Skip to main content

Showing 1–29 of 29 results for author: Holland, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.03619  [pdf, other

    cs.LG

    Making Robust Generalizers Less Rigid with Loss Concentration

    Authors: Matthew J. Holland, Toma Hamada

    Abstract: While the traditional formulation of machine learning tasks is in terms of performance on average, in practice we are often interested in how well a trained model performs on rare or difficult data points at test time. To achieve more robust and balanced generalization, methods applying sharpness-aware minimization to a subset of worst-case examples have proven successful for image classification… ▽ More

    Submitted 20 May, 2025; v1 submitted 7 August, 2024; originally announced August 2024.

  2. arXiv:2402.09802  [pdf, other

    stat.ML cs.LG

    Criterion Collapse and Loss Distribution Control

    Authors: Matthew J. Holland

    Abstract: In this work, we consider the notion of "criterion collapse," in which optimization of one metric implies optimality in another, with a particular focus on conditions for collapse into error probability minimizers under a wide variety of learning criteria, ranging from DRO and OCE risks (CVaR, tilted ERM) to non-monotonic criteria underlying recent ascent-descent algorithms explored in the literat… ▽ More

    Submitted 21 May, 2024; v1 submitted 15 February, 2024; originally announced February 2024.

    Comments: Revised version accepted to ICML 2024

  3. Reductive Quantum Phase Estimation

    Authors: Nicholas J. C. Papadopoulos, Jarrod T. Reilly, John Drew Wilson, Murray J. Holland

    Abstract: Estimating a quantum phase is a necessary task in a wide range of fields of quantum science. To accomplish this task, two well-known methods have been developed in distinct contexts, namely, Ramsey interferometry (RI) in atomic and molecular physics and quantum phase estimation (QPE) in quantum computing. We demonstrate that these canonical examples are instances of a larger class of phase estimat… ▽ More

    Submitted 11 July, 2024; v1 submitted 6 February, 2024; originally announced February 2024.

    Comments: 12 pages, 6 figures

  4. arXiv:2310.10006  [pdf, other

    stat.ML cs.LG

    Soft ascent-descent as a stable and flexible alternative to flooding

    Authors: Matthew J. Holland, Kosuke Nakatani

    Abstract: As a heuristic for improving test accuracy in classification, the "flooding" method proposed by Ishida et al. (2020) sets a threshold for the average surrogate loss at training time; above the threshold, gradient descent is run as usual, but below the threshold, a switch to gradient ascent is made. While setting the threshold is non-trivial and is usually done with validation data, this simple tec… ▽ More

    Submitted 21 October, 2024; v1 submitted 15 October, 2023; originally announced October 2023.

    Comments: Revised version accepted to NeurIPS 2024

  5. arXiv:2306.17669  [pdf, other

    cs.NI

    MCQUIC -- A Multicast Extension for QUIC

    Authors: Max Franke, Jake Holland, Stefan Schmid

    Abstract: Mass live content, such as world cups, the Superbowl or the Olympics, attract audiences of hundreds of millions of viewers. While such events were predominantly consumed on TV, more and more viewers follow big events on the Internet, which poses a scalability challenge: current unicast delivery over the web comes with large overheads and is inefficient. An attractive alternative are multicast-base… ▽ More

    Submitted 30 June, 2023; originally announced June 2023.

  6. arXiv:2302.02012  [pdf, other

    cs.CR

    DeTorrent: An Adversarial Padding-only Traffic Analysis Defense

    Authors: James K Holland, Jason Carpenter, Se Eun Oh, Nicholas Hopper

    Abstract: While anonymity networks like Tor aim to protect the privacy of their users, they are vulnerable to traffic analysis attacks such as Website Fingerprinting (WF) and Flow Correlation (FC). Recent implementations of WF and FC attacks, such as Tik-Tok and DeepCoFFEA, have shown that the attacks can be effectively carried out, threatening user privacy. Consequently, there is a need for effective traff… ▽ More

    Submitted 22 September, 2023; v1 submitted 3 February, 2023; originally announced February 2023.

    Comments: Accepted to the 24th Privacy Enhancing Technologies Symposium (PETS 2024)

  7. arXiv:2301.11584  [pdf, other

    stat.ML cs.LG

    Robust variance-regularized risk minimization with concomitant scaling

    Authors: Matthew J. Holland

    Abstract: Under losses which are potentially heavy-tailed, we consider the task of minimizing sums of the loss mean and standard deviation, without trying to accurately estimate the variance. By modifying a technique for variance-free robust mean estimation to fit our problem setting, we derive a simple learning procedure which can be easily combined with standard gradient-based solvers to be used in tradit… ▽ More

    Submitted 8 February, 2024; v1 submitted 27 January, 2023; originally announced January 2023.

