Zum Hauptinhalt springen

Showing 1–50 of 62 results for author: Tyagi, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.04071  [pdf, other

    stat.ML cs.LG math.ST

    Dynamic angular synchronization under smoothness constraints

    Authors: Ernesto Araya, Mihai Cucuringu, Hemant Tyagi

    Abstract: Given an undirected measurement graph $\mathcal{H} = ([n], \mathcal{E})$, the classical angular synchronization problem consists of recovering unknown angles $θ_1^*,\dots,θ_n^*$ from a collection of noisy pairwise measurements of the form $(θ_i^* - θ_j^*) \mod 2π$, for all $\{i,j\} \in \mathcal{E}$. This problem arises in a variety of applications, including computer vision, time synchronization o… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

    Comments: 40 pages, 9 figures

  2. arXiv:2403.13230  [pdf, other

    cs.NI

    BFT-PoLoc: A Byzantine Fortified Trigonometric Proof of Location Protocol using Internet Delays

    Authors: Peiyao Sheng, Vishal Sevani, Ranvir Rana, Himanshu Tyagi, Pramod Viswanath

    Abstract: Internet platforms depend on accurately determining the geographical locations of online users to deliver targeted services (e.g., advertising). The advent of decentralized platforms (blockchains) emphasizes the importance of geographically distributed nodes, making the validation of locations more crucial. In these decentralized settings, mutually non-trusting participants need to {\em prove} the… ▽ More

    Submitted 28 March, 2024; v1 submitted 19 March, 2024; originally announced March 2024.

  3. arXiv:2402.07241  [pdf, other

    cs.CR

    Proof of Diligence: Cryptoeconomic Security for Rollups

    Authors: Peiyao Sheng, Ranvir Rana, Senthil Bala, Himanshu Tyagi, Pramod Viswanath

    Abstract: Layer 1 (L1) blockchains such as Ethereum are secured under an "honest supermajority of stake" assumption for a large pool of validators who verify each and every transaction on it. This high security comes at a scalability cost which not only effects the throughput of the blockchain but also results in high gas fees for executing transactions on chain. The most successful solution for this proble… ▽ More

    Submitted 23 July, 2024; v1 submitted 11 February, 2024; originally announced February 2024.

  4. arXiv:2311.13475  [pdf, other

    cs.CL cs.HC cs.LG

    Machine Translation to Control Formality Features in the Target Language

    Authors: Harshita Tyagi, Prashasta Jung, Hyowon Lee

    Abstract: Formality plays a significant role in language communication, especially in low-resource languages such as Hindi, Japanese and Korean. These languages utilise formal and informal expressions to convey messages based on social contexts and relationships. When a language translation technique is used to translate from a source language that does not pertain the formality (e.g. English) to a target l… ▽ More

    Submitted 22 November, 2023; originally announced November 2023.

    Comments: 9 pages, based on DCU MCM Practicum 2022/2023

  5. arXiv:2310.20609  [pdf, other

    stat.ML cs.LG math.ST

    Graph Matching via convex relaxation to the simplex

    Authors: Ernesto Araya Valdivia, Hemant Tyagi

    Abstract: This paper addresses the Graph Matching problem, which consists of finding the best possible alignment between two input graphs, and has many applications in computer vision, network deanonymization and protein alignment. A common approach to tackle this problem is through convex relaxations of the NP-hard \emph{Quadratic Assignment Problem} (QAP). Here, we introduce a new convex relaxation onto… ▽ More

    Submitted 9 August, 2024; v1 submitted 31 October, 2023; originally announced October 2023.

    Comments: We fixed some typos and added Lemma 4. Reference to the published version below. Added link to the code

    Journal ref: Ernesto Araya, Hemant Tyagi. Graph Matching via convex relaxation to the simplex. Foundations of Data Science.2024

  6. arXiv:2307.16562  [pdf, other

    cs.CR

    SAKSHI: Decentralized AI Platforms

    Authors: Suma Bhat, Canhui Chen, Zerui Cheng, Zhixuan Fang, Ashwin Hebbar, Sreeram Kannan, Ranvir Rana, Peiyao Sheng, Himanshu Tyagi, Pramod Viswanath, Xuechao Wang

    Abstract: Large AI models (e.g., Dall-E, GPT4) have electrified the scientific, technological and societal landscape through their superhuman capabilities. These services are offered largely in a traditional web2.0 format (e.g., OpenAI's GPT4 service). As more large AI models proliferate (personalizing and specializing to a variety of domains), there is a tremendous need to have a neutral trust-free platfor… ▽ More

    Submitted 31 July, 2023; originally announced July 2023.

