Zum Hauptinhalt springen

Showing 1–50 of 77 results for author: Bubeck, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.20347  [pdf, other

    cs.CL cs.AI cs.LG

    Small Language Models for Application Interactions: A Case Study

    Authors: Beibin Li, Yi Zhang, Sébastien Bubeck, Jeevan Pathuri, Ishai Menache

    Abstract: We study the efficacy of Small Language Models (SLMs) in facilitating application usage through natural language interactions. Our focus here is on a particular internal application used in Microsoft for cloud supply chain fulfilment. Our experiments show that small models can outperform much larger ones in terms of both accuracy and running time, even when fine-tuned on small datasets. Alongside… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

  2. arXiv:2404.14219  [pdf, other

    cs.CL cs.AI

    Phi-3 Technical Report: A Highly Capable Language Model Locally on Your Phone

    Authors: Marah Abdin, Sam Ade Jacobs, Ammar Ahmad Awan, Jyoti Aneja, Ahmed Awadallah, Hany Awadalla, Nguyen Bach, Amit Bahree, Arash Bakhtiari, Jianmin Bao, Harkirat Behl, Alon Benhaim, Misha Bilenko, Johan Bjorck, Sébastien Bubeck, Qin Cai, Martin Cai, Caio César Teodoro Mendes, Weizhu Chen, Vishrav Chaudhary, Dong Chen, Dongdong Chen, Yen-Chun Chen, Yi-Ling Chen, Parul Chopra , et al. (90 additional authors not shown)

    Abstract: We introduce phi-3-mini, a 3.8 billion parameter language model trained on 3.3 trillion tokens, whose overall performance, as measured by both academic benchmarks and internal testing, rivals that of models such as Mixtral 8x7B and GPT-3.5 (e.g., phi-3-mini achieves 69% on MMLU and 8.38 on MT-bench), despite being small enough to be deployed on a phone. The innovation lies entirely in our dataset… ▽ More

    Submitted 23 May, 2024; v1 submitted 22 April, 2024; originally announced April 2024.

    Comments: 19 pages

  3. arXiv:2312.09241  [pdf, other

    cs.LG cs.CL

    TinyGSM: achieving >80% on GSM8k with small language models

    Authors: Bingbin Liu, Sebastien Bubeck, Ronen Eldan, Janardhan Kulkarni, Yuanzhi Li, Anh Nguyen, Rachel Ward, Yi Zhang

    Abstract: Small-scale models offer various computational advantages, and yet to which extent size is critical for problem-solving abilities remains an open question. Specifically for solving grade school math, the smallest model size so far required to break the 80\% barrier on the GSM8K benchmark remains to be 34B. Our work studies how high-quality datasets may be the key for small language models to acqui… ▽ More

    Submitted 14 December, 2023; originally announced December 2023.

  4. arXiv:2311.14737  [pdf, other

    cs.CL cs.AI cs.LG

    Positional Description Matters for Transformers Arithmetic

    Authors: Ruoqi Shen, Sébastien Bubeck, Ronen Eldan, Yin Tat Lee, Yuanzhi Li, Yi Zhang

    Abstract: Transformers, central to the successes in modern Natural Language Processing, often falter on arithmetic tasks despite their vast capabilities --which paradoxically include remarkable coding abilities. We observe that a crucial challenge is their naive reliance on positional information to solve arithmetic problems with a small number of digits, leading to poor performance on larger numbers. Herei… ▽ More

    Submitted 21 November, 2023; originally announced November 2023.

    Comments: 18 pages

  5. arXiv:2309.05463  [pdf, other

    cs.CL cs.AI

    Textbooks Are All You Need II: phi-1.5 technical report

    Authors: Yuanzhi Li, Sébastien Bubeck, Ronen Eldan, Allie Del Giorno, Suriya Gunasekar, Yin Tat Lee

    Abstract: We continue the investigation into the power of smaller Transformer-based language models as initiated by \textbf{TinyStories} -- a 10 million parameter model that can produce coherent English -- and the follow-up work on \textbf{phi-1}, a 1.3 billion parameter model with Python coding performance close to the state-of-the-art. The latter work proposed to use existing Large Language Models (LLMs)… ▽ More

    Submitted 11 September, 2023; originally announced September 2023.

  6. arXiv:2306.11644  [pdf, other

    cs.CL cs.AI cs.LG

    Textbooks Are All You Need

    Authors: Suriya Gunasekar, Yi Zhang, Jyoti Aneja, Caio César Teodoro Mendes, Allie Del Giorno, Sivakanth Gopi, Mojan Javaheripi, Piero Kauffmann, Gustavo de Rosa, Olli Saarikivi, Adil Salim, Shital Shah, Harkirat Singh Behl, Xin Wang, Sébastien Bubeck, Ronen Eldan, Adam Tauman Kalai, Yin Tat Lee, Yuanzhi Li

    Abstract: We introduce phi-1, a new large language model for code, with significantly smaller size than competing models: phi-1 is a Transformer-based model with 1.3B parameters, trained for 4 days on 8 A100s, using a selection of ``textbook quality" data from the web (6B tokens) and synthetically generated textbooks and exercises with GPT-3.5 (1B tokens). Despite this small scale, phi-1 attains pass@1 accu… ▽ More

    Submitted 2 October, 2023; v1 submitted 20 June, 2023; originally announced June 2023.