    Comments: Revised version accepted to AISTATS 2024

  8. arXiv:2208.02917  [pdf, ps, other

    cs.CR

    Padding-only defenses add delay in Tor

    Authors: Ethan Witwer, James Holland, Nicholas Hopper

    Abstract: Website fingerprinting is an attack that uses size and timing characteristics of encrypted downloads to identify targeted websites. Since this can defeat the privacy goals of anonymity networks such as Tor, many algorithms to defend against this attack in Tor have been proposed in the literature. These algorithms typically consist of some combination of the injection of dummy "padding" packets wit… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

  9. arXiv:2203.14434  [pdf, other

    stat.ML cs.LG

    Flexible risk design using bi-directional dispersion

    Authors: Matthew J. Holland

    Abstract: Many novel notions of "risk" (e.g., CVaR, tilted risk, DRO risk) have been proposed and studied, but these risks are all at least as sensitive as the mean to loss tails on the upside, and tend to ignore deviations on the downside. We study a complementary new risk class that penalizes loss deviations in a bi-directional manner, while having more flexibility in terms of tail sensitivity than is off… ▽ More

    Submitted 16 February, 2023; v1 submitted 27 March, 2022; originally announced March 2022.

    Comments: Final revision, just minor typos corrected for camera-ready at AISTATS 2023

  10. arXiv:2203.12410  [pdf, other

    cs.NI cs.CR

    Towards Reproducible Network Traffic Analysis

    Authors: Jordan Holland, Paul Schmitt, Prateek Mittal, Nick Feamster

    Abstract: Analysis techniques are critical for gaining insight into network traffic given both the higher proportion of encrypted traffic and increasing data rates. Unfortunately, the domain of network traffic analysis suffers from a lack of standardization, leading to incomparable results and barriers to reproducibility. Unlike other disciplines, no standard dataset format exists, forcing researchers and p… ▽ More

    Submitted 23 March, 2022; originally announced March 2022.

    Comments: 14 Pages, 7 Table, 3 Figures, 7 Listings

  11. A Survey of Learning Criteria Going Beyond the Usual Risk

    Authors: Matthew J. Holland, Kazuki Tanabe

    Abstract: Virtually all machine learning tasks are characterized using some form of loss function, and "good performance" is typically stated in terms of a sufficiently small average loss, taken over the random draw of test data. While optimizing for performance on average is intuitive, convenient to analyze in theory, and easy to implement in practice, such a choice brings about trade-offs. In this work, w… ▽ More

    Submitted 29 November, 2023; v1 submitted 11 October, 2021; originally announced October 2021.

    Comments: Final version published in JAIR

    Journal ref: Journal of Artificial Intelligence Research, 78:781-821, 2023

  12. Robust learning with anytime-guaranteed feedback

    Authors: Matthew J. Holland

    Abstract: Under data distributions which may be heavy-tailed, many stochastic gradient-based learning algorithms are driven by feedback queried at points with almost no performance guarantees on their own. Here we explore a modified "anytime online-to-batch" mechanism which for smooth objectives admits high-probability error bounds while requiring only lower-order moment bounds on the stochastic gradients.… ▽ More

    Submitted 24 May, 2021; originally announced May 2021.

    Journal ref: Proceedings of the AAAI Conference on Artificial Intelligence, 36(6):6918-6925, 2022

  13. arXiv:2105.04816  [pdf, other

    stat.ML cs.LG

    Spectral risk-based learning using unbounded losses

    Authors: Matthew J. Holland, El Mehdi Haress

    Abstract: In this work, we consider the setting of learning problems under a wide class of spectral risk (or "L-risk") functions, where a Lipschitz-continuous spectral density is used to flexibly assign weight to extreme loss values. We obtain excess risk guarantees for a derivative-free learning procedure under unbounded heavy-tailed loss distributions, and propose a computationally efficient implementatio… ▽ More

    Submitted 11 May, 2021; originally announced May 2021.

  14. arXiv:2012.07346  [pdf, other

    stat.ML cs.LG

    Better scalability under potentially heavy-tailed feedback

    Authors: Matthew J. Holland

    Abstract: We study scalable alternatives to robust gradient descent (RGD) techniques that can be used when the losses and/or gradients can be heavy-tailed, though this will be unknown to the learner. The core technique is simple: instead of trying to robustly aggregate gradients at each step, which is costly and leads to sub-optimal dimension dependence in risk bounds, we instead focus computational effort… ▽ More

    Submitted 14 December, 2020; originally announced December 2020.