    Comments: 23 pages, 9 figures

  7. arXiv:2307.02641  [pdf, other

    cs.RO cs.CV cs.LG

    Active Class Selection for Few-Shot Class-Incremental Learning

    Authors: Christopher McClurg, Ali Ayub, Harsh Tyagi, Sarah M. Rajtmajer, Alan R. Wagner

    Abstract: For real-world applications, robots will need to continually learn in their environments through limited interactions with their users. Toward this, previous works in few-shot class incremental learning (FSCIL) and active class selection (ACS) have achieved promising results but were tested in constrained setups. Therefore, in this paper, we combine ideas from FSCIL and ACS to develop a novel fram… ▽ More

    Submitted 5 July, 2023; originally announced July 2023.

    Comments: Accepted at the Conference on Lifelong Learning Agents (CoLLAs), 2023

  8. arXiv:2212.09980  [pdf, ps, other

    cs.LG cs.CR

    Continual Mean Estimation Under User-Level Privacy

    Authors: Anand Jerry George, Lekshmi Ramesh, Aditya Vikram Singh, Himanshu Tyagi

    Abstract: We consider the problem of continually releasing an estimate of the population mean of a stream of samples that is user-level differentially private (DP). At each time instant, a user contributes a sample, and the users can arrive in arbitrary order. Until now these requirements of continual release and user-level privacy were considered in isolation. But, in practice, both these requirements come… ▽ More

    Submitted 19 December, 2022; originally announced December 2022.

  9. arXiv:2210.11546  [pdf, other

    cs.CR cs.NI

    Proof of Backhaul: Trustfree Measurement of Broadband Bandwidth

    Authors: Peiyao Sheng, Nikita Yadav, Vishal Sevani, Arun Babu, SVR Anand, Himanshu Tyagi, Pramod Viswanath

    Abstract: Recent years have seen the emergence of decentralized wireless networks consisting of nodes hosted by many individuals and small enterprises, reawakening the decades-old dream of open networking. These networks have been deployed in an organic, distributed manner and are driven by new economic models resting on tokenized incentives. A critical requirement for the incentives to scale is the ability… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

  10. arXiv:2203.06870  [pdf, ps, other

    cs.DS cs.DM cs.IT cs.LG math.ST

    The Role of Interactivity in Structured Estimation

    Authors: Jayadev Acharya, Clément L. Canonne, Ziteng Sun, Himanshu Tyagi

    Abstract: We study high-dimensional sparse estimation under three natural constraints: communication constraints, local privacy constraints, and linear measurements (compressive sensing). Without sparsity assumptions, it has been established that interactivity cannot improve the minimax rates of estimation under these information constraints. The question of whether interactivity helps with natural inferenc… ▽ More

    Submitted 14 March, 2022; originally announced March 2022.

  11. arXiv:2112.10467  [pdf, other

    stat.ML cs.LG math.ST

    An iterative clustering algorithm for the Contextual Stochastic Block Model with optimality guarantees

    Authors: Guillaume Braun, Hemant Tyagi, Christophe Biernacki

    Abstract: Real-world networks often come with side information that can help to improve the performance of network analysis tasks such as clustering. Despite a large number of empirical and theoretical studies conducted on network clustering methods during the past decade, the added value of side information and the methods used to incorporate it optimally in clustering algorithms are relatively less unders… ▽ More

    Submitted 28 July, 2022; v1 submitted 20 December, 2021; originally announced December 2021.

    Journal ref: Proceedings of the 39th International Conference on Machine Learning, PMLR 162:2257-2291, 2022

  12. arXiv:2109.05222  [pdf, ps, other

    cs.IT cs.LG eess.SP stat.ML

    Fundamental limits of over-the-air optimization: Are analog schemes optimal?

    Authors: Shubham K Jha, Prathamesh Mayekar, Himanshu Tyagi

    Abstract: We consider over-the-air convex optimization on a $d-$dimensional space where coded gradients are sent over an additive Gaussian noise channel with variance $σ^2$. The codewords satisfy an average power constraint $P$, resulting in the signal-to-noise ratio (SNR) of $P/σ^2$. We derive bounds for the convergence rates for over-the-air optimization. Our first result is a lower bound for the converge… ▽ More

    Submitted 15 September, 2021; v1 submitted 11 September, 2021; originally announced September 2021.

    Comments: Few typos fixed and one reference added. An abridged version of this paper will appear in the proceedings of IEEE Global Communications Conference (GLOBECOM), Spain, 2021

  13. arXiv:2107.10078  [pdf, other

    math.ST cs.DS cs.IT

    Optimal Rates for Nonparametric Density Estimation under Communication Constraints

    Authors: Jayadev Acharya, Clément L. Canonne, Aditya Vikram Singh, Himanshu Tyagi

    Abstract: We consider density estimation for Besov spaces when each sample is quantized to only a limited number of bits. We provide a noninteractive adaptive estimator that exploits the sparsity of wavelet bases, along with a simulate-and-infer technique from parametric estimation under communication constraints. We show that our estimator is nearly rate-optimal by deriving minimax lower bounds that hold e… ▽ More

    Submitted 21 July, 2021; originally announced July 2021.

