Skip to main content

Showing 1–49 of 49 results for author: Kamath, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.19040  [pdf, ps, other

    cs.LG cs.CR cs.DS

    On Convex Optimization with Semi-Sensitive Features

    Authors: Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi, Raghu Meka, Chiyuan Zhang

    Abstract: We study the differentially private (DP) empirical risk minimization (ERM) problem under the semi-sensitive DP setting where only some features are sensitive. This generalizes the Label DP setting where only the label is sensitive. We give improved upper and lower bounds on the excess risk for DP-ERM. In particular, we show that the error only scales polylogarithmically in terms of the sensitive d… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

    Comments: To appear in COLT 2024

  2. arXiv:2406.17989  [pdf, ps, other

    cs.LG stat.ML

    Learning Neural Networks with Sparse Activations

    Authors: Pranjal Awasthi, Nishanth Dikkala, Pritish Kamath, Raghu Meka

    Abstract: A core component present in many successful neural network architectures, is an MLP block of two fully connected layers with a non-linear activation in between. An intriguing phenomenon observed empirically, including in transformer architectures, is that, after training, the activations in the hidden layer of this MLP block tend to be extremely sparse on any given input. Unlike traditional forms… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

    Comments: Proceedings of the 37th Conference on Learning Theory (COLT 2024), 20 pages

  3. arXiv:2406.16305  [pdf, ps, other

    cs.DS cs.CR

    On Computing Pairwise Statistics with Local Differential Privacy

    Authors: Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi, Adam Sealfon

    Abstract: We study the problem of computing pairwise statistics, i.e., ones of the form $\binom{n}{2}^{-1} \sum_{i \ne j} f(x_i, x_j)$, where $x_i$ denotes the input to the $i$th user, with differential privacy (DP) in the local model. This formulation captures important metrics such as Kendall's $τ$ coefficient, Area Under Curve, Gini's mean difference, Gini's entropy, etc. We give several novel and generi… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

    Comments: Published in NeurIPS 2023

  4. arXiv:2406.16135  [pdf, other

    cs.CL cs.LG

    Crosslingual Capabilities and Knowledge Barriers in Multilingual Large Language Models

    Authors: Lynn Chua, Badih Ghazi, Yangsibo Huang, Pritish Kamath, Ravi Kumar, Pasin Manurangsi, Amer Sinha, Chulin Xie, Chiyuan Zhang

    Abstract: Large language models (LLMs) are typically multilingual due to pretraining on diverse multilingual corpora. But can these models relate corresponding concepts across languages, effectively being crosslingual? This study evaluates six state-of-the-art LLMs on inherently crosslingual tasks. We observe that while these models show promising surface-level crosslingual abilities on machine translation… ▽ More

    Submitted 23 June, 2024; originally announced June 2024.

  5. arXiv:2406.14322  [pdf, other

    cs.CL cs.CR cs.LG

    Mind the Privacy Unit! User-Level Differential Privacy for Language Model Fine-Tuning

    Authors: Lynn Chua, Badih Ghazi, Yangsibo Huang, Pritish Kamath, Ravi Kumar, Daogao Liu, Pasin Manurangsi, Amer Sinha, Chiyuan Zhang

    Abstract: Large language models (LLMs) have emerged as powerful tools for tackling complex tasks across diverse domains, but they also raise privacy concerns when fine-tuned on sensitive data due to potential memorization. While differential privacy (DP) offers a promising solution by ensuring models are 'almost indistinguishable' with or without any particular privacy unit, current evaluations on LLMs most… ▽ More

    Submitted 3 July, 2024; v1 submitted 20 June, 2024; originally announced June 2024.

  6. arXiv:2405.18534  [pdf, ps, other

    cs.DS cs.CR

    Individualized Privacy Accounting via Subsampling with Applications in Combinatorial Optimization

    Authors: Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi, Adam Sealfon

    Abstract: In this work, we give a new technique for analyzing individualized privacy accounting via the following simple observation: if an algorithm is one-sided add-DP, then its subsampled variant satisfies two-sided DP. From this, we obtain several improved algorithms for private combinatorial optimization problems, including decomposable submodular maximization and set cover. Our error guarantees are as… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

    Comments: To appear in ICML 2024

  7. arXiv:2404.10881  [pdf, ps, other

    cs.LG math.OC stat.ML

    Differentially Private Optimization with Sparse Gradients

    Authors: Badih Ghazi, Cristóbal Guzmán, Pritish Kamath, Ravi Kumar, Pasin Manurangsi

    Abstract: Motivated by applications of large embedding models, we study differentially private (DP) optimization problems under sparsity of individual gradients. We start with new near-optimal bounds for the classic mean estimation problem but with sparse data, improving upon existing algorithms particularly for the high-dimensional regime. Building on this, we obtain pure- and approximate-DP algorithms wit… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

  8. arXiv:2403.17673  [pdf, other

    cs.LG cs.CR cs.DS

    How Private are DP-SGD Implementations?