    Comments: This work merges arXiv:2006.00784 and arXiv:2006.01364, providing additional empirical analysis using real-world benchmark datasets

  15. arXiv:2012.06609  [pdf, other

    cs.CR

    RegulaTor: A Straightforward Website Fingerprinting Defense

    Authors: James K Holland, Nicholas Hopper

    Abstract: Website Fingerprinting (WF) attacks are used by local passive attackers to determine the destination of encrypted internet traffic by comparing the sequences of packets sent to and received by the user to a previously recorded data set. As a result, WF attacks are of particular concern to privacy-enhancing technologies such as Tor. In response, a variety of WF defenses have been developed, though… ▽ More

    Submitted 21 September, 2021; v1 submitted 11 December, 2020; originally announced December 2020.

  16. Learning with risks based on M-location

    Authors: Matthew J. Holland

    Abstract: In this work, we study a new class of risks defined in terms of the location and deviation of the loss distribution, generalizing far beyond classical mean-variance risk functions. The class is easily implemented as a wrapper around any smooth loss, it admits finite-sample stationarity guarantees for stochastic gradient methods, it is straightforward to interpret and adjust, with close links to M-… ▽ More

    Submitted 25 April, 2021; v1 submitted 4 December, 2020; originally announced December 2020.

    Comments: Substantial update to initial version; refined theory, improved exposition, added experimental analysis

    Journal ref: Machine Learning, 111:4679-4718, 2022

  17. arXiv:2008.03254  [pdf, other

    cs.CR cs.NI

    Evaluating Snowflake as an Indistinguishable Censorship Circumvention Tool

    Authors: Kyle MacMillan, Jordan Holland, Prateek Mittal

    Abstract: Tor is the most well-known tool for circumventing censorship. Unfortunately, Tor traffic has been shown to be detectable using deep-packet inspection. WebRTC is a popular web frame-work that enables browser-to-browser connections. Snowflake is a novel pluggable transport that leverages WebRTC to connect Tor clients to the Tor network. In theory, Snowflake was created to be indistinguishable from o… ▽ More

    Submitted 14 October, 2020; v1 submitted 23 July, 2020; originally announced August 2020.

  18. New Directions in Automated Traffic Analysis

    Authors: Jordan Holland, Paul Schmitt, Nick Feamster, Prateek Mittal

    Abstract: Despite the use of machine learning for many network traffic analysis tasks in security, from application identification to intrusion detection, the aspects of the machine learning pipeline that ultimately determine the performance of the model -- feature selection and representation, model selection, and parameter tuning -- remain manual and painstaking. This paper presents a method to automate m… ▽ More

    Submitted 19 October, 2021; v1 submitted 6 August, 2020; originally announced August 2020.

  19. arXiv:2007.04486  [pdf, other

    stat.ML cs.LG

    Making learning more transparent using conformalized performance prediction

    Authors: Matthew J. Holland

    Abstract: In this work, we study some novel applications of conformal inference techniques to the problem of providing machine learning procedures with more transparent, accurate, and practical performance guarantees. We provide a natural extension of the traditional conformal prediction framework, done in such a way that we can make valid and well-calibrated predictive statements about the future performan… ▽ More

    Submitted 8 July, 2020; originally announced July 2020.

  20. arXiv:2006.13086  [pdf, other

    cs.NI cs.CR

    Classifying Network Vendors at Internet Scale

    Authors: Jordan Holland, Ross Teixeira, Paul Schmitt, Kevin Borgolte, Jennifer Rexford, Nick Feamster, Jonathan Mayer

    Abstract: In this paper, we develop a method to create a large, labeled dataset of visible network device vendors across the Internet by mapping network-visible IP addresses to device vendors. We use Internet-wide scanning, banner grabs of network-visible devices across the IPv4 address space, and clustering techniques to assign labels to more than 160,000 devices. We subsequently probe these devices and us… ▽ More

    Submitted 24 June, 2020; v1 submitted 23 June, 2020; originally announced June 2020.

    Comments: 11 Pages, 2 figures, 7 tables

  21. arXiv:2006.02001  [pdf, other

    stat.ML cs.LG

    Learning with CVaR-based feedback under potentially heavy tails

    Authors: Matthew J. Holland, El Mehdi Haress

    Abstract: We study learning algorithms that seek to minimize the conditional value-at-risk (CVaR), when all the learner knows is that the losses incurred may be heavy-tailed. We begin by studying a general-purpose estimator of CVaR for potentially heavy-tailed random variables, which is easy to implement in practice, and requires nothing more than finite variance and a distribution function that does not ch… ▽ More

    Submitted 2 June, 2020; originally announced June 2020.

  22. arXiv:2006.01364   

    stat.ML cs.LG

    Improved scalability under heavy tails, without strong convexity

    Authors: Matthew J. Holland

    Abstract: Real-world data is laden with outlying values. The challenge for machine learning is that the learner typically has no prior knowledge of whether the feedback it receives (losses, gradients, etc.) will be heavy-tailed or not. In this work, we study a simple algorithmic strategy that can be leveraged when both losses and gradients can be heavy-tailed. The core technique introduces a simple robust v… ▽ More

    Submitted 14 December, 2020; v1 submitted 1 June, 2020; originally announced June 2020.

