Skip to main content

Showing 1–45 of 45 results for author: Sarwate, A D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.08307  [pdf, other

    stat.ML cs.LG

    Measuring model variability using robust non-parametric testing

    Authors: Sinjini Banerjee, Tim Marrinan, Reilly Cannon, Tony Chiang, Anand D. Sarwate

    Abstract: Training a deep neural network often involves stochastic optimization, meaning each run will produce a different model. The seed used to initialize random elements of the optimization procedure heavily influences the quality of a trained model, which may be obscure from many commonly reported summary statistics, like accuracy. However, random seed is often not included in hyper-parameter optimizat… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

  2. arXiv:2310.00541  [pdf, other

    stat.ML cs.LG

    Robust Nonparametric Hypothesis Testing to Understand Variability in Training Neural Networks

    Authors: Sinjini Banerjee, Reilly Cannon, Tim Marrinan, Tony Chiang, Anand D. Sarwate

    Abstract: Training a deep neural network (DNN) often involves stochastic optimization, which means each run will produce a different model. Several works suggest this variability is negligible when models have the same performance, which in the case of classification is test accuracy. However, models with similar test accuracy may not be computing the same function. We propose a new measure of closeness bet… ▽ More

    Submitted 30 September, 2023; originally announced October 2023.

  3. arXiv:2308.02922  [pdf, other

    stat.ML cs.LG eess.SP math.ST

    Structured Low-Rank Tensors for Generalized Linear Models

    Authors: Batoul Taki, Anand D. Sarwate, Waheed U. Bajwa

    Abstract: Recent works have shown that imposing tensor structures on the coefficient tensor in regression problems can lead to more reliable parameter estimation and lower sample complexity compared to vector-based methods. This work investigates a new low-rank tensor model, called Low Separation Rank (LSR), in Generalized Linear Model (GLM) problems. The LSR model -- which generalizes the well-known Tucker… ▽ More

    Submitted 5 August, 2023; originally announced August 2023.

    Comments: 43 pages; published in Transactions on Machine Learning Research (08/2023)

    Journal ref: Transactions on Machine Learning Research, Aug. 2023 (https://openreview.net/forum?id=qUxBs3Ln41)

  4. arXiv:2307.11684  [pdf, other

    cs.LG

    Minibatching Offers Improved Generalization Performance for Second Order Optimizers

    Authors: Eric Silk, Swarnita Chakraborty, Nairanjana Dasgupta, Anand D. Sarwate, Andrew Lumsdaine, Tony Chiang

    Abstract: Training deep neural networks (DNNs) used in modern machine learning is computationally expensive. Machine learning scientists, therefore, rely on stochastic first-order methods for training, coupled with significant hand-tuning, to obtain good performance. To better understand performance variability of different stochastic algorithms, including second-order methods, we conduct an empirical study… ▽ More

    Submitted 25 May, 2023; originally announced July 2023.

    Comments: 14 pages, 6 figures, 5 tables

  5. arXiv:2205.12372  [pdf, other

    cs.LG

    TorchNTK: A Library for Calculation of Neural Tangent Kernels of PyTorch Models

    Authors: Andrew Engel, Zhichao Wang, Anand D. Sarwate, Sutanay Choudhury, Tony Chiang

    Abstract: We introduce torchNTK, a python library to calculate the empirical neural tangent kernel (NTK) of neural network models in the PyTorch framework. We provide an efficient method to calculate the NTK of multilayer perceptrons. We compare the explicit differentiation implementation against autodifferentiation implementations, which have the benefit of extending the utility of the library to any archi… ▽ More

    Submitted 24 May, 2022; originally announced May 2022.

    Comments: 19 pages, 5 figures

  6. arXiv:2205.06708  [pdf, ps, other

    cs.IT

    The Capacity of Causal Adversarial Channels

    Authors: Yihan Zhang, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate

    Abstract: We characterize the capacity for the discrete-time arbitrarily varying channel with discrete inputs, outputs, and states when (a) the encoder and decoder do not share common randomness, (b) the input and state are subject to cost constraints, (c) the transition matrix of the channel is deterministic given the state, and (d) at each time step the adversary can only observe the current and past chan… ▽ More

    Submitted 13 May, 2022; originally announced May 2022.