    Comments: 26 pages; changed color scheme of plot. fixed minor typos and added couple clarifications

  7. arXiv:2303.12712  [pdf, other

    cs.CL cs.AI

    Sparks of Artificial General Intelligence: Early experiments with GPT-4

    Authors: Sébastien Bubeck, Varun Chandrasekaran, Ronen Eldan, Johannes Gehrke, Eric Horvitz, Ece Kamar, Peter Lee, Yin Tat Lee, Yuanzhi Li, Scott Lundberg, Harsha Nori, Hamid Palangi, Marco Tulio Ribeiro, Yi Zhang

    Abstract: Artificial intelligence (AI) researchers have been developing and refining large language models (LLMs) that exhibit remarkable capabilities across a variety of domains and tasks, challenging our understanding of learning and cognition. The latest model developed by OpenAI, GPT-4, was trained using an unprecedented scale of compute and data. In this paper, we report on our investigation of an earl… ▽ More

    Submitted 13 April, 2023; v1 submitted 22 March, 2023; originally announced March 2023.

  8. arXiv:2212.07469  [pdf, other

    cs.LG cs.AI math.OC

    Learning threshold neurons via the "edge of stability"

    Authors: Kwangjun Ahn, Sébastien Bubeck, Sinho Chewi, Yin Tat Lee, Felipe Suarez, Yi Zhang

    Abstract: Existing analyses of neural network training often operate under the unrealistic assumption of an extremely small learning rate. This lies in stark contrast to practical wisdom and empirical studies, such as the work of J. Cohen et al. (ICLR 2021), which exhibit startling new phenomena (the "edge of stability" or "unstable convergence") and potential benefits for generalization in the large learni… ▽ More

    Submitted 19 October, 2023; v1 submitted 14 December, 2022; originally announced December 2022.

    Comments: 31 pages, 13 figures, Published at NeurIPS 2023

  9. arXiv:2211.09359  [pdf, other

    cs.CV cs.LG

    How to Fine-Tune Vision Models with SGD

    Authors: Ananya Kumar, Ruoqi Shen, Sebastien Bubeck, Suriya Gunasekar

    Abstract: SGD and AdamW are the two most used optimizers for fine-tuning large neural networks in computer vision. When the two methods perform the same, SGD is preferable because it uses less memory (12 bytes/parameter with momentum and 8 bytes/parameter without) than AdamW (16 bytes/parameter). However, on a suite of downstream tasks, especially those with distribution shifts, we find that fine-tuning wit… ▽ More

    Submitted 10 October, 2023; v1 submitted 17 November, 2022; originally announced November 2022.

  10. arXiv:2211.05753  [pdf, other

    cs.DS math.MG

    The Randomized $k$-Server Conjecture is False!

    Authors: Sébastien Bubeck, Christian Coester, Yuval Rabani

    Abstract: We prove a few new lower bounds on the randomized competitive ratio for the $k$-server problem and other related problems, resolving some long-standing conjectures. In particular, for metrical task systems (MTS) we asympotically settle the competitive ratio and obtain the first improvement to an existential lower bound since the introduction of the model 35 years ago (in 1987). More concretely,… ▽ More

    Submitted 6 July, 2023; v1 submitted 10 November, 2022; originally announced November 2022.

  11. arXiv:2210.07535  [pdf, other

    cs.CL cs.LG

    AutoMoE: Heterogeneous Mixture-of-Experts with Adaptive Computation for Efficient Neural Machine Translation

    Authors: Ganesh Jawahar, Subhabrata Mukherjee, Xiaodong Liu, Young Jin Kim, Muhammad Abdul-Mageed, Laks V. S. Lakshmanan, Ahmed Hassan Awadallah, Sebastien Bubeck, Jianfeng Gao

    Abstract: Mixture-of-Expert (MoE) models have obtained state-of-the-art performance in Neural Machine Translation (NMT) tasks. Existing works in MoE mostly consider a homogeneous design where the same number of experts of the same size are placed uniformly throughout the network. Furthermore, existing MoE works do not consider computational constraints (e.g., FLOPs, latency) to guide their design. To this e… ▽ More

    Submitted 7 June, 2023; v1 submitted 14 October, 2022; originally announced October 2022.