    Authors: Lynn Chua, Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi, Amer Sinha, Chiyuan Zhang

    Abstract: We demonstrate a substantial gap between the privacy guarantees of the Adaptive Batch Linear Queries (ABLQ) mechanism under different types of batch sampling: (i) Shuffling, and (ii) Poisson subsampling; the typical analysis of Differentially Private Stochastic Gradient Descent (DP-SGD) follows by interpreting it as a post-processing of ABLQ. While shuffling-based DP-SGD is more commonly used in p… ▽ More

    Submitted 6 June, 2024; v1 submitted 26 March, 2024; originally announced March 2024.

    Comments: Proceedings of ICML 2024

  9. arXiv:2403.09054  [pdf, other

    cs.LG cs.AI cs.AR cs.CL

    Keyformer: KV Cache Reduction through Key Tokens Selection for Efficient Generative Inference

    Authors: Muhammad Adnan, Akhil Arunkumar, Gaurav Jain, Prashant J. Nair, Ilya Soloveychik, Purushotham Kamath

    Abstract: Transformers have emerged as the underpinning architecture for Large Language Models (LLMs). In generative language models, the inference process involves two primary phases: prompt processing and token generation. Token generation, which constitutes the majority of the computational workload, primarily entails vector-matrix multiplications and interactions with the Key-Value (KV) Cache. This phas… ▽ More

    Submitted 5 April, 2024; v1 submitted 13 March, 2024; originally announced March 2024.

    MSC Class: 68U35 ACM Class: I.2.7; C.0

    Journal ref: Proceedings of the 7th Annual Conference on Machine Learning and Systems (MLSys), 2024

  10. arXiv:2401.15246  [pdf, other

    cs.LG cs.CR cs.IR

    Training Differentially Private Ad Prediction Models with Semi-Sensitive Features

    Authors: Lynn Chua, Qiliang Cui, Badih Ghazi, Charlie Harrison, Pritish Kamath, Walid Krichene, Ravi Kumar, Pasin Manurangsi, Krishna Giri Narra, Amer Sinha, Avinash Varadarajan, Chiyuan Zhang

    Abstract: Motivated by problems arising in digital advertising, we introduce the task of training differentially private (DP) machine learning models with semi-sensitive features. In this setting, a subset of the features is known to the attacker (and thus need not be protected) while the remaining features as well as the label are unknown to the attacker and should be protected by the DP guarantee. This ta… ▽ More

    Submitted 26 January, 2024; originally announced January 2024.

    Comments: 7 pages, 4 figures

  11. arXiv:2312.05659  [pdf, other

    cs.LG cs.CR

    Optimal Unbiased Randomizers for Regression with Label Differential Privacy

    Authors: Ashwinkumar Badanidiyuru, Badih Ghazi, Pritish Kamath, Ravi Kumar, Ethan Leeman, Pasin Manurangsi, Avinash V Varadarajan, Chiyuan Zhang

    Abstract: We propose a new family of label randomizers for training regression models under the constraint of label differential privacy (DP). In particular, we leverage the trade-offs between bias and variance to construct better label randomizers depending on a privately estimated prior distribution over the labels. We demonstrate that these randomizers achieve state-of-the-art privacy-utility trade-offs… ▽ More

    Submitted 9 December, 2023; originally announced December 2023.

    Comments: Proceedings version to appear at NeurIPS 2023

  12. arXiv:2311.13586  [pdf, other

    cs.CR

    Summary Reports Optimization in the Privacy Sandbox Attribution Reporting API

    Authors: Hidayet Aksu, Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi, Adam Sealfon, Avinash V Varadarajan

    Abstract: The Privacy Sandbox Attribution Reporting API has been recently deployed by Google Chrome to support the basic advertising functionality of attribution reporting (aka conversion measurement) after deprecation of third-party cookies. The API implements a collection of privacy-enhancing guardrails including contribution bounding and noise injection. It also offers flexibility for the analyst to allo… ▽ More

    Submitted 22 November, 2023; originally announced November 2023.

