Skip to main content

Showing 1–15 of 15 results for author: Thaker, P

.
  1. arXiv:2507.17895  [pdf, ps, other

    cs.LG cs.CR

    Lower Bounds for Public-Private Learning under Distribution Shift

    Authors: Amrith Setlur, Pratiksha Thaker, Jonathan Ullman

    Abstract: The most effective differentially private machine learning algorithms in practice rely on an additional source of purportedly public data. This paradigm is most interesting when the two sources combine to be more than the sum of their parts. However, there are settings such as mean estimation where we have strong lower bounds, showing that when the two data sources have the same distribution, ther… ▽ More

    Submitted 23 July, 2025; originally announced July 2025.

    Comments: Preprint

  2. arXiv:2506.18728  [pdf, ps, other

    cs.LG

    PARALLELPROMPT: Extracting Parallelism from Large Language Model Queries

    Authors: Steven Kolawole, Keshav Santhanam, Virginia Smith, Pratiksha Thaker

    Abstract: LLM serving systems typically treat user prompts as monolithic inputs, optimizing inference through decoding tricks or inter-query batching. However, many real-world prompts contain latent semantic parallelism--decomposable structures where subtasks can be executed independently to reduce latency while preserving meaning. We introduce PARALLELPROMPT, the first benchmark for measuring intra-query p… ▽ More

    Submitted 20 October, 2025; v1 submitted 23 June, 2025; originally announced June 2025.

    Comments: 39th Conference on Neural Information Processing Systems (NeurIPS 2025) Datasets and Benchmarks Track

  3. arXiv:2506.15699  [pdf, ps, other

    cs.LG cs.AI

    BLUR: A Benchmark for LLM Unlearning Robust to Forget-Retain Overlap

    Authors: Shengyuan Hu, Neil Kale, Pratiksha Thaker, Yiwei Fu, Steven Wu, Virginia Smith

    Abstract: Machine unlearning has the potential to improve the safety of large language models (LLMs) by removing sensitive or harmful information post hoc. A key challenge in unlearning involves balancing between forget quality (effectively unlearning undesirable information) and retain quality (maintaining good performance on other, general tasks). Unfortunately, as we show, current LLM unlearning benchmar… ▽ More

    Submitted 28 May, 2025; originally announced June 2025.

  4. arXiv:2506.15349  [pdf, ps, other

    cs.LG cs.CR

    Enhancing One-run Privacy Auditing with Quantile Regression-Based Membership Inference

    Authors: Terrance Liu, Matteo Boglioni, Yiwei Fu, Shengyuan Hu, Pratiksha Thaker, Zhiwei Steven Wu

    Abstract: Differential privacy (DP) auditing aims to provide empirical lower bounds on the privacy guarantees of DP mechanisms like DP-SGD. While some existing techniques require many training runs that are prohibitively costly, recent work introduces one-run auditing approaches that effectively audit DP-SGD in white-box settings while still being computationally efficient. However, in the more practical bl… ▽ More

    Submitted 18 June, 2025; originally announced June 2025.

  5. arXiv:2506.06488  [pdf, ps, other

    cs.LG cs.CR stat.ML

    Membership Inference Attacks for Unseen Classes

    Authors: Pratiksha Thaker, Neil Kale, Zhiwei Steven Wu, Virginia Smith

    Abstract: The state-of-the-art for membership inference attacks on machine learning models is a class of attacks based on shadow models that mimic the behavior of the target model on subsets of held-out nonmember data. However, we find that this class of attacks is fundamentally limited because of a key assumption -- that the shadow models can replicate the target model's behavior on the distribution of int… ▽ More

    Submitted 25 October, 2025; v1 submitted 6 June, 2025; originally announced June 2025.