  7. arXiv:2202.08260  [pdf, other

    eess.IV cs.LG

    Low-Rank Phase Retrieval with Structured Tensor Models

    Authors: Soo Min Kwon, Xin Li, Anand D. Sarwate

    Abstract: We study the low-rank phase retrieval problem, where the objective is to recover a sequence of signals (typically images) given the magnitude of linear measurements of those signals. Existing solutions involve recovering a matrix constructed by vectorizing and stacking each image. These algorithms model this matrix to be low-rank and leverage the low-rank property to decrease the sample complexity… ▽ More

    Submitted 15 February, 2022; originally announced February 2022.

    Comments: A shorter version of this paper is in 2022 International Conference on Acoustics, Speech, and Signal Processing (ICASSP)

  8. arXiv:2111.14992  [pdf, other

    eess.SP cs.CR

    Network Traffic Shaping for Enhancing Privacy in IoT Systems

    Authors: Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam

    Abstract: Motivated by privacy issues caused by inference attacks on user activities in the packet sizes and timing information of Internet of Things (IoT) network traffic, we establish a rigorous event-level differential privacy (DP) model on infinite packet streams. We propose a memoryless traffic shaping mechanism satisfying a first-come-first-served queuing discipline that outputs traffic dependent on t… ▽ More

    Submitted 29 November, 2021; originally announced November 2021.

    Comments: 18 pages, 10 figures, submitted to IEEE Transactions on Networking

  9. arXiv:2105.14673  [pdf, ps, other

    cs.LG eess.SP math.ST stat.ML

    A Minimax Lower Bound for Low-Rank Matrix-Variate Logistic Regression

    Authors: Batoul Taki, Mohsen Ghassemi, Anand D. Sarwate, Waheed U. Bajwa

    Abstract: This paper considers the problem of matrix-variate logistic regression. It derives the fundamental error threshold on estimating low-rank coefficient matrices in the logistic regression problem by obtaining a lower bound on the minimax risk. The bound depends explicitly on the dimension and distribution of the covariates, the rank and energy of the coefficient matrix, and the number of samples. Th… ▽ More

    Submitted 28 January, 2022; v1 submitted 30 May, 2021; originally announced May 2021.

    Comments: 8 pages; published in Proc. 55th Asilomar Conf. Signals, Systems, and Computers, Pacific Grove, CA, Oct. 31-Nov. 3, 2021

  10. arXiv:2012.11877  [pdf, other

    cs.SI

    Influencers and the Giant Component: the Fundamental Hardness in Privacy Protection for Socially Contagious Attributes

    Authors: Aria Rezaei, Jie Gao, Anand D. Sarwate

    Abstract: The presence of correlation is known to make privacy protection more difficult. We investigate the privacy of socially contagious attributes on a network of individuals, where each individual possessing that attribute may influence a number of others into adopting it. We show that for contagions following the Independent Cascade model there exists a giant connected component of infected nodes, con… ▽ More

    Submitted 22 December, 2020; originally announced December 2020.

    Comments: SIAM SDM 2021, privacy, social contagions, social networks

  11. arXiv:2006.06792  [pdf, other

    stat.ML cs.LG

    Quantile Multi-Armed Bandits: Optimal Best-Arm Identification and a Differentially Private Scheme

    Authors: Kontantinos E. Nikolakakis, Dionysios S. Kalogerias, Or Sheffet, Anand D. Sarwate

    Abstract: We study the best-arm identification problem in multi-armed bandits with stochastic, potentially private rewards, when the goal is to identify the arm with the highest quantile at a fixed, prescribed level. First, we propose a (non-private) successive elimination algorithm for strictly optimal best-arm identification, we show that our algorithm is $δ$-PAC and we characterize its sample complexity.… ▽ More

    Submitted 4 December, 2022; v1 submitted 11 June, 2020; originally announced June 2020.

