Skip to main content

Showing 1–50 of 59 results for author: Sarwate, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.19773  [pdf, ps, other

    cs.IT

    Sliding Window Adversarial Channels

    Authors: Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate, Yihan Zhang

    Abstract: In an arbitrarily varying channel (AVC), the channel has a state which is under the control of an adversarial jammer and the corresponding capacities are often functions of the "power" constraints on the transmitter and jammer. In this paper we propose a model in which the constraints must hold almost surely over contiguous subsequences of the codeword and state, which we call a sliding window con… ▽ More

    Submitted 28 April, 2025; originally announced April 2025.

    Comments: Submitted manuscript accepted to ISIT 2025

    MSC Class: 94A40

  2. arXiv:2502.13577  [pdf, other

    cs.LG

    Unraveling the Localized Latents: Learning Stratified Manifold Structures in LLM Embedding Space with Sparse Mixture-of-Experts

    Authors: Xin Li, Anand Sarwate

    Abstract: However, real-world data often exhibit complex local structures that can be challenging for single-model approaches with a smooth global manifold in the embedding space to unravel. In this work, we conjecture that in the latent space of these large language models, the embeddings live in a local manifold structure with different dimensions depending on the perplexities and domains of the input dat… ▽ More

    Submitted 19 February, 2025; originally announced February 2025.

  3. arXiv:2502.13568  [pdf, other

    cs.LG cs.CL

    LSR-Adapt: Ultra-Efficient Parameter Tuning with Matrix Low Separation Rank Kernel Adaptation

    Authors: Xin Li, Anand Sarwate

    Abstract: Imposing an effective structural assumption on neural network weight matrices has been the major paradigm for designing Parameter-Efficient Fine-Tuning (PEFT) systems for adapting modern large pre-trained models to various downstream tasks. However, low rank based adaptation has become increasingly challenging due to the sheer scale of modern large language models. In this paper, we propose an eff… ▽ More

    Submitted 19 February, 2025; originally announced February 2025.

  4. arXiv:2501.13810  [pdf, other

    cs.LG cs.AI

    Learning to Help in Multi-Class Settings

    Authors: Yu Wu, Yansong Li, Zeyu Dong, Nitya Sathyavageeswaran, Anand D. Sarwate

    Abstract: Deploying complex machine learning models on resource-constrained devices is challenging due to limited computational power, memory, and model retrainability. To address these limitations, a hybrid system can be established by augmenting the local model with a server-side model, where samples are selectively deferred by a rejector and then sent to the server for processing. The hybrid system enabl… ▽ More

    Submitted 16 April, 2025; v1 submitted 23 January, 2025; originally announced January 2025.

    Comments: 30 pages, 7 figures, conference, ICLR 2025

  5. arXiv:2501.06620  [pdf, other

    cs.CR eess.SP

    Differentially Private Distribution Estimation Using Functional Approximation

    Authors: Ye Tao, Anand D. Sarwate

    Abstract: The cumulative distribution function (CDF) is fundamental due to its ability to reveal information about random variables, making it essential in studies that require privacy-preserving methods to protect sensitive data. This paper introduces a novel privacy-preserving CDF method inspired by the functional analysis and functional mechanism. Our approach projects the empirical CDF into a predefined… ▽ More

    Submitted 11 January, 2025; originally announced January 2025.

    Comments: 11 pages, 8 figures

  6. arXiv:2409.16253  [pdf, other

    cs.LG

    Learning To Help: Training Models to Assist Legacy Devices

    Authors: Yu Wu, Anand Sarwate

    Abstract: Machine learning models implemented in hardware on physical devices may be deployed for a long time. The computational abilities of the device may be limited and become outdated with respect to newer improvements. Because of the size of ML models, offloading some computation (e.g. to an edge cloud) can help such legacy devices. We cast this problem in the framework of learning with abstention (LWA… ▽ More

    Submitted 24 September, 2024; originally announced September 2024.