    Comments: ACL 2023 Findings

  12. arXiv:2206.04301  [pdf, other

    cs.LG cs.AI cs.CL

    Unveiling Transformers with LEGO: a synthetic reasoning task

    Authors: Yi Zhang, Arturs Backurs, Sébastien Bubeck, Ronen Eldan, Suriya Gunasekar, Tal Wagner

    Abstract: We propose a synthetic reasoning task, LEGO (Learning Equality and Group Operations), that encapsulates the problem of following a chain of reasoning, and we study how the Transformer architectures learn this task. We pay special attention to data effects such as pretraining (on seemingly unrelated NLP tasks) and dataset composition (e.g., differing chain length at training and test time), as well… ▽ More

    Submitted 17 February, 2023; v1 submitted 9 June, 2022; originally announced June 2022.

  13. arXiv:2203.02094  [pdf, other

    cs.LG cs.CL

    LiteTransformerSearch: Training-free Neural Architecture Search for Efficient Language Models

    Authors: Mojan Javaheripi, Gustavo H. de Rosa, Subhabrata Mukherjee, Shital Shah, Tomasz L. Religa, Caio C. T. Mendes, Sebastien Bubeck, Farinaz Koushanfar, Debadeepta Dey

    Abstract: The Transformer architecture is ubiquitously used as the building block of large-scale autoregressive language models. However, finding architectures with the optimal trade-off between task performance (perplexity) and hardware constraints like peak memory utilization and latency is non-trivial. This is exacerbated by the proliferation of various hardware. We leverage the somewhat surprising empir… ▽ More

    Submitted 17 October, 2022; v1 submitted 3 March, 2022; originally announced March 2022.

  14. arXiv:2203.01572  [pdf, other

    cs.LG stat.ML

    Data Augmentation as Feature Manipulation

    Authors: Ruoqi Shen, Sébastien Bubeck, Suriya Gunasekar

    Abstract: Data augmentation is a cornerstone of the machine learning pipeline, yet its theoretical underpinnings remain unclear. Is it merely a way to artificially augment the data set size? Or is it about encouraging the model to satisfy certain invariance? In this work we consider another angle, and we study the effect of data augmentation on the dynamic of the learning process. We find that data augmenta… ▽ More

    Submitted 20 September, 2022; v1 submitted 3 March, 2022; originally announced March 2022.

    Comments: 38 pages, 4 figures. ICML22 camera-ready version

  15. arXiv:2202.04551  [pdf, ps, other

    cs.DS

    Shortest Paths without a Map, but with an Entropic Regularizer

    Authors: Sébastien Bubeck, Christian Coester, Yuval Rabani

    Abstract: In a 1989 paper titled "shortest paths without a map", Papadimitriou and Yannakakis introduced an online model of searching in a weighted layered graph for a target node, while attempting to minimize the total length of the path traversed by the searcher. This problem, later called layered graph traversal, is parametrized by the maximum cardinality $k$ of a layer of the input graph. It is an onlin… ▽ More

    Submitted 9 February, 2022; originally announced February 2022.

  16. arXiv:2106.12611  [pdf, ps, other

    cs.LG cs.AI stat.ML

    Adversarial Examples in Multi-Layer Random ReLU Networks

    Authors: Peter L. Bartlett, Sébastien Bubeck, Yeshwanth Cherapanamjeri

    Abstract: We consider the phenomenon of adversarial examples in ReLU networks with independent gaussian parameters. For networks of constant depth and with a large range of widths (for instance, it suffices if the width of each layer is polynomial in that of any other layer), small perturbations of input vectors lead to large changes of outputs. This generalizes results of Daniely and Schacham (2020) for ne… ▽ More

    Submitted 23 June, 2021; originally announced June 2021.

  17. arXiv:2106.04010  [pdf, other

    cs.LG cs.CV

    FEAR: A Simple Lightweight Method to Rank Architectures

    Authors: Debadeepta Dey, Shital Shah, Sebastien Bubeck

    Abstract: The fundamental problem in Neural Architecture Search (NAS) is to efficiently find high-performing architectures from a given search space. We propose a simple but powerful method which we call FEAR, for ranking architectures in any search space. FEAR leverages the viewpoint that neural networks are powerful non-linear feature extractors. First, we train different architectures in the search space… ▽ More

    Submitted 7 June, 2021; originally announced June 2021.

    Comments: 31 pages, 8 figures

  18. arXiv:2105.12806  [pdf, ps, other

    cs.LG stat.ML

    A Universal Law of Robustness via Isoperimetry

    Authors: Sébastien Bubeck, Mark Sellke

    Abstract: Classically, data interpolation with a parametrized model class is possible as long as the number of parameters is larger than the number of equations to be satisfied. A puzzling phenomenon in deep learning is that models are trained with many more parameters than what this classical theory would suggest. We propose a partial theoretical explanation for this phenomenon. We prove that for a broad c… ▽ More

    Submitted 23 December, 2022; v1 submitted 26 May, 2021; originally announced May 2021.