  13. arXiv:2311.08357  [pdf, other

    cs.LG cs.CR

    Sparsity-Preserving Differentially Private Training of Large Embedding Models

    Authors: Badih Ghazi, Yangsibo Huang, Pritish Kamath, Ravi Kumar, Pasin Manurangsi, Amer Sinha, Chiyuan Zhang

    Abstract: As the use of large embedding models in recommendation systems and language applications increases, concerns over user data privacy have also risen. DP-SGD, a training algorithm that combines differential privacy with stochastic gradient descent, has been the workhorse in protecting user privacy without compromising model accuracy by much. However, applying DP-SGD naively to embedding models can d… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

    Comments: Neural Information Processing Systems (NeurIPS) 2023

  14. arXiv:2309.12500  [pdf, ps, other

    cs.DS cs.CR cs.LG

    User-Level Differential Privacy With Few Examples Per User

    Authors: Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi, Raghu Meka, Chiyuan Zhang

    Abstract: Previous work on user-level differential privacy (DP) [Ghazi et al. NeurIPS 2021, Bun et al. STOC 2023] obtained generic algorithms that work for various learning tasks. However, their focus was on the example-rich regime, where the users have so many examples that each user could themselves solve the problem. In this work we consider the example-scarce regime, where each user has only a few examp… ▽ More

    Submitted 21 September, 2023; originally announced September 2023.

    Comments: To appear at Neural Information Processing Systems (NeurIPS) 2023

  15. arXiv:2308.13510  [pdf, other

    cs.DS cs.CR

    Optimizing Hierarchical Queries for the Attribution Reporting API

    Authors: Matthew Dawson, Badih Ghazi, Pritish Kamath, Kapil Kumar, Ravi Kumar, Bo Luan, Pasin Manurangsi, Nishanth Mundru, Harikesh Nair, Adam Sealfon, Shengyu Zhu

    Abstract: We study the task of performing hierarchical queries based on summary reports from the {\em Attribution Reporting API} for ad conversion measurement. We demonstrate that methods from optimization and differential privacy can help cope with the noise introduced by privacy guardrails in the API. In particular, we present algorithms for (i) denoising the API outputs and ensuring consistency across di… ▽ More

    Submitted 27 November, 2023; v1 submitted 25 August, 2023; originally announced August 2023.

    Comments: Appeared at AdKDD 2023 workshop; Final proceedings version

  16. Example-Based Framework for Perceptually Guided Audio Texture Generation

    Authors: Purnima Kamath, Chitralekha Gupta, Lonce Wyse, Suranga Nanayakkara

    Abstract: Controllable generation using StyleGANs is usually achieved by training the model using labeled data. For audio textures, however, there is currently a lack of large semantically labeled datasets. Therefore, to control generation, we develop a method for semantic control over an unconditionally trained StyleGAN in the absence of such labeled datasets. In this paper, we propose an example-based fra… ▽ More

    Submitted 14 April, 2024; v1 submitted 22 August, 2023; originally announced August 2023.

    Comments: Accepted for publication at IEEE Transactions on Audio, Speech and Language Processing

  17. arXiv:2306.15744  [pdf, ps, other

    cs.LG cs.DS stat.ML

    Ticketed Learning-Unlearning Schemes

    Authors: Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi, Ayush Sekhari, Chiyuan Zhang

    Abstract: We consider the learning--unlearning paradigm defined as follows. First given a dataset, the goal is to learn a good predictor, such as one minimizing a certain loss. Subsequently, given any subset of examples that wish to be unlearnt, the goal is to learn, without the knowledge of the original training dataset, a good predictor that is identical to the predictor that would have been produced when… ▽ More

    Submitted 27 June, 2023; originally announced June 2023.

    Comments: Conference on Learning Theory (COLT) 2023

  18. arXiv:2305.04912  [pdf, ps, other

    cs.LG cs.CR

    On User-Level Private Convex Optimization

    Authors: Badih Ghazi, Pritish Kamath, Ravi Kumar, Raghu Meka, Pasin Manurangsi, Chiyuan Zhang

    Abstract: We introduce a new mechanism for stochastic convex optimization (SCO) with user-level differential privacy guarantees. The convergence rates of this mechanism are similar to those in the prior work of Levy et al. (2021); Narayanan et al. (2022), but with two important improvements. Our mechanism does not require any smoothness assumptions on the loss. Furthermore, our bounds are also the first whe… ▽ More

    Submitted 8 May, 2023; originally announced May 2023.