    Comments: 12 pages, 4 figures

    ACM Class: I.2.6; I.2.11

  7. arXiv:2409.11184  [pdf, other

    cs.LG cs.CV

    LASERS: LAtent Space Encoding for Representations with Sparsity for Generative Modeling

    Authors: Xin Li, Anand Sarwate

    Abstract: Learning compact and meaningful latent space representations has been shown to be very useful in generative modeling tasks for visual data. One particular example is applying Vector Quantization (VQ) in variational autoencoders (VQ-VAEs, VQ-GANs, etc.), which has demonstrated state-of-the-art performance in many modern generative modeling applications. Quantizing the latent space has been justifie… ▽ More

    Submitted 16 September, 2024; originally announced September 2024.

    Comments: Preprint, under review. Submitted to 2025 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)

  8. arXiv:2408.10437  [pdf, other

    cs.LG cs.AI

    Understanding Generative AI Content with Embedding Models

    Authors: Max Vargas, Reilly Cannon, Andrew Engel, Anand D. Sarwate, Tony Chiang

    Abstract: Constructing high-quality features is critical to any quantitative data analysis. While feature engineering was historically addressed by carefully hand-crafting data representations based on domain expertise, deep neural networks (DNNs) now offer a radically different approach. DNNs implicitly engineer features by transforming their input data into hidden feature vectors called embeddings. For em… ▽ More

    Submitted 22 February, 2025; v1 submitted 19 August, 2024; originally announced August 2024.

  9. arXiv:2406.08307  [pdf, other

    stat.ML cs.LG

    Measuring training variability from stochastic optimization using robust nonparametric testing

    Authors: Sinjini Banerjee, Tim Marrinan, Reilly Cannon, Tony Chiang, Anand D. Sarwate

    Abstract: Deep neural network training often involves stochastic optimization, meaning each run will produce a different model. This implies that hyperparameters of the training process, such as the random seed itself, can potentially have significant influence on the variability in the trained models. Measuring model quality by summary statistics, such as test accuracy, can obscure this dependence. We prop… ▽ More

    Submitted 15 April, 2025; v1 submitted 12 June, 2024; originally announced June 2024.

  10. arXiv:2310.00541  [pdf, other

    stat.ML cs.LG

    Robust Nonparametric Hypothesis Testing to Understand Variability in Training Neural Networks

    Authors: Sinjini Banerjee, Reilly Cannon, Tim Marrinan, Tony Chiang, Anand D. Sarwate

    Abstract: Training a deep neural network (DNN) often involves stochastic optimization, which means each run will produce a different model. Several works suggest this variability is negligible when models have the same performance, which in the case of classification is test accuracy. However, models with similar test accuracy may not be computing the same function. We propose a new measure of closeness bet… ▽ More

    Submitted 30 September, 2023; originally announced October 2023.

  11. arXiv:2308.02922  [pdf, other

    stat.ML cs.LG eess.SP math.ST

    Structured Low-Rank Tensors for Generalized Linear Models

    Authors: Batoul Taki, Anand D. Sarwate, Waheed U. Bajwa

    Abstract: Recent works have shown that imposing tensor structures on the coefficient tensor in regression problems can lead to more reliable parameter estimation and lower sample complexity compared to vector-based methods. This work investigates a new low-rank tensor model, called Low Separation Rank (LSR), in Generalized Linear Model (GLM) problems. The LSR model -- which generalizes the well-known Tucker… ▽ More

    Submitted 5 August, 2023; originally announced August 2023.

    Comments: 43 pages; published in Transactions on Machine Learning Research (08/2023)

    Journal ref: Transactions on Machine Learning Research, Aug. 2023 (https://openreview.net/forum?id=qUxBs3Ln41)

  12. arXiv:2307.11684  [pdf, other

    cs.LG

    Minibatching Offers Improved Generalization Performance for Second Order Optimizers

    Authors: Eric Silk, Swarnita Chakraborty, Nairanjana Dasgupta, Anand D. Sarwate, Andrew Lumsdaine, Tony Chiang

    Abstract: Training deep neural networks (DNNs) used in modern machine learning is computationally expensive. Machine learning scientists, therefore, rely on stochastic first-order methods for training, coupled with significant hand-tuning, to obtain good performance. To better understand performance variability of different stochastic algorithms, including second-order methods, we conduct an empirical study… ▽ More

    Submitted 25 May, 2023; originally announced July 2023.