  19. arXiv:2104.03863  [pdf, other

    cs.LG cs.CR stat.ML

    A single gradient step finds adversarial examples on random two-layers neural networks

    Authors: Sébastien Bubeck, Yeshwanth Cherapanamjeri, Gauthier Gidel, Rémi Tachet des Combes

    Abstract: Daniely and Schacham recently showed that gradient descent finds adversarial examples on random undercomplete two-layers ReLU neural networks. The term "undercomplete" refers to the fact that their proof only holds when the number of neurons is a vanishing fraction of the ambient dimension. We extend their result to the overcomplete case, where the number of neurons is larger than the dimension (y… ▽ More

    Submitted 9 April, 2021; v1 submitted 8 April, 2021; originally announced April 2021.

    Comments: Added a comment about universal adversarial perturbations. 18 pages, 7 figures

  20. arXiv:2011.03896  [pdf, other

    cs.LG cs.MA stat.ML

    Cooperative and Stochastic Multi-Player Multi-Armed Bandit: Optimal Regret With Neither Communication Nor Collisions

    Authors: Sébastien Bubeck, Thomas Budzinski, Mark Sellke

    Abstract: We consider the cooperative multi-player version of the stochastic multi-armed bandit problem. We study the regime where the players cannot communicate but have access to shared randomness. In prior work by the first two authors, a strategy for this regime was constructed for two players and three arms, with regret $\tilde{O}(\sqrt{T})$, and with no collisions at all between the players (with very… ▽ More

    Submitted 7 November, 2020; originally announced November 2020.

  21. arXiv:2009.14444  [pdf, ps, other

    cs.LG stat.ML

    A law of robustness for two-layers neural networks

    Authors: Sébastien Bubeck, Yuanzhi Li, Dheeraj Nagaraj

    Abstract: We initiate the study of the inherent tradeoffs between the size of a neural network and its robustness, as measured by its Lipschitz constant. We make a precise conjecture that, for any Lipschitz activation function and for most datasets, any two-layers neural network with $k$ neurons that perfectly fit the data must have its Lipschitz constant larger (up to a constant) than $\sqrt{n/k}$ where… ▽ More

    Submitted 24 November, 2020; v1 submitted 30 September, 2020; originally announced September 2020.

    Comments: 18 pages, 3 figures. V2: improved Theorem 4 (weaker version of the Conjecture with $n$ replaced by $d$) from ReLU with no bias term in V1, to arbitrary non-linearities (even data-dependent) in V2

  22. arXiv:2009.08266  [pdf, other

    cs.DS cs.DM math.MG

    Metrical Service Systems with Transformations

    Authors: Sébastien Bubeck, Niv Buchbinder, Christian Coester, Mark Sellke

    Abstract: We consider a generalization of the fundamental online metrical service systems (MSS) problem where the feasible region can be transformed between requests. In this problem, which we call T-MSS, an algorithm maintains a point in a metric space and has to serve a sequence of requests. Each request is a map (transformation) $f_t\colon A_t\to B_t$ between subsets $A_t$ and $B_t$ of the metric space.… ▽ More

    Submitted 17 September, 2020; originally announced September 2020.

  23. arXiv:2006.02855  [pdf, ps, other

    cs.LG stat.ML

    Network size and weights size for memorization with two-layers neural networks

    Authors: Sébastien Bubeck, Ronen Eldan, Yin Tat Lee, Dan Mikulincer

    Abstract: In 1988, Eric B. Baum showed that two-layers neural networks with threshold activation function can perfectly memorize the binary labels of $n$ points in general position in $\mathbb{R}^d$ using only $\ulcorner n/d \urcorner$ neurons. We observe that with ReLU networks, using four times as many neurons one can fit arbitrary real labels. Moreover, for approximate memorization up to error $ε$, the n… ▽ More

    Submitted 3 November, 2020; v1 submitted 4 June, 2020; originally announced June 2020.

    Comments: 27 pages

  24. arXiv:2004.07869  [pdf, ps, other

    quant-ph cs.DS

    Entanglement is Necessary for Optimal Quantum Property Testing

    Authors: Sebastien Bubeck, Sitan Chen, Jerry Li

    Abstract: There has been a surge of progress in recent years in developing algorithms for testing and learning quantum states that achieve optimal copy complexity. Unfortunately, they require the use of entangled measurements across many copies of the underlying state and thus remain outside the realm of what is currently experimentally feasible. A natural question is whether one can match the copy complexi… ▽ More

    Submitted 16 April, 2020; originally announced April 2020.