  14. Multiple Support Recovery Using Very Few Measurements Per Sample

    Authors: Lekshmi Ramesh, Chandra R. Murthy, Himanshu Tyagi

    Abstract: In the problem of multiple support recovery, we are given access to linear measurements of multiple sparse samples in $\mathbb{R}^{d}$. These samples can be partitioned into $\ell$ groups, with samples having the same support belonging to the same group. For a given budget of $m$ measurements per sample, the goal is to recover the $\ell$ underlying supports, in the absence of the knowledge of grou… ▽ More

    Submitted 20 May, 2021; originally announced May 2021.

  15. arXiv:2104.00979  [pdf, ps, other

    math.OC cs.DS cs.IT

    Information-constrained optimization: can adaptive processing of gradients help?

    Authors: Jayadev Acharya, Clément L. Canonne, Prathamesh Mayekar, Himanshu Tyagi

    Abstract: We revisit first-order optimization under local information constraints such as local privacy, gradient quantization, and computational constraints limiting access to a few coordinates of the gradient. In this setting, the optimization algorithm is not allowed to directly access the complete output of the gradient oracle, but only gets limited information about it subject to the local information… ▽ More

    Submitted 2 April, 2021; originally announced April 2021.

  16. arXiv:2103.03235  [pdf, other

    stat.ML cs.LG math.ST

    Clustering multilayer graphs with missing nodes

    Authors: Guillaume Braun, Hemant Tyagi, Christophe Biernacki

    Abstract: Relationship between agents can be conveniently represented by graphs. When these relationships have different modalities, they are better modelled by multilayer graphs where each layer is associated with one modality. Such graphs arise naturally in many contexts including biological and social networks. Clustering is a fundamental problem in network analysis where the goal is to regroup nodes wit… ▽ More

    Submitted 4 March, 2021; originally announced March 2021.

    Comments: 27 pages, 7 figures, accepted to AISTATS 2021

  17. arXiv:2102.00235  [pdf, other

    cs.IT

    Phase Transitions for Support Recovery from Gaussian Linear Measurements

    Authors: Lekshmi Ramesh, Chandra R. Murthy, Himanshu Tyagi

    Abstract: We study the problem of recovering the common $k$-sized support of a set of $n$ samples of dimension $d$, using $m$ noisy linear measurements per sample. Most prior work has focused on the case when $m$ exceeds $k$, in which case $n$ of the order $(k/m)\log(d/k)$ is both necessary and sufficient. Thus, in this regime, only the total number of measurements across the samples matter, and there is no… ▽ More

    Submitted 12 May, 2021; v1 submitted 30 January, 2021; originally announced February 2021.

  18. arXiv:2101.07981  [pdf, ps, other

    cs.DS cs.CR cs.DM math.ST

    Inference under Information Constraints III: Local Privacy Constraints

    Authors: Jayadev Acharya, Clément L. Canonne, Cody Freitag, Ziteng Sun, Himanshu Tyagi

    Abstract: We study goodness-of-fit and independence testing of discrete distributions in a setting where samples are distributed across multiple users. The users wish to preserve the privacy of their data while enabling a central server to perform the tests. Under the notion of local differential privacy, we propose simple, sample-optimal, and communication-efficient protocols for these two questions in the… ▽ More

    Submitted 20 January, 2021; originally announced January 2021.

    Comments: To appear in the Special Issue on Privacy and Security of Information Systems of the IEEE Journal on Selected Areas in Information Theory (JSAIT), 2021. Journal version of the AISTATS'19 paper "Test without Trust: Optimal Locally Private Distribution Testing" (arXiv:1808.02174), which it extends and supersedes

  19. arXiv:2012.14932  [pdf, other

    stat.ML cs.IT cs.LG math.NA

    An extension of the angular synchronization problem to the heterogeneous setting

    Authors: Mihai Cucuringu, Hemant Tyagi

    Abstract: Given an undirected measurement graph $G = ([n], E)$, the classical angular synchronization problem consists of recovering unknown angles $θ_1,\dots,θ_n$ from a collection of noisy pairwise measurements of the form $(θ_i - θ_j) \mod 2π$, for each $\{i,j\} \in E$. This problem arises in a variety of applications, including computer vision, time synchronization of distributed networks, and ranking f… ▽ More

    Submitted 4 January, 2021; v1 submitted 29 December, 2020; originally announced December 2020.

