This is part 3/3 of my M1 internship per requirement from ENS, done at Institute of Science and Technology Austria, under the supervision of Simone Bombari and Prof. Marco Mondelli, to be published. 4. Second layer. In this section, we only use the dataset \(X^a\), so by abuse of notation, we write \(X\), \(x_j\), and \(y_j\) to mean \(X^a\), ... 26 Jul 2025 - 17 minute read
This is part 2/3 of my M1 internship per requirement from ENS, done at Institute of Science and Technology Austria, under the supervision of Simone Bombari and Prof. Marco Mondelli, to be published. 3. First layer. In this section, we only use the first dataset \(X^W\) thus by abuse of notation, we write \(X\), \(x_j\), and \(y_j\) to mean \(X... 25 Jul 2025 - 22 minute read
This is part 1/3 of my M1 internship per requirement from ENS, done at Institute of Science and Technology Austria, under the supervision of Simone Bombari and Prof. Marco Mondelli, to be published. Abstract \((\varepsilon, \delta)\)-differential privacy has been gold standard in gauging protection of training data. It was commonly believed th... 24 Jul 2025 - 24 minute read
\[\newcommand{\NP}{\textsf{NP}} \newcommand{\def}{\text{def}} \newcommand{\d}{\text{d}} \newcommand{\APX}{\textsf{APX}} \newcommand{\L}{\textsf{L}} \newcommand{\sP}{\textsf{#P}}\] This is a study during my second year at ENS Ulm, in the context of a research project supervised by Prof. Ana Busic. 1. Introduction In my previous post (Nguyen, 2... 19 Nov 2024 - 11 minute read
\[\newcommand{\NP}{\textsf{NP}} \newcommand{\def}{\text{def}} \newcommand{\d}{\text{d}} \newcommand{\FPT}{\textsf{FPT}} \newcommand{\APX}{\textsf{APX}} \newcommand{\sgn}{\text{sgn}}\] This is a study during my second year at ENS Ulm, in the context of a research project supervised by Prof. Ana Busic. 1. Introduction Let us take a real-life ex... 28 Oct 2024 - 11 minute read