k -Means.

10. Improved Non-Adaptive Algorithms for Threshold Group Testing With a Gap.

11. Fundamentals of the Backoff Process in 802.11: Dichotomy of the Aggregation.

12. De-Biased Sparse PCA: Inference for Eigenstructure of Large Covariance Matrices.

13. Estimation in Reproducing Kernel Hilbert Spaces With Dependent Data.

14. Computationally Tractable Algorithms for Finding a Subset of Non-Defective Items From a Large Population.

15. Group Testing Schemes From Codes and Designs.

16. Covariance Matrix Estimation With Non Uniform and Data Dependent Missing Observations.

17. The Capacity of Associated Subsequence Retrieval.

18. On Conformal Divergences and Their Population Minimizers.

19. Minimax Off-Policy Evaluation for Multi-Armed Bandits.

20. Sharp Oracle Inequalities for Stationary Points of Nonconvex Penalized M-Estimators.

21. Optimal Feature Selection in High-Dimensional Discriminant Analysis.

22. Robust Estimates of Covariance Matrices in the Large Dimensional Regime.

23. Efficiently Decodable Non-Adaptive Threshold Group Testing.

24. Estimating the Coefficients of a Mixture of Two Linear Regressions by Expectation Maximization.

25. Compression for Quantum Population Coding.

26. Adversarial Top- $K$ Ranking.

27. A New Robust Approach for Multinomial Logistic Regression With Complex Design Model.

28. Mean-Based Trace Reconstruction Over Oblivious Synchronization Channels.

29. Group Testing With Nested Pools.

30. Multi-Armed Bandits With Correlated Arms.

31. Information-Theoretic and Algorithmic Thresholds for Group Testing.

32. Deconstructing Generative Adversarial Networks.

33. Denoising Flows on Trees.