    Comments: Preprint

  6. arXiv:2504.21199  [pdf, ps, other

    stat.ML cs.CR cs.LG

    Generate-then-Verify: Reconstructing Data from Limited Published Statistics

    Authors: Terrance Liu, Eileen Xiao, Adam Smith, Pratiksha Thaker, Zhiwei Steven Wu

    Abstract: We study the problem of reconstructing tabular data from aggregate statistics, in which the attacker aims to identify interesting claims about the sensitive data that can be verified with 100% certainty given the aggregates. Successful attempts in prior work have conducted studies in settings where the set of published statistics is rich enough that entire datasets can be reconstructed with certai… ▽ More

    Submitted 11 June, 2025; v1 submitted 29 April, 2025; originally announced April 2025.

    Comments: First two authors contributed equally. Remaining authors are ordered alphabetically

  7. arXiv:2410.02879  [pdf, other

    cs.CL

    Position: LLM Unlearning Benchmarks are Weak Measures of Progress

    Authors: Pratiksha Thaker, Shengyuan Hu, Neil Kale, Yash Maurya, Zhiwei Steven Wu, Virginia Smith

    Abstract: Unlearning methods have the potential to improve the privacy and safety of large language models (LLMs) by removing sensitive or harmful information post hoc. The LLM unlearning research community has increasingly turned toward empirical benchmarks to assess the effectiveness of such methods. In this paper, we find that existing benchmarks provide an overly optimistic and potentially misleading vi… ▽ More

    Submitted 8 April, 2025; v1 submitted 3 October, 2024; originally announced October 2024.

    Comments: Appears in IEEE Secure and Trustworthy Machine Learning (SaTML) '25

  8. arXiv:2403.04311  [pdf, ps, other

    cs.AI cs.CL cs.DC cs.IR

    Alto: Orchestrating Distributed Compound AI Systems with Nested Ancestry

    Authors: Deepti Raghavan, Keshav Santhanam, Muhammad Shahir Rahman, Nayani Modugula, Luis Gaspar Schroeder, Maximilien Cura, Houjun Liu, Pratiksha Thaker, Philip Levis, Matei Zaharia

    Abstract: Compound AI applications chain together subcomponents such as generative language models, document retrievers, and embedding models. Applying traditional systems optimizations such as parallelism and pipelining in compound AI systems is difficult because each component has different constraints in terms of the granularity and type of data that it ingests. New data is often generated during interme… ▽ More

    Submitted 21 July, 2025; v1 submitted 7 March, 2024; originally announced March 2024.

  9. arXiv:2403.03329  [pdf, other

    cs.CL

    Guardrail Baselines for Unlearning in LLMs

    Authors: Pratiksha Thaker, Yash Maurya, Shengyuan Hu, Zhiwei Steven Wu, Virginia Smith

    Abstract: Recent work has demonstrated that finetuning is a promising approach to 'unlearn' concepts from large language models. However, finetuning can be expensive, as it requires both generating a set of examples and running iterations of finetuning to update the model. In this work, we show that simple guardrail-based approaches such as prompting and filtering can achieve unlearning results comparable t… ▽ More

    Submitted 11 June, 2024; v1 submitted 5 March, 2024; originally announced March 2024.

    Comments: Preliminary work, accepted to ICLR workshop SeT-LLM 2024

  10. arXiv:2312.15551  [pdf, ps, other

    cs.LG cs.CR stat.ML

    On the Benefits of Public Representations for Private Transfer Learning under Distribution Shift

    Authors: Pratiksha Thaker, Amrith Setlur, Zhiwei Steven Wu, Virginia Smith

    Abstract: Public pretraining is a promising approach to improve differentially private model training. However, recent work has noted that many positive research results studying this paradigm only consider in-distribution tasks, and may not apply to settings where there is distribution shift between the pretraining and finetuning data -- a scenario that is likely when finetuning private tasks due to the se… ▽ More

    Submitted 8 September, 2025; v1 submitted 24 December, 2023; originally announced December 2023.