    Comments: 18 pages, 4 figures

  12. arXiv:1910.12913  [pdf, other

    stat.ML cs.LG eess.SP

    Improved Differentially Private Decentralized Source Separation for fMRI Data

    Authors: Hafiz Imtiaz, Jafar Mohammadi, Rogers Silva, Bradley Baker, Sergey M. Plis, Anand D. Sarwate, Vince Calhoun

    Abstract: Blind source separation algorithms such as independent component analysis (ICA) are widely used in the analysis of neuroimaging data. In order to leverage larger sample sizes, different data holders/sites may wish to collaboratively learn feature representations. However, such datasets are often privacy-sensitive, precluding centralized analyses that pool the data at a single site. In this work, w… ▽ More

    Submitted 22 February, 2021; v1 submitted 28 October, 2019; originally announced October 2019.

    Comments: \c{opyright} 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. arXiv admin note: text overlap with arXiv:1904.10059

  13. arXiv:1909.09596  [pdf, other

    stat.ML cs.IT cs.LG

    Optimal Rates for Learning Hidden Tree Structures

    Authors: Konstantinos E. Nikolakakis, Dionysios S. Kalogerias, Anand D. Sarwate

    Abstract: We provide high probability finite sample complexity guarantees for hidden non-parametric structure learning of tree-shaped graphical models, whose hidden and observable nodes are discrete random variables with either finite or countable alphabets. We study a fundamental quantity called the (noisy) information threshold, which arises naturally from the error analysis of the Chow-Liu algorithm and,… ▽ More

    Submitted 31 March, 2021; v1 submitted 20 September, 2019; originally announced September 2019.

    Comments: 33 pages, 4 figures

  14. Coordination Through Shared Randomness

    Authors: Gowtham R. Kurri, Vinod M. Prabhakaran, Anand D. Sarwate

    Abstract: We study a distributed sampling problem where a set of processors want to output (approximately) independent and identically distributed samples from a joint distribution with the help of a common message from a coordinator. Each processor has access to a subset of sources from a set of independent sources of "shared" randomness. We consider two cases -- in the "omniscient coordinator setting", th… ▽ More

    Submitted 17 June, 2021; v1 submitted 22 August, 2019; originally announced August 2019.

    Comments: 27 pages, 7 figures. Some results of this paper were presented at ISIT 2018 and ITW 2019. This paper subsumes arXiv:1805.03193

  15. arXiv:1904.10059  [pdf, other

    cs.LG stat.ML

    Distributed Differentially Private Computation of Functions with Correlated Noise

    Authors: Hafiz Imtiaz, Jafar Mohammadi, Anand D. Sarwate

    Abstract: Many applications of machine learning, such as human health research, involve processing private or sensitive information. Privacy concerns may impose significant hurdles to collaboration in scenarios where there are multiple sites holding data and the goal is to estimate properties jointly across all datasets. Differentially private decentralized algorithms can provide strong privacy guarantees.… ▽ More

    Submitted 22 February, 2021; v1 submitted 22 April, 2019; originally announced April 2019.

    Comments: The manuscript is partially subsumed by arXiv:1910.12913

  16. arXiv:1903.09284  [pdf, other

    cs.LG cs.IT eess.SP stat.ML

    Learning Mixtures of Separable Dictionaries for Tensor Data: Analysis and Algorithms

    Authors: Mohsen Ghassemi, Zahra Shakeri, Anand D. Sarwate, Waheed U. Bajwa

    Abstract: This work addresses the problem of learning sparse representations of tensor data using structured dictionary learning. It proposes learning a mixture of separable dictionaries to better capture the structure of tensor data by generalizing the separable dictionary learning model. Two different approaches for learning mixture of separable dictionaries are explored and sufficient conditions for loca… ▽ More

    Submitted 13 June, 2020; v1 submitted 21 March, 2019; originally announced March 2019.