    Comments: This paper has been superseded by arXiv:2012.07346 (a merge and extension of this article and arXiv:2006.00784)

  23. arXiv:2006.00784   

    stat.ML cs.LG

    Better scalability under potentially heavy-tailed gradients

    Authors: Matthew J. Holland

    Abstract: We study a scalable alternative to robust gradient descent (RGD) techniques that can be used when the gradients can be heavy-tailed, though this will be unknown to the learner. The core technique is simple: instead of trying to robustly aggregate gradients at each step, which is costly and leads to sub-optimal dimension dependence in risk bounds, we choose a candidate which does not diverge too fa… ▽ More

    Submitted 14 December, 2020; v1 submitted 1 June, 2020; originally announced June 2020.

    Comments: This paper has been superseded by arXiv:2012.07346 (a merge and extension of this article and arXiv:2006.01364)

  24. arXiv:2003.07684  [pdf, other

    cs.CY

    Identifying Disinformation Websites Using Infrastructure Features

    Authors: Austin Hounsel, Jordan Holland, Ben Kaiser, Kevin Borgolte, Nick Feamster, Jonathan Mayer

    Abstract: Platforms have struggled to keep pace with the spread of disinformation. Current responses like user reports, manual analysis, and third-party fact checking are slow and difficult to scale, and as a result, disinformation can spread unchecked for some time after being created. Automation is essential for enabling platforms to respond rapidly to disinformation. In this work, we explore a new direct… ▽ More

    Submitted 28 September, 2020; v1 submitted 28 February, 2020; originally announced March 2020.

  25. Comparing the Effects of DNS, DoT, and DoH on Web Performance

    Authors: Austin Hounsel, Kevin Borgolte, Paul Schmitt, Jordan Holland, Nick Feamster

    Abstract: Nearly every service on the Internet relies on the Domain Name System (DNS), which translates a human-readable name to an IP address before two endpoints can communicate. Today, DNS traffic is unencrypted, leaving users vulnerable to eavesdropping and tampering. Past work has demonstrated that DNS queries can reveal a user's browsing history and even what smart devices they are using at home. In r… ▽ More

    Submitted 23 February, 2020; v1 submitted 18 July, 2019; originally announced July 2019.

    Comments: The Web Conference 2020 (WWW '20)

  26. arXiv:1905.07900  [pdf, other

    stat.ML cs.LG

    PAC-Bayes under potentially heavy tails

    Authors: Matthew J. Holland

    Abstract: We derive PAC-Bayesian learning guarantees for heavy-tailed losses, and obtain a novel optimal Gibbs posterior which enjoys finite-sample excess risk bounds at logarithmic confidence. Our core technique itself makes use of PAC-Bayesian inequalities in order to derive a robust risk estimator, which by design is easy to compute. In particular, only assuming that the first three moments of the loss d… ▽ More

    Submitted 18 December, 2019; v1 submitted 20 May, 2019; originally announced May 2019.

  27. arXiv:1904.09375  [pdf, other

    cs.NI cs.CR

    Measuring Irregular Geographic Exposure on the Internet

    Authors: Jordan Holland, Jared Smith, Max Schuchard

    Abstract: We examine the extent of needless traffic exposure by the routing infrastructure to nations geographically irrelevant to packet transmission. We quantify what countries are geographically logical to observe on a network path traveling between two nations through the use of convex hulls circumscribing major population centers. We then compare that to the nation states observed in over 2.5 billion m… ▽ More

    Submitted 31 May, 2019; v1 submitted 19 April, 2019; originally announced April 2019.

    Comments: 15 pages, 16 figures, 14 tables

  28. arXiv:1810.06207  [pdf, other

    stat.ML cs.LG

    Robust descent using smoothed multiplicative noise

    Authors: Matthew J. Holland

    Abstract: To improve the off-sample generalization of classical procedures minimizing the empirical risk under potentially heavy-tailed data, new robust learning algorithms have been proposed in recent years, with generalized median-of-means strategies being particularly salient. These procedures enjoy performance guarantees in the form of sharp risk bounds under weak moment assumptions on the underlying lo… ▽ More

    Submitted 15 October, 2018; originally announced October 2018.

  29. arXiv:1810.04863  [pdf, other

    stat.ML cs.LG

    Classification using margin pursuit

    Authors: Matthew J. Holland

    Abstract: In this work, we study a new approach to optimizing the margin distribution realized by binary classifiers. The classical approach to this problem is simply maximization of the expected margin, while more recent proposals consider simultaneous variance control and proxy objectives based on robust location estimates, in the vein of keeping the margin distribution sharply concentrated in a desirable… ▽ More

    Submitted 11 October, 2018; originally announced October 2018.