    Comments: 31 pages, comments welcome

  25. arXiv:2004.07346  [pdf, other

    cs.DS cs.LG

    Online Multiserver Convex Chasing and Optimization

    Authors: Sébastien Bubeck, Yuval Rabani, Mark Sellke

    Abstract: We introduce the problem of $k$-chasing of convex functions, a simultaneous generalization of both the famous k-server problem in $R^d$, and of the problem of chasing convex bodies and functions. Aside from fundamental interest in this general form, it has natural applications to online $k$-clustering problems with objectives such as $k$-median or $k$-means. We show that this problem exhibits a ri… ▽ More

    Submitted 15 April, 2020; originally announced April 2020.

  26. arXiv:2002.12014  [pdf, other

    cs.LG stat.ML

    Online Learning for Active Cache Synchronization

    Authors: Andrey Kolobov, Sébastien Bubeck, Julian Zimmert

    Abstract: Existing multi-armed bandit (MAB) models make two implicit assumptions: an arm generates a payoff only when it is played, and the agent observes every payoff that is generated. This paper introduces synchronization bandits, a MAB variant where all arms generate costs at all times, but the agent observes an arm's instantaneous cost only when the arm is played. Synchronization MABs are inspired by o… ▽ More

    Submitted 21 August, 2020; v1 submitted 27 February, 2020; originally announced February 2020.

  27. arXiv:2002.10726  [pdf, other

    math.OC cs.DC

    Statistically Preconditioned Accelerated Gradient Method for Distributed Optimization

    Authors: Hadrien Hendrikx, Lin Xiao, Sebastien Bubeck, Francis Bach, Laurent Massoulie

    Abstract: We consider the setting of distributed empirical risk minimization where multiple machines compute the gradients in parallel and a centralized server updates the model parameters. In order to reduce the number of communications required to reach a given accuracy, we propose a \emph{preconditioned} accelerated gradient method where the preconditioning is done by solving a local optimization problem… ▽ More

    Submitted 25 February, 2020; originally announced February 2020.

  28. arXiv:2002.07596  [pdf, ps, other

    cs.GT cs.LG cs.MA stat.ML

    Coordination without communication: optimal regret in two players multi-armed bandits

    Authors: Sébastien Bubeck, Thomas Budzinski

    Abstract: We consider two agents playing simultaneously the same stochastic three-armed bandit problem. The two agents are cooperating but they cannot communicate. We propose a strategy with no collisions at all between the players (with very high probability), and with near-optimal regret $O(\sqrt{T \log(T)})$. We also argue that the extra logarithmic term $\sqrt{\log(T)}$ should be necessary by proving a… ▽ More

    Submitted 9 July, 2020; v1 submitted 14 February, 2020; originally announced February 2020.

    Comments: 28 pages, 5 figures. V2: minor revision

    Journal ref: COLT 2020

  29. arXiv:2001.02968  [pdf, other

    math.OC cs.LG

    How to trap a gradient flow

    Authors: Sébastien Bubeck, Dan Mikulincer

    Abstract: We consider the problem of finding an $\varepsilon$-approximate stationary point of a smooth function on a compact domain of $\mathbb{R}^d$. In contrast with dimension-free approaches such as gradient descent, we focus here on the case where $d$ is finite, and potentially small. This viewpoint was explored in 1993 by Vavasis, who proposed an algorithm which, for any fixed finite dimension $d$, imp… ▽ More

    Submitted 30 December, 2020; v1 submitted 9 January, 2020; originally announced January 2020.

    Comments: 25 pages, 5 figures. Added an improved algorithm for dimensions > 3

  30. arXiv:1906.10655  [pdf, ps, other

    math.OC cs.DS cs.LG

    Complexity of Highly Parallel Non-Smooth Convex Optimization

    Authors: Sébastien Bubeck, Qijia Jiang, Yin Tat Lee, Yuanzhi Li, Aaron Sidford

    Abstract: A landmark result of non-smooth convex optimization is that gradient descent is an optimal algorithm whenever the number of computed gradients is smaller than the dimension $d$. In this paper we study the extension of this result to the parallel optimization setting. Namely we consider optimization algorithms interacting with a highly parallel gradient oracle, that is one that can answer… ▽ More

    Submitted 14 January, 2021; v1 submitted 25 June, 2019; originally announced June 2019.

  31. arXiv:1906.04584  [pdf, other

    cs.LG cs.CR stat.ML

    Provably Robust Deep Learning via Adversarially Trained Smoothed Classifiers

    Authors: Hadi Salman, Greg Yang, Jerry Li, Pengchuan Zhang, Huan Zhang, Ilya Razenshteyn, Sebastien Bubeck

    Abstract: Recent works have shown the effectiveness of randomized smoothing as a scalable technique for building neural network-based classifiers that are provably robust to $\ell_2$-norm adversarial perturbations. In this paper, we employ adversarial training to improve the performance of randomized smoothing. We design an adapted attack for smoothed classifiers, and we show how this attack can be used in… ▽ More

    Submitted 9 January, 2020; v1 submitted 9 June, 2019; originally announced June 2019.