    Comments: 18 pages, 4 figures, 3 tables; Published in IEEE Trans. Signal Processing

    Journal ref: IEEE Trans. Signal Processing, vol. 68, pp. 33-48, 2020

  17. arXiv:1812.04700  [pdf, other

    stat.ML cs.IT cs.LG math.ST

    Predictive Learning on Hidden Tree-Structured Ising Models

    Authors: Konstantinos E. Nikolakakis, Dionysios S. Kalogerias, Anand D. Sarwate

    Abstract: We provide high-probability sample complexity guarantees for exact structure recovery and accurate predictive learning using noise-corrupted samples from an acyclic (tree-shaped) graphical model. The hidden variables follow a tree-structured Ising model distribution, whereas the observable variables are generated by a binary symmetric channel taking the hidden variables as its input (flipping each… ▽ More

    Submitted 16 February, 2021; v1 submitted 11 December, 2018; originally announced December 2018.

    Comments: 82 pages, 8 figures

  18. arXiv:1805.03319  [pdf, other

    cs.IT

    Quadratically Constrained Channels with Causal Adversaries

    Authors: Tongxin Li, Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate

    Abstract: We consider the problem of communication over a channel with a causal jamming adversary subject to quadratic constraints. A sender Alice wishes to communicate a message to a receiver Bob by transmitting a real-valued length-$n$ codeword $\mathbf{x}=x_1,...,x_n$ through a communication channel. Alice and Bob do not share common randomness. Knowing Alice's encoding strategy, an adversarial jammer Ja… ▽ More

    Submitted 8 May, 2018; originally announced May 2018.

    Comments: 80 pages, ISIT 2018

  19. arXiv:1805.03193  [pdf, other

    cs.IT

    Coordination Using Individually Shared Randomness

    Authors: Gowtham R. Kurri, Vinod M. Prabhakaran, Anand D. Sarwate

    Abstract: Two processors output correlated sequences using the help of a coordinator with whom they individually share independent randomness. For the case of unlimited shared randomness, we characterize the rate of communication required from the coordinator to the processors over a broadcast link. We also give an achievable trade-off between the communication and shared randomness rates.

    Submitted 8 May, 2018; originally announced May 2018.

    Comments: Extended version of a paper accepted for presentation at ISIT 2018. 8 pages, 3 figures

  20. Distributed Differentially-Private Algorithms for Matrix and Tensor Factorization

    Authors: Hafiz Imtiaz, Anand D. Sarwate

    Abstract: In many signal processing and machine learning applications, datasets containing private information are held at different locations, requiring the development of distributed privacy-preserving algorithms. Tensor and matrix factorizations are key components of many processing pipelines. In the distributed setting, differentially private algorithms suffer because they introduce noise to guarantee p… ▽ More

    Submitted 26 April, 2018; originally announced April 2018.

    Comments: 39 pages, in review for publication

    Journal ref: IEEE Journal of Selected Topics in Signal Proessing 2018

  21. Identifiability of Kronecker-structured Dictionaries for Tensor Data

    Authors: Zahra Shakeri, Anand D. Sarwate, Waheed U. Bajwa

    Abstract: This paper derives sufficient conditions for local recovery of coordinate dictionaries comprising a Kronecker-structured dictionary that is used for representing $K$th-order tensor data. Tensor observations are assumed to be generated from a Kronecker-structured dictionary multiplied by sparse coefficient tensors that follow the separable sparsity model. This work provides sufficient conditions on… ▽ More

    Submitted 25 May, 2018; v1 submitted 10 December, 2017; originally announced December 2017.

    Comments: 16 pages, to appear in IEEE Journal of Special Topics in Signal Processing

    Journal ref: IEEE J. Sel. Topics Signal Processing, vol. 12, no. 5, pp. 1047-1062, Oct. 2018

  22. arXiv:1711.04887  [pdf, other

    stat.ML cs.LG

    STARK: Structured Dictionary Learning Through Rank-one Tensor Recovery

    Authors: Mohsen Ghassemi, Zahra Shakeri, Anand D. Sarwate, Waheed U. Bajwa

    Abstract: In recent years, a class of dictionaries have been proposed for multidimensional (tensor) data representation that exploit the structure of tensor data by imposing a Kronecker structure on the dictionary underlying the data. In this work, a novel algorithm called "STARK" is provided to learn Kronecker structured dictionaries that can represent tensors of any order. By establishing that the Kroneck… ▽ More

    Submitted 13 November, 2017; originally announced November 2017.