  19. arXiv:2304.11648  [pdf, other

    eess.AS cs.SD

    Towards Controllable Audio Texture Morphing

    Authors: Chitralekha Gupta, Purnima Kamath, Yize Wei, Zhuoyao Li, Suranga Nanayakkara, Lonce Wyse

    Abstract: In this paper, we propose a data-driven approach to train a Generative Adversarial Network (GAN) conditioned on "soft-labels" distilled from the penultimate layer of an audio classifier trained on a target set of audio texture classes. We demonstrate that interpolation between such conditions or control vectors provides smooth morphing between the generated audio textures, and shows similar or bet… ▽ More

    Submitted 23 April, 2023; originally announced April 2023.

    Comments: accepted to ICASSP 2023

  20. arXiv:2301.00104  [pdf, ps, other

    cs.CR cs.CC

    Towards Separating Computational and Statistical Differential Privacy

    Authors: Badih Ghazi, Rahul Ilango, Pritish Kamath, Ravi Kumar, Pasin Manurangsi

    Abstract: Computational differential privacy (CDP) is a natural relaxation of the standard notion of (statistical) differential privacy (SDP) proposed by Beimel, Nissim, and Omri (CRYPTO 2008) and Mironov, Pandey, Reingold, and Vadhan (CRYPTO 2009). In contrast to SDP, CDP only requires privacy guarantees to hold against computationally-bounded adversaries rather than computationally-unbounded statistical a… ▽ More

    Submitted 23 October, 2023; v1 submitted 30 December, 2022; originally announced January 2023.

    Comments: To appear at Foundations of Computer Science (FOCS) 2023. Changes compared to previous version: (1) The lower bound for SDP is now stronger in that it holds also for a certain inverse-polynomially large delta as opposed to only non-negligible delta, and (2) the presentation is cleaned up

  21. arXiv:2212.11967  [pdf, ps, other

    cs.DS cs.CR

    On Differentially Private Counting on Trees

    Authors: Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi, Kewen Wu

    Abstract: We study the problem of performing counting queries at different levels in hierarchical structures while preserving individuals' privacy. Motivated by applications, we propose a new error measure for this problem by considering a combination of multiplicative and additive approximation to the query results. We examine known mechanisms in differential privacy (DP) and prove their optimality, under… ▽ More

    Submitted 26 April, 2023; v1 submitted 22 December, 2022; originally announced December 2022.

    Comments: 26 pages, full version

  22. arXiv:2212.06074  [pdf, other

    cs.LG cs.CR

    Regression with Label Differential Privacy

    Authors: Badih Ghazi, Pritish Kamath, Ravi Kumar, Ethan Leeman, Pasin Manurangsi, Avinash V Varadarajan, Chiyuan Zhang

    Abstract: We study the task of training regression models with the guarantee of label differential privacy (DP). Based on a global prior distribution on label values, which could be obtained privately, we derive a label DP randomization mechanism that is optimal under a given regression loss function. We prove that the optimal mechanism takes the form of a "randomized response on bins", and propose an effic… ▽ More

    Submitted 4 October, 2023; v1 submitted 12 December, 2022; originally announced December 2022.

    Comments: Appeared at ICLR '23, 28 pages, 6 figures

  23. arXiv:2211.11896  [pdf, other

    cs.LG cs.CR

    Private Ad Modeling with DP-SGD

    Authors: Carson Denison, Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi, Krishna Giri Narra, Amer Sinha, Avinash V Varadarajan, Chiyuan Zhang

    Abstract: A well-known algorithm in privacy-preserving ML is differentially private stochastic gradient descent (DP-SGD). While this algorithm has been evaluated on text and image data, it has not been previously applied to ads data, which are notorious for their high class imbalance and sparse gradient updates. In this work we apply DP-SGD to several ad modeling tasks including predicting click-through rat… ▽ More

    Submitted 4 October, 2023; v1 submitted 21 November, 2022; originally announced November 2022.

    Comments: AdKDD 2023, 8 pages, 5 figures

  24. arXiv:2210.15178  [pdf, ps, other

    cs.DS cs.CR cs.LG

    Anonymized Histograms in Intermediate Privacy Models

    Authors: Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi

    Abstract: We study the problem of privately computing the anonymized histogram (a.k.a. unattributed histogram), which is defined as the histogram without item labels. Previous works have provided algorithms with $\ell_1$- and $\ell_2^2$-errors of $O_\varepsilon(\sqrt{n})$ in the central model of differential privacy (DP). In this work, we provide an algorithm with a nearly matching error guarantee of… ▽ More

    Submitted 27 October, 2022; originally announced October 2022.