    Comments: Spotlight at the 33rd Conference on Neural Information Processing Systems (NeurIPS 2019), Vancouver, Canada; 9 pages main text; 31 pages total

  32. arXiv:1904.12233  [pdf, ps, other

    cs.LG cs.MA stat.ML

    Non-Stochastic Multi-Player Multi-Armed Bandits: Optimal Rate With Collision Information, Sublinear Without

    Authors: Sébastien Bubeck, Yuanzhi Li, Yuval Peres, Mark Sellke

    Abstract: We consider the non-stochastic version of the (cooperative) multi-player multi-armed bandit problem. The model assumes no communication at all between the players, and furthermore when two (or more) players select the same action this results in a maximal loss. We prove the first $\sqrt{T}$-type regret guarantee for this problem, under the feedback model where collisions are announced to the colli… ▽ More

    Submitted 1 May, 2019; v1 submitted 27 April, 2019; originally announced April 2019.

    Comments: 27 pages, v2 adds a pseudorandom generator construction to remove the shared randomness assumption in the $\sqrt{T}$-regret result (Section 3.9)

  33. arXiv:1904.03874  [pdf, ps, other

    cs.DS

    Parametrized Metrical Task Systems

    Authors: Sébastien Bubeck, Yuval Rabani

    Abstract: We consider parametrized versions of metrical task systems and metrical service systems, two fundamental models of online computing, where the constrained parameter is the number of possible distinct requests $m$. Such parametrization occurs naturally in a wide range of applications. Striking examples are certain power management problems, which are modeled as metrical task systems with $m=2$. We… ▽ More

    Submitted 8 April, 2019; originally announced April 2019.

    MSC Class: 68Q25 (primary); 68Q10 (secondary)

  34. arXiv:1902.00681  [pdf, ps, other

    cs.LG stat.ML

    First-Order Bayesian Regret Analysis of Thompson Sampling

    Authors: Sébastien Bubeck, Mark Sellke

    Abstract: We address online combinatorial optimization when the player has a prior over the adversary's sequence of losses. In this framework, Russo and Van Roy proposed an information-theoretic analysis of Thompson Sampling based on the information ratio, resulting in optimal worst-case regret bounds. In this paper we introduce three novel ideas to this line of work. First we propose a new quantity, the sc… ▽ More

    Submitted 3 April, 2022; v1 submitted 2 February, 2019; originally announced February 2019.

    Comments: 58 pages

  35. arXiv:1901.10604  [pdf, ps, other

    cs.LG stat.ML

    Improved Path-length Regret Bounds for Bandits

    Authors: Sébastien Bubeck, Yuanzhi Li, Haipeng Luo, Chen-Yu Wei

    Abstract: We study adaptive regret bounds in terms of the variation of the losses (the so-called path-length bounds) for both multi-armed bandit and more generally linear bandit. We first show that the seemingly suboptimal path-length bound of (Wei and Luo, 2018) is in fact not improvable for adaptive adversary. Despite this negative result, we then develop two new algorithms, one that strictly improves ove… ▽ More

    Submitted 18 June, 2019; v1 submitted 29 January, 2019; originally announced January 2019.

  36. arXiv:1811.06418  [pdf, ps, other

    cs.LG cs.CC cs.CR stat.ML

    Adversarial Examples from Cryptographic Pseudo-Random Generators

    Authors: Sébastien Bubeck, Yin Tat Lee, Eric Price, Ilya Razenshteyn

    Abstract: In our recent work (Bubeck, Price, Razenshteyn, arXiv:1805.10204) we argued that adversarial examples in machine learning might be due to an inherent computational hardness of the problem. More precisely, we constructed a binary classification task for which (i) a robust classifier exists; yet no non-trivial accuracy can be obtained with an efficient algorithm in (ii) the statistical query model.… ▽ More

    Submitted 15 November, 2018; originally announced November 2018.

    Comments: 4 pages, no figures

  37. arXiv:1811.00999  [pdf, ps, other

    cs.DS math.MG

    Chasing Nested Convex Bodies Nearly Optimally

    Authors: Sébastien Bubeck, Bo'az Klartag, Yin Tat Lee, Yuanzhi Li, Mark Sellke

    Abstract: The convex body chasing problem, introduced by Friedman and Linial, is a competitive analysis problem on any normed vector space. In convex body chasing, for each timestep $t\in\mathbb N$, a convex body $K_t\subseteq \mathbb R^d$ is given as a request, and the player picks a point $x_t\in K_t$. The player aims to ensure that the total distance $\sum_{t=0}^{T-1}||x_t-x_{t+1}||$ is within a bounded… ▽ More

    Submitted 12 August, 2021; v1 submitted 2 November, 2018; originally announced November 2018.