  23. A Unified Optimization Approach for Sparse Tensor Operations on GPUs

    Authors: Bangtian Liu, Chengyao Wen, Anand D. Sarwate, Maryam Mehri Dehnavi

    Abstract: Sparse tensors appear in many large-scale applications with multidimensional and sparse data. While multidimensional sparse data often need to be processed on manycore processors, attempts to develop highly-optimized GPU-based implementations of sparse tensor operations are rare. The irregular computation patterns and sparsity structures as well as the large memory footprints of sparse tensor oper… ▽ More

    Submitted 28 May, 2017; originally announced May 2017.

  24. Minimax Lower Bounds on Dictionary Learning for Tensor Data

    Authors: Zahra Shakeri, Waheed U. Bajwa, Anand D. Sarwate

    Abstract: This paper provides fundamental limits on the sample complexity of estimating dictionaries for tensor data. The specific focus of this work is on $K$th-order tensor data and the case where the underlying dictionary can be expressed in terms of $K$ smaller dictionaries. It is assumed the data are generated by linear combinations of these structured dictionary atoms and observed through white Gaussi… ▽ More

    Submitted 18 February, 2018; v1 submitted 9 August, 2016; originally announced August 2016.

    Comments: In IEEE Transactions on Information Theory

    Journal ref: IEEE Trans. Inform. Theory, vol. 64, no. 4, pp. 2706-2726, Apr. 2018

  25. arXiv:1605.05284  [pdf, other

    cs.IT cs.LG stat.ML

    Minimax Lower Bounds for Kronecker-Structured Dictionary Learning

    Authors: Zahra Shakeri, Waheed U. Bajwa, Anand D. Sarwate

    Abstract: Dictionary learning is the problem of estimating the collection of atomic elements that provide a sparse representation of measured/collected signals or data. This paper finds fundamental limits on the sample complexity of estimating dictionaries for tensor data by proving a lower bound on the minimax risk. This lower bound depends on the dimensions of the tensor and parameters of the generative m… ▽ More

    Submitted 17 May, 2016; originally announced May 2016.

    Comments: 5 pages, 1 figure. To appear in 2016 IEEE International Symposium on Information Theory

    Journal ref: Proc. IEEE Intl. Symp. Information Theory, Barcelona, Spain, Jul. 10-15, 2016, pp. 1148-1152

  26. arXiv:1602.03571  [pdf, other

    cs.LG cs.IT stat.ML

    High Dimensional Inference with Random Maximum A-Posteriori Perturbations

    Authors: Tamir Hazan, Francesco Orabona, Anand D. Sarwate, Subhransu Maji, Tommi Jaakkola

    Abstract: This paper presents a new approach, called perturb-max, for high-dimensional statistical inference that is based on applying random perturbations followed by optimization. This framework injects randomness to maximum a-posteriori (MAP) predictors by randomly perturbing the potential function for the input. A classic result from extreme value statistics asserts that perturb-max operations generate… ▽ More

    Submitted 30 May, 2017; v1 submitted 10 February, 2016; originally announced February 2016.

    Comments: 47 pages, 10 figures, under review

  27. arXiv:1602.02384  [pdf, other

    cs.IT cs.CR

    The benefit of a 1-bit jump-start, and the necessity of stochastic encoding, in jamming channels

    Authors: Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate

    Abstract: We consider the problem of communicating a message $m$ in the presence of a malicious jamming adversary (Calvin), who can erase an arbitrary set of up to $pn$ bits, out of $n$ transmitted bits $(x_1,\ldots,x_n)$. The capacity of such a channel when Calvin is exactly causal, i.e. Calvin's decision of whether or not to erase bit $x_i$ depends on his observations $(x_1,\ldots,x_i)$ was recently chara… ▽ More

    Submitted 7 February, 2016; originally announced February 2016.