    Comments: 45 pages, 17 figures

  20. arXiv:2011.12160  [pdf, ps, other

    cs.IT cs.LG stat.ML

    Wyner-Ziv Estimators for Distributed Mean Estimation with Side Information and Optimization

    Authors: Prathamesh Mayekar, Shubham Jha, Ananda Theertha Suresh, Himanshu Tyagi

    Abstract: Communication efficient distributed mean estimation is an important primitive that arises in many distributed learning and optimization scenarios such as federated learning. Without any probabilistic assumptions on the underlying data, we study the problem of distributed mean estimation where the server has access to side information. We propose \emph{Wyner-Ziv estimators}, which are communication… ▽ More

    Submitted 14 November, 2022; v1 submitted 24 November, 2020; originally announced November 2020.

  21. arXiv:2011.01737  [pdf, other

    stat.ML cs.LG math.ST

    Regularized spectral methods for clustering signed networks

    Authors: Mihai Cucuringu, Apoorv Vikram Singh, Déborah Sulem, Hemant Tyagi

    Abstract: We study the problem of $k$-way clustering in signed graphs. Considerable attention in recent years has been devoted to analyzing and modeling signed graphs, where the affinity measure between nodes takes either positive or negative values. Recently, Cucuringu et al. [CDGT 2019] proposed a spectral method, namely SPONGE (Signed Positive over Negative Generalized Eigenproblem), which casts the clus… ▽ More

    Submitted 3 November, 2020; originally announced November 2020.

    Comments: 55 pages, 5 figures

  22. arXiv:2010.06562  [pdf, ps, other

    cs.DS cs.DM cs.IT cs.LG math.ST

    Unified lower bounds for interactive high-dimensional estimation under information constraints

    Authors: Jayadev Acharya, Clément L. Canonne, Ziteng Sun, Himanshu Tyagi

    Abstract: We consider distributed parameter estimation using interactive protocols subject to local information constraints such as bandwidth limitations, local differential privacy, and restricted measurements. We provide a unified framework enabling us to derive a variety of (tight) minimax lower bounds for different parametric families of distributions, both continuous and discrete, under any $\ell_p$ lo… ▽ More

    Submitted 15 November, 2022; v1 submitted 13 October, 2020; originally announced October 2020.

    Comments: Streamline some statements; add the low-privacy corollary (high value of the privacy parameter) for Corollary 1, along with the implications for the applications considered; add the upper bound for the low-privacy regimes for Bernoulli (Theorem 3) and Gaussian (Theorem 4); slightly improve Lemma 5 by relaxing the independence assumption

  23. arXiv:2010.04955  [pdf, other

    cs.CR

    A Distributed Hierarchy Framework for Enhancing Cyber Security of Control Center Applications

    Authors: Chetan Kumar Kuraganti, Bryan Paul Robert, Gurunath Gurrala, Ashish Joglekar, Arun Babu Puthuparambil, Rajesh Sundaresan, Himanshu Tyagi

    Abstract: Recent cyber-attacks on power grids highlight the necessity to protect the critical functionalities of a control center vital for the safe operation of a grid. Even in a distributed framework one central control center acts as a coordinator in majority of the control center architectures. Such a control center can become a prime target for cyber as well as physical attacks, and, hence, a single po… ▽ More

    Submitted 10 October, 2020; originally announced October 2020.

  24. arXiv:2007.10976  [pdf, ps, other

    cs.DS cs.DM cs.IT cs.LG math.ST

    Interactive Inference under Information Constraints

    Authors: Jayadev Acharya, Clément L. Canonne, Yuhan Liu, Ziteng Sun, Himanshu Tyagi

    Abstract: We study the role of interactivity in distributed statistical inference under information constraints, e.g., communication constraints and local differential privacy. We focus on the tasks of goodness-of-fit testing and estimation of discrete distributions. From prior work, these tasks are well understood under noninteractive protocols. Extending these approaches directly for interactive protocols… ▽ More

    Submitted 23 October, 2021; v1 submitted 21 July, 2020; originally announced July 2020.

    Comments: Modifying the proof and statement of Proposition 24 to address an issue in the variance analysis

  25. arXiv:2005.10571  [pdf, other

    cs.IT

    Communication Complexity of Distributed High Dimensional Correlation Testing

    Authors: K. R. Sahasranand, Himanshu Tyagi

    Abstract: Two parties observe independent copies of a $d$-dimensional vector and a scalar. They seek to test if their data is correlated or not, namely they seek to test if the norm $\|ρ\|_2$ of the correlation vector $ρ$ between their observations exceeds $τ$ or is it $0$. To that end, they communicate interactively and declare the output of the test. We show that roughly order $d/τ^2$ bits of communicatio… ▽ More

    Submitted 21 May, 2020; originally announced May 2020.

    Comments: 30 pages, 1 figure

  26. arXiv:2004.12782  [pdf, other

    cs.SI cs.LG q-bio.PE stat.AP stat.ML

    How Reliable are Test Numbers for Revealing the COVID-19 Ground Truth and Applying Interventions?