  38. arXiv:1811.00887  [pdf, ps, other

    cs.DS math.MG

    Competitively Chasing Convex Bodies

    Authors: Sébastien Bubeck, Yin Tat Lee, Yuanzhi Li, Mark Sellke

    Abstract: Let $\mathcal{F}$ be a family of sets in some metric space. In the $\mathcal{F}$-chasing problem, an online algorithm observes a request sequence of sets in $\mathcal{F}$ and responds (online) by giving a sequence of points in these sets. The movement cost is the distance between consecutive such points. The competitive ratio is the worst case ratio (over request sequences) between the total movem… ▽ More

    Submitted 2 November, 2018; originally announced November 2018.

    Comments: 14 pages

  39. arXiv:1807.04404  [pdf, ps, other

    cs.DS math.MG

    Metrical task systems on trees via mirror descent and unfair gluing

    Authors: Sébastien Bubeck, Michael B. Cohen, James R. Lee, Yin Tat Lee

    Abstract: We consider metrical task systems on tree metrics, and present an $O(\mathrm{depth} \times \log n)$-competitive randomized algorithm based on the mirror descent framework introduced in our prior work on the $k$-server problem. For the special case of hierarchically separated trees (HSTs), we use mirror descent to refine the standard approach based on gluing unfair metrical task systems. This yield… ▽ More

    Submitted 25 November, 2020; v1 submitted 11 July, 2018; originally announced July 2018.

  40. arXiv:1807.03765  [pdf, other

    cs.LG cs.AI math.OC stat.ML

    Is Q-learning Provably Efficient?

    Authors: Chi Jin, Zeyuan Allen-Zhu, Sebastien Bubeck, Michael I. Jordan

    Abstract: Model-free reinforcement learning (RL) algorithms, such as Q-learning, directly parameterize and update value functions or policies without explicitly modeling the environment. They are typically simpler, more flexible to use, and thus more prevalent in modern deep RL than model-based approaches. However, empirical work has suggested that model-free algorithms may require more samples to learn [De… ▽ More

    Submitted 10 July, 2018; originally announced July 2018.

    Comments: Best paper in ICML 2018 workshop "Exploration in RL"

  41. arXiv:1806.08865  [pdf, ps, other

    cs.DS

    A Nearly-Linear Bound for Chasing Nested Convex Bodies

    Authors: C. J. Argue, Sébastien Bubeck, Michael B. Cohen, Anupam Gupta, Yin Tat Lee

    Abstract: Friedman and Linial introduced the convex body chasing problem to explore the interplay between geometry and competitive ratio in metrical task systems. In convex body chasing, at each time step $t \in \mathbb{N}$, the online algorithm receives a request in the form of a convex body $K_t \subseteq \mathbb{R}^d$ and must output a point $x_t \in K_t$. The goal is to minimize the total movement betwe… ▽ More

    Submitted 15 November, 2018; v1 submitted 22 June, 2018; originally announced June 2018.

  42. arXiv:1805.10204  [pdf, other

    stat.ML cs.CC cs.LG

    Adversarial examples from computational constraints

    Authors: Sébastien Bubeck, Eric Price, Ilya Razenshteyn

    Abstract: Why are classifiers in high dimension vulnerable to "adversarial" perturbations? We show that it is likely not due to information theoretic limitations, but rather it could be due to computational constraints. First we prove that, for a broad set of classification tasks, the mere existence of a robust classifier implies that it can be found by a possibly exponential-time algorithm with relativel… ▽ More

    Submitted 25 May, 2018; originally announced May 2018.

    Comments: 19 pages, 1 figure

  43. arXiv:1802.03386  [pdf, ps, other

    cs.LG

    Make the Minority Great Again: First-Order Regret Bound for Contextual Bandits

    Authors: Zeyuan Allen-Zhu, Sébastien Bubeck, Yuanzhi Li

    Abstract: Regret bounds in online learning compare the player's performance to $L^*$, the optimal performance in hindsight with a fixed strategy. Typically such bounds scale with the square root of the time horizon $T$. The more refined concept of first-order regret bound replaces this with a scaling $\sqrt{L^*}$, which may be much smaller than $\sqrt{T}$. It is well known that minor variants of standard al… ▽ More

    Submitted 9 February, 2018; originally announced February 2018.

    Comments: 15 pages

  44. arXiv:1711.01328  [pdf, ps, other

    math.OC cs.DS

    An homotopy method for $\ell_p$ regression provably beyond self-concordance and in input-sparsity time

    Authors: Sébastien Bubeck, Michael B. Cohen, Yin Tat Lee, Yuanzhi Li

    Abstract: We consider the problem of linear regression where the $\ell_2^n$ norm loss (i.e., the usual least squares loss) is replaced by the $\ell_p^n$ norm. We show how to solve such problems up to machine precision in $O^*(n^{|1/2 - 1/p|})$ (dense) matrix-vector products and $O^*(1)$ matrix inversions, or alternatively in $O^*(n^{|1/2 - 1/p|})$ calls to a (sparse) linear system solver. This improves the… ▽ More

    Submitted 25 June, 2018; v1 submitted 3 November, 2017; originally announced November 2017.