    Comments: 21 pages, 4 figures, extended draft of submission to ISIT 2016

  28. arXiv:1508.01818  [pdf, other

    cs.GT cs.CR

    Designing Incentive Schemes For Privacy-Sensitive Users

    Authors: Chong Huang, Lalitha Sankar, Anand D. Sarwate

    Abstract: Businesses (retailers) often wish to offer personalized advertisements (coupons) to individuals (consumers), but run the risk of strong reactions from consumers who want a customized shopping experience but feel their privacy has been violated. Existing models for privacy such as differential privacy or information theory try to quantify privacy risk but do not capture the subjective experience an… ▽ More

    Submitted 23 September, 2015; v1 submitted 7 August, 2015; originally announced August 2015.

    Comments: 25 pages, 10 figures, submitted to journal of privacy and confidentiality

  29. arXiv:1412.5617  [pdf, other

    cs.LG

    Learning from Data with Heterogeneous Noise using SGD

    Authors: Shuang Song, Kamalika Chaudhuri, Anand D. Sarwate

    Abstract: We consider learning from data of variable quality that may be obtained from different heterogeneous sources. Addressing learning from heterogeneous data in its full generality is a challenging problem. In this paper, we adopt instead a model in which data is observed through heterogeneous noise, where the noise level reflects the quality of the data source. We study how to use stochastic gradient… ▽ More

    Submitted 17 December, 2014; originally announced December 2014.

  30. arXiv:1409.7614  [pdf, other

    math.DS cs.MA eess.SY physics.soc-ph

    Generalized Opinion Dynamics from Local Optimization Rules

    Authors: Avhishek Chatterjee, Anand D. Sarwate, Sriram Vishwanath

    Abstract: We study generalizations of the Hegselmann-Krause (HK) model for opinion dynamics, incorporating features and parameters that are natural components of observed social systems. The first generalization is one where the strength of influence depends on the distance of the agents' opinions. Under this setup, we identify conditions under which the opinions converge in finite time, and provide a quali… ▽ More

    Submitted 25 September, 2014; originally announced September 2014.

    Comments: 20 pages, under review

  31. Redundancy of Exchangeable Estimators

    Authors: Narayana P. Santhanam, Anand D. Sarwate, Jae Oh Woo

    Abstract: Exchangeable random partition processes are the basis for Bayesian approaches to statistical inference in large alphabet settings. On the other hand, the notion of the pattern of a sequence provides an information-theoretic framework for data compression in large alphabet scenarios. Because data compression and parameter estimation are intimately related, we study the redundancy of Bayes estimator… ▽ More

    Submitted 20 October, 2014; v1 submitted 21 July, 2014; originally announced July 2014.

    Comments: 18 pages

  32. arXiv:1310.4227  [pdf, other

    cs.LG math.PR

    On Measure Concentration of Random Maximum A-Posteriori Perturbations

    Authors: Francesco Orabona, Tamir Hazan, Anand D. Sarwate, Tommi Jaakkola

    Abstract: The maximum a-posteriori (MAP) perturbation framework has emerged as a useful approach for inference and learning in high dimensional complex models. By maximizing a randomly perturbed potential function, MAP perturbations generate unbiased samples from the Gibbs distribution. Unfortunately, the computational cost of generating so many high-dimensional random variables can be prohibitive. More eff… ▽ More

    Submitted 15 October, 2013; originally announced October 2013.

  33. arXiv:1306.2347  [pdf, other

    cs.LG

    Auditing: Active Learning with Outcome-Dependent Query Costs

    Authors: Sivan Sabato, Anand D. Sarwate, Nathan Srebro

    Abstract: We propose a learning setting in which unlabeled data is free, and the cost of a label depends on its value, which is not known in advance. We study binary classification in an extreme case, where the algorithm only pays for negative labels. Our motivation are applications such as fraud detection, in which investigating an honest transaction should be avoided if possible. We term the setting audit… ▽ More

    Submitted 12 July, 2015; v1 submitted 10 June, 2013; originally announced June 2013.

    Comments: Corrections in section 5

    Journal ref: Neural Information Processing Systems 26 (NIPS), 512-520, 2013

  34. arXiv:1305.4548  [pdf, other

    math.OC cs.MA eess.SY

    Distributed Learning of Distributions via Social Sampling

    Authors: Anand D. Sarwate, Tara Javidi

    Abstract: A protocol for distributed estimation of discrete distributions is proposed. Each agent begins with a single sample from the distribution, and the goal is to learn the empirical distribution of the samples. The protocol is based on a simple message-passing model motivated by communication in social networks. Agents sample a message randomly from their current estimates of the distribution, resulti… ▽ More

    Submitted 5 June, 2014; v1 submitted 20 May, 2013; originally announced May 2013.