    Comments: Neural Information Processing Systems (NeurIPS), 2022

  25. arXiv:2210.15175  [pdf, ps, other

    cs.LG cs.CR stat.ML

    Private Isotonic Regression

    Authors: Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi

    Abstract: In this paper, we consider the problem of differentially private (DP) algorithms for isotonic regression. For the most general problem of isotonic regression over a partially ordered set (poset) $\mathcal{X}$ and for any Lipschitz loss function, we obtain a pure-DP algorithm that, given $n$ input points, has an expected excess empirical risk of roughly… ▽ More

    Submitted 27 October, 2022; originally announced October 2022.

    Comments: Neural Information Processing Systems (NeurIPS), 2022

  26. arXiv:2208.10743  [pdf, other

    eess.AS cs.SD

    Parameter Sensitivity of Deep-Feature based Evaluation Metrics for Audio Textures

    Authors: Chitralekha Gupta, Yize Wei, Zequn Gong, Purnima Kamath, Zhuoyao Li, Lonce Wyse

    Abstract: Standard evaluation metrics such as the Inception score and Fréchet Audio Distance provide a general audio quality distance metric between the synthesized audio and reference clean audio. However, the sensitivity of these metrics to variations in the statistical parameters that define an audio texture is not well studied. In this work, we provide a systematic study of the sensitivity of some of th… ▽ More

    Submitted 23 August, 2022; originally announced August 2022.

    Comments: accepted for publication at ISMIR 2022

  27. arXiv:2207.04574  [pdf, other

    cs.CV cs.LG

    Brain-Aware Replacements for Supervised Contrastive Learning in Detection of Alzheimer's Disease

    Authors: Mehmet Saygın Seyfioğlu, Zixuan Liu, Pranav Kamath, Sadjyot Gangolli, Sheng Wang, Thomas Grabowski, Linda Shapiro

    Abstract: We propose a novel framework for Alzheimer's disease (AD) detection using brain MRIs. The framework starts with a data augmentation method called Brain-Aware Replacements (BAR), which leverages a standard brain parcellation to replace medically-relevant 3D brain regions in an anchor MRI from a randomly picked MRI to create synthetic samples. Ground truth "hard" labels are also linearly mixed depen… ▽ More

    Submitted 20 July, 2022; v1 submitted 10 July, 2022; originally announced July 2022.

    Journal ref: MICCAI 2022

  28. arXiv:2207.04381  [pdf, other

    cs.DS cs.CR cs.LG

    Faster Privacy Accounting via Evolving Discretization

    Authors: Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi

    Abstract: We introduce a new algorithm for numerical composition of privacy random variables, useful for computing the accurate differential privacy parameters for composition of mechanisms. Our algorithm achieves a running time and memory usage of $\mathrm{polylog}(k)$ for the task of self-composing a mechanism, from a broad class of mechanisms, $k$ times; this class, e.g., includes the sub-sampled Gaussia… ▽ More

    Submitted 10 July, 2022; originally announced July 2022.

    Comments: Appeared in International Conference on Machine Learning (ICML) 2022

  29. arXiv:2207.04380  [pdf, other

    cs.DS cs.CR cs.LG

    Connect the Dots: Tighter Discrete Approximations of Privacy Loss Distributions

    Authors: Vadym Doroshenko, Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi

    Abstract: The privacy loss distribution (PLD) provides a tight characterization of the privacy loss of a mechanism in the context of differential privacy (DP). Recent work has shown that PLD-based accounting allows for tighter $(\varepsilon, δ)$-DP guarantees for many popular mechanisms compared to other known methods. A key question in PLD-based accounting is how to approximate any (potentially continuous)… ▽ More

    Submitted 10 July, 2022; originally announced July 2022.

    Comments: Appeared in Privacy Enhancing Technologies Symposium (PETS) 2022

  30. arXiv:2206.13085  [pdf, other

    cs.SD cs.NE eess.AS

    Sound Model Factory: An Integrated System Architecture for Generative Audio Modelling

    Authors: Lonce Wyse, Purnima Kamath, Chitralekha Gupta

    Abstract: We introduce a new system for data-driven audio sound model design built around two different neural network architectures, a Generative Adversarial Network(GAN) and a Recurrent Neural Network (RNN), that takes advantage of the unique characteristics of each to achieve the system objectives that neither is capable of addressing alone. The objective of the system is to generate interactively contro… ▽ More

    Submitted 27 June, 2022; originally announced June 2022.

    Journal ref: International Conference on Computational Intelligence in Music, Sound, Art and Design (Part of EvoStar) (pp. 308-322). Springer, Cham. 2022

  31. arXiv:2205.01789  [pdf, other

    cs.LG stat.ML

    Do More Negative Samples Necessarily Hurt in Contrastive Learning?