    Authors: Aditya Gopalan, Himanshu Tyagi

    Abstract: The number of confirmed cases of COVID-19 is often used as a proxy for the actual number of ground truth COVID-19 infected cases in both public discourse and policy making. However, the number of confirmed cases depends on the testing policy, and it is important to understand how the number of positive cases obtained using different testing policies reveals the unknown ground truth. We develop an… ▽ More

    Submitted 24 April, 2020; originally announced April 2020.

  27. Tracking an Auto-Regressive Process with Limited Communication per Unit Time

    Authors: Rooji Jinan, Parimal Parag, Himanshu Tyagi

    Abstract: Samples from a high-dimensional AR[1] process are observed by a sender which can communicate only finitely many bits per unit time to a receiver. The receiver seeks to form an estimate of the process value at every time instant in real-time. We consider a time-slotted communication model in a slow-sampling regime where multiple communication slots occur between two sampling instants. We propose a… ▽ More

    Submitted 22 March, 2020; originally announced March 2020.

    Report number: Entropy 2021, 23(3), 347

    Journal ref: Entropy 2021, 23(3), 347

  28. arXiv:2001.09032  [pdf, ps, other

    cs.IT

    Limits on Gradient Compression for Stochastic Optimization

    Authors: Prathamesh Mayekar, Himanshu Tyagi

    Abstract: We consider stochastic optimization over $\ell_p$ spaces using access to a first-order oracle. We ask: {What is the minimum precision required for oracle outputs to retain the unrestricted convergence rates?} We characterize this precision for every $p\geq 1$ by deriving information theoretic lower bounds and by providing quantizers that (almost) achieve these lower bounds. Our quantizers are new… ▽ More

    Submitted 24 January, 2020; originally announced January 2020.

  29. arXiv:1912.11247  [pdf, ps, other

    cs.IT

    Sample-Measurement Tradeoff in Support Recovery under a Subgaussian Prior

    Authors: Lekshmi Ramesh, Chandra R Murthy, Himanshu Tyagi

    Abstract: Data samples from $\mathbb{R}^{d}$ with a common support of size $k$ are accessed through $m$ random linear projections (measurements) per sample. It is well-known that roughly $k$ measurements from a single sample are sufficient to recover the support. In the multiple sample setting, do $k$ overall measurements still suffice when only $m$ measurements per sample are allowed, with $m<k$? We answer… ▽ More

    Submitted 19 September, 2020; v1 submitted 24 December, 2019; originally announced December 2019.

    Comments: A preliminary version of this paper appeared at IEEE International Symposium on Information Theory 2019

  30. arXiv:1908.08200  [pdf, ps, other

    cs.LG cs.IT math.OC stat.ML

    RATQ: A Universal Fixed-Length Quantizer for Stochastic Optimization

    Authors: Prathamesh Mayekar, Himanshu Tyagi

    Abstract: We present Rotated Adaptive Tetra-iterated Quantizer (RATQ), a fixed-length quantizer for gradients in first order stochastic optimization. RATQ is easy to implement and involves only a Hadamard transform computation and adaptive uniform quantization with appropriately chosen dynamic ranges. For noisy gradients with almost surely bounded Euclidean norms, we establish an information theoretic lower… ▽ More

    Submitted 16 December, 2019; v1 submitted 22 August, 2019; originally announced August 2019.

  31. arXiv:1907.08743  [pdf, ps, other

    cs.DS cs.DM cs.IT cs.LG math.ST

    Domain Compression and its Application to Randomness-Optimal Distributed Goodness-of-Fit

    Authors: Jayadev Acharya, Clément L. Canonne, Yanjun Han, Ziteng Sun, Himanshu Tyagi

    Abstract: We study goodness-of-fit of discrete distributions in the distributed setting, where samples are divided between multiple users who can only release a limited amount of information about their samples due to various information constraints. Recently, a subset of the authors showed that having access to a common random seed (i.e., shared randomness) leads to a significant reduction in the sample co… ▽ More

    Submitted 19 July, 2019; originally announced July 2019.

  32. arXiv:1906.02746  [pdf, other

    stat.ML cs.LG math.ST

    Ranking and synchronization from pairwise measurements via SVD

    Authors: Alexandre d'Aspremont, Mihai Cucuringu, Hemant Tyagi

    Abstract: Given a measurement graph $G= (V,E)$ and an unknown signal $r \in \mathbb{R}^n$, we investigate algorithms for recovering $r$ from pairwise measurements of the form $r_i - r_j$; $\{i,j\} \in E$. This problem arises in a variety of applications, such as ranking teams in sports data and time synchronization of distributed networks. Framed in the context of ranking, the task is to recover the ranking… ▽ More

    Submitted 7 August, 2020; v1 submitted 6 June, 2019; originally announced June 2019.