    Comments: 17 pages, accepted to IEEE Transactions on Automatic Control

  35. arXiv:1209.2755  [pdf, ps, other

    cs.IT

    Relaxing the Gaussian AVC

    Authors: Anand D. Sarwate, Michael Gastpar

    Abstract: The arbitrarily varying channel (AVC) is a conservative way of modeling an unknown interference, and the corresponding capacity results are pessimistic. We reconsider the Gaussian AVC by relaxing the classical model and thereby weakening the adversarial nature of the interference. We examine three different relaxations. First, we show how a very small amount of common randomness between transmitte… ▽ More

    Submitted 12 September, 2012; originally announced September 2012.

    Comments: Submitted to the IEEE Transactions on Information Theory

  36. arXiv:1207.2812  [pdf, other

    stat.ML cs.CR cs.LG

    Near-Optimal Algorithms for Differentially-Private Principal Components

    Authors: Kamalika Chaudhuri, Anand D. Sarwate, Kaushik Sinha

    Abstract: Principal components analysis (PCA) is a standard tool for identifying good low-dimensional approximations to data in high dimension. Many data sets of interest contain private or sensitive information about individuals. Algorithms which operate on such data should be sensitive to the privacy risks in publishing their outputs. Differential privacy is a framework for developing tradeoffs between pr… ▽ More

    Submitted 7 August, 2013; v1 submitted 11 July, 2012; originally announced July 2012.

    Comments: 37 pages, 8 figures; final version to appear in the Journal of Machine Learning Research, preliminary version was at NIPS 2012

  37. Upper Bounds on the Capacity of Binary Channels with Causal Adversaries

    Authors: Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate

    Abstract: In this work we consider the communication of information in the presence of a causal adversarial jammer. In the setting under study, a sender wishes to communicate a message to a receiver by transmitting a codeword $(x_1,...,x_n)$ bit-by-bit over a communication channel. The sender and the receiver do not share common randomness. The adversarial jammer can view the transmitted bits $x_i$ one at a… ▽ More

    Submitted 13 December, 2012; v1 submitted 11 April, 2012; originally announced April 2012.

    Comments: To appear in the IEEE Transactions on Information Theory; shortened version appeared at ISIT 2012

  38. arXiv:0912.0071  [pdf, ps, other

    cs.LG cs.AI cs.CR cs.DB

    Differentially Private Empirical Risk Minimization

    Authors: Kamalika Chaudhuri, Claire Monteleoni, Anand D. Sarwate

    Abstract: Privacy-preserving machine learning algorithms are crucial for the increasingly common setting in which personal data, such as medical or financial records, are analyzed. We provide general techniques to produce privacy-preserving approximations of classifiers learned via (regularized) empirical risk minimization (ERM). These algorithms are private under the $ε$-differential privacy definition due… ▽ More

    Submitted 16 February, 2011; v1 submitted 30 November, 2009; originally announced December 2009.

    Comments: 40 pages, 7 figures, accepted to the Journal of Machine Learning Research

  39. arXiv:0907.1413   

    cs.CR cs.DB cs.LG

    Privacy constraints in regularized convex optimization

    Authors: Kamalika Chaudhuri, Anand D. Sarwate

    Abstract: This paper is withdrawn due to some errors, which are corrected in arXiv:0912.0071v4 [cs.LG].

    Submitted 21 June, 2011; v1 submitted 9 July, 2009; originally announced July 2009.