    Authors: Pranjal Awasthi, Nishanth Dikkala, Pritish Kamath

    Abstract: Recent investigations in noise contrastive estimation suggest, both empirically as well as theoretically, that while having more "negative samples" in the contrastive loss improves downstream classification performance initially, beyond a threshold, it hurts downstream performance due to a "collision-coverage" trade-off. But is such a phenomenon inherent in contrastive learning? We show in a simpl… ▽ More

    Submitted 22 June, 2022; v1 submitted 3 May, 2022; originally announced May 2022.

    Comments: 16 pages

  32. arXiv:2108.04190  [pdf, ps, other

    cs.LG stat.ML

    On the Power of Differentiable Learning versus PAC and SQ Learning

    Authors: Emmanuel Abbe, Pritish Kamath, Eran Malach, Colin Sandon, Nathan Srebro

    Abstract: We study the power of learning via mini-batch stochastic gradient descent (SGD) on the population loss, and batch Gradient Descent (GD) on the empirical loss, of a differentiable model or neural network, and ask what learning problems can be learnt using these paradigms. We show that SGD and GD can always simulate learning with statistical queries (SQ), but their ability to go beyond that depends… ▽ More

    Submitted 5 February, 2022; v1 submitted 9 August, 2021; originally announced August 2021.

  33. arXiv:2107.02912  [pdf, other

    cs.AI cs.LG cs.RO

    Supervised Bayesian Specification Inference from Demonstrations

    Authors: Ankit Shah, Pritish Kamath, Shen Li, Patrick Craven, Kevin Landers, Kevin Oden, Julie Shah

    Abstract: When observing task demonstrations, human apprentices are able to identify whether a given task is executed correctly long before they gain expertise in actually performing that task. Prior research into learning from demonstrations (LfD) has failed to capture this notion of the acceptability of a task's execution; meanwhile, temporal logics provide a flexible language for expressing task specific… ▽ More

    Submitted 6 July, 2021; originally announced July 2021.

  34. arXiv:2104.06970  [pdf, other

    cs.LG stat.ML

    Understanding the Eluder Dimension

    Authors: Gene Li, Pritish Kamath, Dylan J. Foster, Nathan Srebro

    Abstract: We provide new insights on eluder dimension, a complexity measure that has been extensively used to bound the regret of algorithms for online bandits and reinforcement learning with function approximation. First, we study the relationship between the eluder dimension for a function class and a generalized notion of rank, defined for any monotone "activation" $σ: \mathbb{R}\to \mathbb{R}$, which co… ▽ More

    Submitted 4 October, 2022; v1 submitted 14 April, 2021; originally announced April 2021.

    Comments: NeurIPS 2022

  35. arXiv:2103.07390  [pdf, other

    eess.AS cs.MM cs.SD eess.SP

    Signal Representations for Synthesizing Audio Textures with Generative Adversarial Networks

    Authors: Chitralekha Gupta, Purnima Kamath, Lonce Wyse

    Abstract: Generative Adversarial Networks (GANs) currently achieve the state-of-the-art sound synthesis quality for pitched musical instruments using a 2-channel spectrogram representation consisting of log magnitude and instantaneous frequency (the "IFSpectrogram"). Many other synthesis systems use representations derived from the magnitude spectra, and then depend on a backend component to invert the outp… ▽ More

    Submitted 12 March, 2021; originally announced March 2021.

    Comments: Submitted to Sound and Music Computing Conference (SMC) 2021

    Journal ref: Sound and Music Computing 2021

  36. arXiv:2103.01210  [pdf, ps, other

    cs.LG stat.ML

    Quantifying the Benefit of Using Differentiable Learning over Tangent Kernels

    Authors: Eran Malach, Pritish Kamath, Emmanuel Abbe, Nathan Srebro

    Abstract: We study the relative power of learning with gradient descent on differentiable models, such as neural networks, versus using the corresponding tangent kernels. We show that under certain conditions, gradient descent achieves small error only if a related tangent kernel method achieves a non-trivial advantage over random guessing (a.k.a. weak learning), though this advantage might be very small ev… ▽ More

    Submitted 1 March, 2021; originally announced March 2021.

  37. arXiv:2101.01134  [pdf, other

    stat.ML cs.AI cs.LG

    Does Invariant Risk Minimization Capture Invariance?