    Comments: 49 pages, 10 figures

  33. arXiv:1905.08302  [pdf, ps, other

    cs.DS cs.DM cs.IT cs.LG math.ST

    Inference under Information Constraints II: Communication Constraints and Shared Randomness

    Authors: Jayadev Acharya, Clément L. Canonne, Himanshu Tyagi

    Abstract: A central server needs to perform statistical inference based on samples that are distributed over multiple users who can each send a message of limited length to the center. We study problems of distribution learning and identity testing in this distributed inference setting and examine the role of shared randomness as a resource. We propose a general-purpose simulate-and-infer strategy that uses… ▽ More

    Submitted 1 October, 2020; v1 submitted 20 May, 2019; originally announced May 2019.

    Comments: To appear in IEEE Transactions on Information Theory. An abridged version of this work appeared in the 2019 International Conference on Machine Learning (ICML)

  34. arXiv:1904.09563  [pdf, other

    cs.IT

    Communication for Generating Correlation: A Unifying Survey

    Authors: Madhu Sudan, Himanshu Tyagi, Shun Watanabe

    Abstract: The task of manipulating correlated random variables in a distributed setting has received attention in the fields of both Information Theory and Computer Science. Often shared correlations can be converted, using a little amount of communication, into perfectly shared uniform random variables. Such perfect shared randomness, in turn, enables the solutions of many tasks. Even the reverse conversio… ▽ More

    Submitted 2 October, 2019; v1 submitted 21 April, 2019; originally announced April 2019.

    Comments: A review article to appear in IEEE Transactions on Information Theory

  35. arXiv:1904.08575  [pdf, other

    stat.ML cs.LG math.ST

    SPONGE: A generalized eigenproblem for clustering signed networks

    Authors: Mihai Cucuringu, Peter Davies, Aldo Glielmo, Hemant Tyagi

    Abstract: We introduce a principled and theoretically sound spectral method for $k$-way clustering in signed graphs, where the affinity measure between nodes takes either positive or negative values. Our approach is motivated by social balance theory, where the task of clustering aims to decompose the network into disjoint groups, such that individuals within the same group are connected by as many positive… ▽ More

    Submitted 19 May, 2019; v1 submitted 17 April, 2019; originally announced April 2019.

    Comments: 33 pages, 18 figures

    Journal ref: AISTATS 2019

  36. arXiv:1902.08970  [pdf, ps, other

    cs.IT

    Secret Key Capacity For Multipleaccess Channel With Public Feedback

    Authors: Himanshu Tyagi, Shun Watanabe

    Abstract: We consider the generation of a secret key (SK) by the inputs and the output of a secure multipleaccess channel (MAC) that additionally have access to a noiseless public communication channel. Under specific restrictions on the protocols, we derive various upper bounds on the rate of such SKs. Specifically, if the public communication consists of only the feedback from the output terminal, then th… ▽ More

    Submitted 24 February, 2019; originally announced February 2019.

    Comments: This paper was presented at Allerton 2013. We were hoping to extend the results further, but it is clear that this is not going to happen soon. Now is as good a time as any for sharing this on arXiv. The results will be of interest for anyone working on secret key agreement or common randomness generation

  37. arXiv:1901.11105  [pdf, ps, other

    cs.IT

    A New Proof of Nonsignalling Multiprover Parallel Repetition Theorem

    Authors: Himanshu Tyagi, Shun Watanabe

    Abstract: We present an information theoretic proof of the nonsignalling multiprover parallel repetition theorem, a recent extension of its two-prover variant that underlies many hardness of approximation results. The original proofs used de Finetti type decomposition for strategies. We present a new proof that is based on a technique we introduced recently for proving strong converse results in multiuser i… ▽ More

    Submitted 30 January, 2019; originally announced January 2019.

  38. arXiv:1812.11476  [pdf, other

    cs.DS cs.DM cs.IT cs.LG math.ST

    Inference under Information Constraints I: Lower Bounds from Chi-Square Contraction

    Authors: Jayadev Acharya, Clément L. Canonne, Himanshu Tyagi

    Abstract: Multiple players are each given one independent sample, about which they can only provide limited information to a central referee. Each player is allowed to describe its observed sample to the referee using a channel from a family of channels $\mathcal{W}$, which can be instantiated to capture both the communication- and privacy-constrained settings and beyond. The referee uses the messages from… ▽ More

    Submitted 1 October, 2020; v1 submitted 30 December, 2018; originally announced December 2018.