    Comments: 16 pages

  45. arXiv:1711.01085  [pdf, ps, other

    cs.DS math.MG

    k-server via multiscale entropic regularization

    Authors: Sebastien Bubeck, Michael B. Cohen, James R. Lee, Yin Tat Lee, Aleksander Madry

    Abstract: We present an $O((\log k)^2)$-competitive randomized algorithm for the $k$-server problem on hierarchically separated trees (HSTs). This is the first $o(k)$-competitive randomized algorithm for which the competitive ratio is independent of the size of the underlying HST. Our algorithm is designed in the framework of online mirror descent where the mirror map is a multiscale entropy. When combined… ▽ More

    Submitted 3 November, 2017; originally announced November 2017.

  46. arXiv:1711.01037  [pdf, ps, other

    cs.LG

    Sparsity, variance and curvature in multi-armed bandits

    Authors: Sébastien Bubeck, Michael B. Cohen, Yuanzhi Li

    Abstract: In (online) learning theory the concepts of sparsity, variance and curvature are well-understood and are routinely used to obtain refined regret and generalization bounds. In this paper we further our understanding of these concepts in the more challenging limited feedback scenario. We consider the adversarial multi-armed bandit and linear bandit settings and solve several open problems pertaining… ▽ More

    Submitted 3 November, 2017; originally announced November 2017.

    Comments: 18 pages

  47. arXiv:1705.09700  [pdf, other

    cs.GT cs.DS cs.LG stat.ML

    Multi-scale Online Learning and its Applications to Online Auctions

    Authors: Sébastien Bubeck, Nikhil R. Devanur, Zhiyi Huang, Rad Niazadeh

    Abstract: We consider revenue maximization in online auction/pricing problems. A seller sells an identical item in each period to a new buyer, or a new set of buyers. For the online posted pricing problem, we show regret bounds that scale with the best fixed price, rather than the range of the values. We also show regret bounds that are almost scale free, and match the offline sample complexity, when compar… ▽ More

    Submitted 11 September, 2018; v1 submitted 26 May, 2017; originally announced May 2017.

    Comments: Preliminary conference version In the Proc. of 18th ACM conference on Economics and Computation (EC 2017)

  48. arXiv:1610.04807  [pdf, ps, other

    cs.DS math.PR

    Local max-cut in smoothed polynomial time

    Authors: Omer Angel, Sébastien Bubeck, Yuval Peres, Fan Wei

    Abstract: In 1988, Johnson, Papadimitriou and Yannakakis wrote that "Practically all the empirical evidence would lead us to conclude that finding locally optimal solutions is much easier than solving NP-hard problems". Since then the empirical evidence has continued to amass, but formal proofs of this phenomenon have remained elusive. A canonical (and indeed complete) example is the local max-cut problem,… ▽ More

    Submitted 10 April, 2017; v1 submitted 15 October, 2016; originally announced October 2016.

    Comments: added some remarks and corollaries; to appear in STOC 2017

  49. arXiv:1609.03511  [pdf, other

    math.ST cs.IT cs.SI math.PR

    Basic models and questions in statistical network analysis

    Authors: Miklos Z. Racz, Sébastien Bubeck

    Abstract: Extracting information from large graphs has become an important statistical problem since network data is now common in various fields. In this minicourse we will investigate the most natural statistical questions for three canonical probabilistic models of networks: (i) community detection in the stochastic block model, (ii) finding the embedding of a random geometric graph, and (iii) finding th… ▽ More

    Submitted 12 September, 2016; originally announced September 2016.

    Comments: 38 pages, 10 figures. Lecture notes for a graduate minicourse presented at University of Washington and the XX Brazilian School of Probability in June/July 2016

  50. arXiv:1607.03084  [pdf, ps, other

    cs.LG cs.DS math.OC stat.ML

    Kernel-based methods for bandit convex optimization

    Authors: Sébastien Bubeck, Ronen Eldan, Yin Tat Lee

    Abstract: We consider the adversarial convex bandit problem and we build the first $\mathrm{poly}(T)$-time algorithm with $\mathrm{poly}(n) \sqrt{T}$-regret for this problem. To do so we introduce three new ideas in the derivative-free optimization literature: (i) kernel methods, (ii) a generalization of Bernoulli convolutions, and (iii) a new annealing schedule for exponential weights (with increasing lear… ▽ More

    Submitted 11 July, 2016; originally announced July 2016.

    Comments: 45 pages