    Authors: Pritish Kamath, Akilesh Tangella, Danica J. Sutherland, Nathan Srebro

    Abstract: We show that the Invariant Risk Minimization (IRM) formulation of Arjovsky et al. (2019) can fail to capture "natural" invariances, at least when used in its practical "linear" form, and even on very simple problems which directly follow the motivating examples for IRM. This can lead to worse generalization on new environments, even when compared to unconstrained ERM. The issue stems from a signif… ▽ More

    Submitted 26 February, 2021; v1 submitted 4 January, 2021; originally announced January 2021.

    Comments: Code is available in the arXiv ancillary files, linked from this page

  38. arXiv:2003.04180  [pdf, ps, other

    cs.LG stat.ML

    Approximate is Good Enough: Probabilistic Variants of Dimensional and Margin Complexity

    Authors: Pritish Kamath, Omar Montasser, Nathan Srebro

    Abstract: We present and study approximate notions of dimensional and margin complexity, which correspond to the minimal dimension or norm of an embedding required to approximate, rather then exactly represent, a given hypothesis class. We show that such notions are not only sufficient for learning using linear predictors or a kernel, but unlike the exact variants, are also necessary. Thus they are better s… ▽ More

    Submitted 9 March, 2020; originally announced March 2020.

  39. arXiv:1912.04467  [pdf, ps, other

    cs.CC

    On the Complexity of Modulo-q Arguments and the Chevalley-Warning Theorem

    Authors: Mika Göös, Pritish Kamath, Katerina Sotiraki, Manolis Zampetakis

    Abstract: We study the search problem class $\mathrm{PPA}_q$ defined as a modulo-$q$ analog of the well-known $\textit{polynomial parity argument}$ class $\mathrm{PPA}$ introduced by Papadimitriou '94. Our first result shows that this class can be characterized in terms of $\mathrm{PPA}_p$ for prime $p$. Our main result is to establish that an $\textit{explicit}$ version of a search problem associated to… ▽ More

    Submitted 5 July, 2020; v1 submitted 9 December, 2019; originally announced December 2019.

    Comments: To appear at the Computational Complexity Conference (CCC) 2020

  40. arXiv:1803.06744  [pdf, other

    cs.NE cs.CV

    Fast Neural Architecture Construction using EnvelopeNets

    Authors: Purushotham Kamath, Abhishek Singh, Debo Dutta

    Abstract: Fast Neural Architecture Construction (NAC) is a method to construct deep network architectures by pruning and expansion of a base network. In recent years, several automated search methods for neural network architectures have been proposed using methods such as evolutionary algorithms and reinforcement learning. These methods use a single scalar objective function (usually accuracy) that is eval… ▽ More

    Submitted 13 December, 2018; v1 submitted 18 March, 2018; originally announced March 2018.

    Comments: A shorter version of this paper appeared in the Workshop on MetaLearning 2018 (MetaLearning 2018 at NeurIPS 2018)

  41. arXiv:1708.03808  [pdf, ps, other

    cs.CC cs.IT

    Dimension Reduction for Polynomials over Gaussian Space and Applications

    Authors: Badih Ghazi, Pritish Kamath, Prasad Raghavendra

    Abstract: We introduce a new technique for reducing the dimension of the ambient space of low-degree polynomials in the Gaussian space while preserving their relative correlation structure, analogous to the Johnson-Lindenstrauss lemma. As applications, we address the following problems: 1. Computability of Approximately Optimal Noise Stable function over Gaussian space: The goal is to find a partition of… ▽ More

    Submitted 12 August, 2017; originally announced August 2017.

  42. arXiv:1705.00763  [pdf, ps, other

    cs.IT

    Improved Bounds for Universal One-Bit Compressive Sensing

    Authors: Jayadev Acharya, Arnab Bhattacharyya, Pritish Kamath

    Abstract: Unlike compressive sensing where the measurement outputs are assumed to be real-valued and have infinite precision, in "one-bit compressive sensing", measurements are quantized to one bit, their signs. In this work, we show how to recover the support of sparse high-dimensional vectors in the one-bit compressive sensing framework with an asymptotically near-optimal number of measurements. We also i… ▽ More

    Submitted 1 May, 2017; originally announced May 2017.

    Comments: 14 pages

  43. arXiv:1612.01041  [pdf, ps, other

    cs.CC cs.IT

    Optimality of Correlated Sampling Strategies

    Authors: Mohammad Bavarian, Badih Ghazi, Elad Haramaty, Pritish Kamath, Ronald L. Rivest, Madhu Sudan

    Abstract: In the "correlated sampling" problem, two players are given probability distributions $P$ and $Q$, respectively, over the same finite set, with access to shared randomness. Without any communication, the two players are each required to output an element sampled according to their respective distributions, while trying to minimize the probability that their outputs disagree. A well known strategy… ▽ More

    Submitted 21 November, 2020; v1 submitted 3 December, 2016; originally announced December 2016.