    Comments: To appear in IEEE Transactions on Information Theory

  39. Optimal Source Codes for Timely Updates

    Authors: Prathamesh Mayekar, Parimal Parag, Himanshu Tyagi

    Abstract: A transmitter observing a sequence of independent and identically distributed random variables seeks to keep a receiver updated about its latest observations. The receiver need not be apprised about each symbol seen by the transmitter, but needs to output a symbol at each time instant $t$. If at time $t$ the receiver outputs the symbol seen by the transmitter at time $U(t)\leq t$, the age of infor… ▽ More

    Submitted 27 March, 2020; v1 submitted 12 October, 2018; originally announced October 2018.

    Comments: Added a missing reference, in IEEE Transactions on Information Theory, 2020

    Journal ref: IEEE Transactions on Information Theory, vol. 66, no. 6, pp. 3714--3731, June 2020

  40. arXiv:1808.02174  [pdf, ps, other

    cs.DS cs.CR cs.DM cs.LG math.ST

    Test without Trust: Optimal Locally Private Distribution Testing

    Authors: Jayadev Acharya, Clément L. Canonne, Cody Freitag, Himanshu Tyagi

    Abstract: We study the problem of distribution testing when the samples can only be accessed using a locally differentially private mechanism and focus on two representative testing questions of identity (goodness-of-fit) and independence testing for discrete distributions. We are concerned with two settings: First, when we insist on using an already deployed, general-purpose locally differentially private… ▽ More

    Submitted 6 August, 2018; originally announced August 2018.

  41. arXiv:1807.02862  [pdf, other

    cs.IT math.NA

    Multi-kernel unmixing and super-resolution using the Modified Matrix Pencil method

    Authors: Stéphane Chrétien, Hemant Tyagi

    Abstract: Consider $L$ groups of point sources or spike trains, with the $l^{\text{th}}$ group represented by $x_l(t)$. For a function $g:\mathbb{R} \rightarrow \mathbb{R}$, let $g_l(t) = g(t/μ_l)$ denote a point spread function with scale $μ_l > 0$, and with $μ_1 < \cdots < μ_L$. With $y(t) = \sum_{l=1}^{L} (g_l \star x_l)(t)$, our goal is to recover the source parameters given samples of $y$, or given the… ▽ More

    Submitted 7 January, 2020; v1 submitted 8 July, 2018; originally announced July 2018.

    Comments: 50 pages, 10 figures, made notational changes and corrected typos after reviewer feedback, to appear in Journal of Fourier Analysis and Applications

  42. arXiv:1805.04625  [pdf, ps, other

    cs.IT

    Strong Converse using Change of Measure Arguments

    Authors: Himanshu Tyagi, Shun Watanabe

    Abstract: The strong converse for a coding theorem shows that the optimal asymptotic rate possible with vanishing error cannot be improved by allowing a fixed error. Building on a method introduced by Gu and Effros for centralized coding problems, we develop a general and simple recipe for proving strong converse that is applicable for distributed problems as well. Heuristically, our proof of strong convers… ▽ More

    Submitted 21 August, 2019; v1 submitted 11 May, 2018; originally announced May 2018.

    Comments: 35 pages, no figure; v2 updated references

  43. arXiv:1804.06952  [pdf, ps, other

    cs.DS cs.DM cs.IT cs.LG math.ST

    Distributed Simulation and Distributed Inference

    Authors: Jayadev Acharya, Clément L. Canonne, Himanshu Tyagi

    Abstract: Independent samples from an unknown probability distribution $\bf p$ on a domain of size $k$ are distributed across $n$ players, with each player holding one sample. Each player can communicate $\ell$ bits to a central referee in a simultaneous message passing model of communication to help the referee infer a property of the unknown $\bf p$. What is the least number of players for inference requi… ▽ More

    Submitted 23 May, 2019; v1 submitted 18 April, 2018; originally announced April 2018.

    Comments: This work is superseded by the more recent "Inference under Information Constraints II: Communication Constraints and Shared Randomness" (arXiv:1905.08302), by the same authors

  44. arXiv:1804.01490  [pdf, ps, other

    math.OC cs.IT

    Sparse non-negative super-resolution -- simplified and stabilised

    Authors: Armin Eftekhari, Jared Tanner, Andrew Thompson, Bogdan Toader, Hemant Tyagi

    Abstract: The convolution of a discrete measure, $x=\sum_{i=1}^ka_iδ_{t_i}$, with a local window function, $φ(s-t)$, is a common model for a measurement device whose resolution is substantially lower than that of the objects being observed. Super-resolution concerns localising the point sources $\{a_i,t_i\}_{i=1}^k$ with an accuracy beyond the essential support of $φ(s-t)$, typically from $m$ samples… ▽ More

    Submitted 26 November, 2019; v1 submitted 4 April, 2018; originally announced April 2018.