    Comments: This paper has been withdrawn by the authors due to some errors. Corrections have been included in arXiv:0912.0071v4

  40. arXiv:0810.2513  [pdf, ps, other

    cs.NI cs.DC cs.IT

    The Impact of Mobility on Gossip Algorithms

    Authors: Anand D. Sarwate, Alexandros G. Dimakis

    Abstract: The influence of node mobility on the convergence time of averaging gossip algorithms in networks is studied. It is shown that a small number of fully mobile nodes can yield a significant decrease in convergence time. A method is developed for deriving lower bounds on the convergence time by merging nodes according to their mobility pattern. This method is used to show that if the agents have one-… ▽ More

    Submitted 21 June, 2011; v1 submitted 14 October, 2008; originally announced October 2008.

    Comments: Revised version submitted to IEEE Transactions on Information Theory

  41. arXiv:0711.3926  [pdf, ps, other

    cs.IT

    Rateless codes for AVC models

    Authors: Anand D. Sarwate, Michael Gastpar

    Abstract: The arbitrarily varying channel (AVC) is a channel model whose state is selected maliciously by an adversary. Fixed-blocklength coding assumes a worst-case bound on the adversary's capabilities, which leads to pessimistic results. This paper defines a variable-length perspective on this problem, for which achievable rates are shown that depend on the realized actions of the adversary. Specifical… ▽ More

    Submitted 5 October, 2009; v1 submitted 25 November, 2007; originally announced November 2007.

    Comments: 14 pages, double column, extended version of paper to appear in the IEEE Transactions on Information Theory

  42. Zero-rate feedback can achieve the empirical capacity

    Authors: Krishnan Eswaran, Anand D. Sarwate, Anant Sahai, Michael Gastpar

    Abstract: The utility of limited feedback for coding over an individual sequence of DMCs is investigated. This study complements recent results showing how limited or noisy feedback can boost the reliability of communication. A strategy with fixed input distribution $P$ is given that asymptotically achieves rates arbitrarily close to the mutual information induced by $P$ and the state-averaged channel. Wh… ▽ More

    Submitted 10 August, 2009; v1 submitted 1 November, 2007; originally announced November 2007.

    Comments: Revised version of paper originally submitted to IEEE Transactions on Information Theory, Nov. 2007. This version contains further revisions and clarifications

  43. arXiv:0709.3921  [pdf, ps, other

    cs.IT cs.NI math.PR

    Geographic Gossip: Efficient Averaging for Sensor Networks

    Authors: Alexandros G. Dimakis, Anand D. Sarwate, Martin J. Wainwright

    Abstract: Gossip algorithms for distributed computation are attractive due to their simplicity, distributed nature, and robustness in noisy and uncertain environments. However, using standard gossip algorithms can lead to a significant waste in energy by repeatedly recirculating redundant information. For realistic sensor network model topologies like grids and random geometric graphs, the inefficiency of… ▽ More

    Submitted 25 September, 2007; originally announced September 2007.

    Comments: To appear, IEEE Transactions on Signal Processing

  44. arXiv:cs/0701146  [pdf, ps, other

    cs.IT

    State constraints and list decoding for the AVC

    Authors: Anand D. Sarwate, Michael Gastpar

    Abstract: List decoding for arbitrarily varying channels (AVCs) under state constraints is investigated. It is shown that rates within $ε$ of the randomized coding capacity of AVCs with input-dependent state can be achieved under maximal error with list decoding using lists of size $O(1/ε)$. Under average error an achievable rate region and converse bound are given for lists of size $L$. These bounds are… ▽ More

    Submitted 5 October, 2009; v1 submitted 23 January, 2007; originally announced January 2007.

    Comments: 22 pages, significantly changed version submitted to IEEE Transactions on Information Theory

  45. arXiv:cs/0602071  [pdf, ps, other

    cs.IT

    Geographic Gossip: Efficient Aggregation for Sensor Networks

    Authors: Alexandros G. Dimakis, Anand D. Sarwate, Martin J. Wainwright

    Abstract: Gossip algorithms for aggregation have recently received significant attention for sensor network applications because of their simplicity and robustness in noisy and uncertain environments. However, gossip algorithms can waste significant energy by essentially passing around redundant information multiple times. For realistic sensor network model topologies like grids and random geometric graph… ▽ More

    Submitted 19 February, 2006; originally announced February 2006.

    Comments: 8 pages total; to appear in Information Processing in Sensor Networks (IPSN) 2006