    Comments: 12 pages; Improved presentation (again) based on feedback from anonymous ToC reviewers

  44. arXiv:1607.04322  [pdf, ps, other

    cs.IT cs.CC

    Decidability of Non-Interactive Simulation of Joint Distributions

    Authors: Badih Ghazi, Pritish Kamath, Madhu Sudan

    Abstract: We present decidability results for a sub-class of "non-interactive" simulation problems, a well-studied class of problems in information theory. A non-interactive simulation problem is specified by two distributions $P(x,y)$ and $Q(u,v)$: The goal is to determine if two players, Alice and Bob, that observe sequences $X^n$ and $Y^n$ respectively where $\{(X_i, Y_i)\}_{i=1}^n$ are drawn i.i.d. from… ▽ More

    Submitted 14 July, 2016; originally announced July 2016.

  45. arXiv:1506.00273  [pdf, ps, other

    cs.CC cs.IT

    Communication Complexity of Permutation-Invariant Functions

    Authors: Badih Ghazi, Pritish Kamath, Madhu Sudan

    Abstract: Motivated by the quest for a broader understanding of communication complexity of simple functions, we introduce the class of "permutation-invariant" functions. A partial function $f:\{0,1\}^n \times \{0,1\}^n\to \{0,1,?\}$ is permutation-invariant if for every bijection $π:\{1,\ldots,n\} \to \{1,\ldots,n\}$ and every $\mathbf{x}, \mathbf{y} \in \{0,1\}^n$, it is the case that… ▽ More

    Submitted 31 May, 2015; originally announced June 2015.

  46. A Secure And High Capacity Image Steganography Technique

    Authors: Hemalatha S, U Dinesh Acharya, Renuka A, Priya R. Kamath

    Abstract: Steganography is the science of invisible communication. The purpose of Steganography is to maintain secret communication between two parties. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide multiple secret images and keys in color cover image using Integer Wavelet Transform (IWT). There is no visu… ▽ More

    Submitted 11 April, 2013; originally announced April 2013.

    Comments: 7 pages, Signal & Image Processing : An International Journal (SIPIJ) Vol.4, No.1, February 2013. arXiv admin note: substantial text overlap with arXiv:1304.3313

  47. A Secure Color Image Steganography In Transform Domain

    Authors: Hemalatha S, U Dinesh Acharya, Renuka A, Priya R. Kamath

    Abstract: Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image… ▽ More

    Submitted 11 April, 2013; originally announced April 2013.

    Comments: 8 pages

    Journal ref: International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013

  48. arXiv:1205.1358  [pdf, ps, other

    cs.LO math.LO

    Preservation under Substructures modulo Bounded Cores

    Authors: Abhisekh Sankaran, Bharat Adsul, Vivek Madan, Pritish Kamath, Supratik Chakraborty

    Abstract: We investigate a model-theoretic property that generalizes the classical notion of "preservation under substructures". We call this property \emph{preservation under substructures modulo bounded cores}, and present a syntactic characterization via $Σ_2^0$ sentences for properties of arbitrary structures definable by FO sentences. As a sharper characterization, we further show that the count of exi… ▽ More

    Submitted 12 July, 2012; v1 submitted 7 May, 2012; originally announced May 2012.

    Comments: From v2 to v3: Corrected typos, edited sentences for better readability; Conjecture 1 of v2 is now resolved so it is now Theorem 4, its proof is included in a new section (Section 7), Thm i in v2 is now Thm i+1 for i >= 4; everything else remains the same. From v1 to v2: Thm i is now Thm i-1 for i >= 7, Corrected the proof of Theorem 10 (now Theorem 9) for B > 2 (statement is still correct)

  49. arXiv:1201.4449  [pdf, ps, other

    cs.LO

    Faster Algorithms for Alternating Refinement Relations

    Authors: Krishnendu Chatterjee, Siddhesh Chaubal, Pritish Kamath

    Abstract: One central issue in the formal design and analysis of reactive systems is the notion of refinement that asks whether all behaviors of the implementation is allowed by the specification. The local interpretation of behavior leads to the notion of simulation. Alternating transition systems (ATSs) provide a general model for composite reactive systems, and the simulation relation for ATSs is known a… ▽ More

    Submitted 21 June, 2012; v1 submitted 21 January, 2012; originally announced January 2012.