    Comments: 59 pages, 7 figures

  45. arXiv:1605.01033  [pdf, other

    cs.IT

    Universal Multiparty Data Exchange and Secret Key Agreement

    Authors: Himanshu Tyagi, Shun Watanabe

    Abstract: Multiple parties observing correlated data seek to recover each other's data and attain omniscience. To that end, they communicate interactively over a noiseless broadcast channel - each bit transmitted over this channel is received by all the parties. We give a universal interactive communication protocol, termed the recursive data exchange protocol (RDE), which attains omniscience for any sequen… ▽ More

    Submitted 23 January, 2017; v1 submitted 3 May, 2016; originally announced May 2016.

  46. arXiv:1605.00609  [pdf, other

    cs.LG cs.IT math.NA stat.ML

    Algorithms for Learning Sparse Additive Models with Interactions in High Dimensions

    Authors: Hemant Tyagi, Anastasios Kyrillidis, Bernd Gärtner, Andreas Krause

    Abstract: A function $f: \mathbb{R}^d \rightarrow \mathbb{R}$ is a Sparse Additive Model (SPAM), if it is of the form $f(\mathbf{x}) = \sum_{l \in \mathcal{S}}φ_{l}(x_l)$ where $\mathcal{S} \subset [d]$, $|\mathcal{S}| \ll d$. Assuming $φ$'s, $\mathcal{S}$ to be unknown, there exists extensive work for estimating $f$ from its samples. In this work, we consider a generalized version of SPAMs, that also allow… ▽ More

    Submitted 8 May, 2017; v1 submitted 2 May, 2016; originally announced May 2016.

    Comments: To appear in Information and Inference: A Journal of the IMA. Made following changes after review process: (a) Corrected typos throughout the text. (b) Corrected choice of sampling distribution in Section 5, see eqs. (5.2), (5.3). (c) More detailed comparison with existing work in Section 8. (d) Added Section B in appendix on roots of cubic equation

  47. arXiv:1604.05307  [pdf, other

    cs.LG cs.IT stat.ML

    Learning Sparse Additive Models with Interactions in High Dimensions

    Authors: Hemant Tyagi, Anastasios Kyrillidis, Bernd Gärtner, Andreas Krause

    Abstract: A function $f: \mathbb{R}^d \rightarrow \mathbb{R}$ is referred to as a Sparse Additive Model (SPAM), if it is of the form $f(\mathbf{x}) = \sum_{l \in \mathcal{S}}φ_{l}(x_l)$, where $\mathcal{S} \subset [d]$, $|\mathcal{S}| \ll d$. Assuming $φ_l$'s and $\mathcal{S}$ to be unknown, the problem of estimating $f$ from its samples has been studied extensively. In this work, we consider a generalized… ▽ More

    Submitted 18 April, 2016; originally announced April 2016.

    Comments: 23 pages, to appear in Proceedings of the 19th International Conference on Artificial Intelligence and Statistics (AISTATS) 2016

  48. arXiv:1601.03617  [pdf, other

    cs.IT

    Interactive Communication for Data Exchange

    Authors: Himanshu Tyagi, Pramod Viswanath, Shun Watanabe

    Abstract: Two parties observing correlated data seek to exchange their data using interactive communication. How many bits must they communicate? We propose a new interactive protocol for data exchange which increases the communication size in steps until the task is done. Next, we derive a lower bound on the minimum number of bits that is based on relating the data exchange problem to the secret key agreem… ▽ More

    Submitted 11 November, 2017; v1 submitted 14 January, 2016; originally announced January 2016.

    Comments: 13 pages (two column), 4 figures, a longer version of ISIT 2015

  49. arXiv:1504.05666  [pdf, other

    cs.IT cs.CC

    Information Complexity Density and Simulation of Protocols

    Authors: Himanshu Tyagi, Shaileshh Venkatakrishnan, Pramod Viswanath, Shun Watanabe

    Abstract: Two parties observing correlated random variables seek to run an interactive communication protocol. How many bits must they exchange to simulate the protocol, namely to produce a view with a joint distribution within a fixed statistical distance of the joint distribution of the input and the transcript of the original protocol? We present an information spectrum approach for this problem whereby… ▽ More

    Submitted 29 January, 2016; v1 submitted 22 April, 2015; originally announced April 2015.

    Comments: Submitted to the IEEE Transactions on Information Theory

  50. arXiv:1412.4958  [pdf, other

    cs.IT

    Universal Hashing for Information Theoretic Security

    Authors: Himanshu Tyagi, Alexander Vardy

    Abstract: The information theoretic approach to security entails harnessing the correlated randomness available in nature to establish security. It uses tools from information theory and coding and yields provable security, even against an adversary with unbounded computational power. However, the feasibility of this approach in practice depends on the development of efficiently implementable schemes. In th… ▽ More

    Submitted 22 March, 2016; v1 submitted 16 December, 2014; originally announced December 2014.

    Comments: Corrected an error in the proof of Lemma 6