    Comments: Published in NeurIPS 2024

  11. arXiv:2212.08930  [pdf, other

    cs.LG

    On Noisy Evaluation in Federated Hyperparameter Tuning

    Authors: Kevin Kuo, Pratiksha Thaker, Mikhail Khodak, John Nguyen, Daniel Jiang, Ameet Talwalkar, Virginia Smith

    Abstract: Hyperparameter tuning is critical to the success of federated learning applications. Unfortunately, appropriately selecting hyperparameters is challenging in federated networks. Issues of scale, privacy, and heterogeneity introduce noise in the tuning process and make it difficult to evaluate the performance of various hyperparameters. In this work, we perform the first systematic study on the eff… ▽ More

    Submitted 15 May, 2023; v1 submitted 17 December, 2022; originally announced December 2022.

    Comments: v1: 19 pages, 15 figures, submitted to MLSys2023; v2: Fixed citation formatting; v3: Fixed typo, update acks v4: MLSys2023 camera-ready

  12. arXiv:2108.01152  [pdf, ps, other

    cs.LG stat.ML

    Maximizing and Satisficing in Multi-armed Bandits with Graph Information

    Authors: Parth K. Thaker, Mohit Malu, Nikhil Rao, Gautam Dasarathy

    Abstract: Pure exploration in multi-armed bandits has emerged as an important framework for modeling decision-making and search under uncertainty. In modern applications, however, one is often faced with a tremendously large number of options. Even obtaining one observation per option may be too costly rendering traditional pure exploration algorithms ineffective. Fortunately, one often has access to simila… ▽ More

    Submitted 20 November, 2022; v1 submitted 2 August, 2021; originally announced August 2021.

  13. arXiv:2007.05996  [pdf, other

    cs.CV eess.IV physics.ao-ph

    Differentiable Programming for Hyperspectral Unmixing using a Physics-based Dispersion Model

    Authors: John Janiczek, Parth Thaker, Gautam Dasarathy, Christopher S. Edwards, Philip Christensen, Suren Jayasuriya

    Abstract: Hyperspectral unmixing is an important remote sensing task with applications including material identification and analysis. Characteristic spectral features make many pure materials identifiable from their visible-to-infrared spectra, but quantifying their presence within a mixture is a challenging task due to nonlinearities and factors of variation. In this paper, spectral variation is considere… ▽ More

    Submitted 12 July, 2020; originally announced July 2020.

    Comments: 36 pages, 11 figures. Accepted to European Conference on Computer Vision (ECCV) 2020

  14. arXiv:2006.12018  [pdf, other

    cs.CR cs.DB

    Overlook: Differentially Private Exploratory Visualization for Big Data

    Authors: Pratiksha Thaker, Mihai Budiu, Parikshit Gopalan, Udi Wieder, Matei Zaharia

    Abstract: Data exploration systems that provide differential privacy must manage a privacy budget that measures the amount of privacy lost across multiple queries. One effective strategy to manage the privacy budget is to compute a one-time private synopsis of the data, to which users can make an unlimited number of queries. However, existing systems using synopses are built for offline use cases, where a s… ▽ More

    Submitted 22 June, 2020; originally announced June 2020.

  15. arXiv:2002.01066  [pdf, ps, other

    eess.SP cs.IT cs.LG math.OC stat.ML

    On the Sample Complexity and Optimization Landscape for Quadratic Feasibility Problems

    Authors: Parth Thaker, Gautam Dasarathy, Angelia Nedić

    Abstract: We consider the problem of recovering a complex vector $\mathbf{x}\in \mathbb{C}^n$ from $m$ quadratic measurements $\{\langle A_i\mathbf{x}, \mathbf{x}\rangle\}_{i=1}^m$. This problem, known as quadratic feasibility, encompasses the well known phase retrieval problem and has applications in a wide range of important areas including power system state estimation and x-ray crystallography. In gener… ▽ More

    Submitted 14 December, 2020; v1 submitted 3 February, 2020; originally announced February 2020.

    Comments: 21 pages