    Comments: 14 pages, 6 figures, 5 tables

  13. arXiv:2305.14585  [pdf, other

    cs.LG

    Faithful and Efficient Explanations for Neural Networks via Neural Tangent Kernel Surrogate Models

    Authors: Andrew Engel, Zhichao Wang, Natalie S. Frank, Ioana Dumitriu, Sutanay Choudhury, Anand Sarwate, Tony Chiang

    Abstract: A recent trend in explainable AI research has focused on surrogate modeling, where neural networks are approximated as simpler ML algorithms such as kernel machines. A second trend has been to utilize kernel functions in various explain-by-example or data attribution tasks. In this work, we combine these two trends to analyze approximate empirical neural tangent kernels (eNTK) for data attribution… ▽ More

    Submitted 11 March, 2024; v1 submitted 23 May, 2023; originally announced May 2023.

    Comments: 9 pages, 2 figures, 3 tables Updated 3/11/2024 various additions/clarifications after ICLR review. Accepted as a Spotlight paper at ICLR 2024

  14. arXiv:2211.06506  [pdf, other

    cs.LG stat.ML

    Spectral Evolution and Invariance in Linear-width Neural Networks

    Authors: Zhichao Wang, Andrew Engel, Anand Sarwate, Ioana Dumitriu, Tony Chiang

    Abstract: We investigate the spectral properties of linear-width feed-forward neural networks, where the sample size is asymptotically proportional to network width. Empirically, we show that the spectra of weight in this high dimensional regime are invariant when trained by gradient descent for small constant learning rates; we provide a theoretical justification for this observation and prove the invarian… ▽ More

    Submitted 7 November, 2023; v1 submitted 11 November, 2022; originally announced November 2022.

    Comments: Accepted by NeurIPS 2023

  15. arXiv:2205.12372  [pdf, other

    cs.LG

    TorchNTK: A Library for Calculation of Neural Tangent Kernels of PyTorch Models

    Authors: Andrew Engel, Zhichao Wang, Anand D. Sarwate, Sutanay Choudhury, Tony Chiang

    Abstract: We introduce torchNTK, a python library to calculate the empirical neural tangent kernel (NTK) of neural network models in the PyTorch framework. We provide an efficient method to calculate the NTK of multilayer perceptrons. We compare the explicit differentiation implementation against autodifferentiation implementations, which have the benefit of extending the utility of the library to any archi… ▽ More

    Submitted 24 May, 2022; originally announced May 2022.

    Comments: 19 pages, 5 figures

  16. arXiv:2205.06708  [pdf, ps, other

    cs.IT

    The Capacity of Causal Adversarial Channels

    Authors: Yihan Zhang, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate

    Abstract: We characterize the capacity for the discrete-time arbitrarily varying channel with discrete inputs, outputs, and states when (a) the encoder and decoder do not share common randomness, (b) the input and state are subject to cost constraints, (c) the transition matrix of the channel is deterministic given the state, and (d) at each time step the adversary can only observe the current and past chan… ▽ More

    Submitted 13 May, 2022; originally announced May 2022.

  17. arXiv:2202.08260  [pdf, other

    eess.IV cs.LG

    Low-Rank Phase Retrieval with Structured Tensor Models

    Authors: Soo Min Kwon, Xin Li, Anand D. Sarwate

    Abstract: We study the low-rank phase retrieval problem, where the objective is to recover a sequence of signals (typically images) given the magnitude of linear measurements of those signals. Existing solutions involve recovering a matrix constructed by vectorizing and stacking each image. These algorithms model this matrix to be low-rank and leverage the low-rank property to decrease the sample complexity… ▽ More

    Submitted 15 February, 2022; originally announced February 2022.

    Comments: A shorter version of this paper is in 2022 International Conference on Acoustics, Speech, and Signal Processing (ICASSP)

  18. arXiv:2111.14992  [pdf, other

    eess.SP cs.CR

    Network Traffic Shaping for Enhancing Privacy in IoT Systems

    Authors: Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam

    Abstract: Motivated by privacy issues caused by inference attacks on user activities in the packet sizes and timing information of Internet of Things (IoT) network traffic, we establish a rigorous event-level differential privacy (DP) model on infinite packet streams. We propose a memoryless traffic shaping mechanism satisfying a first-come-first-served queuing discipline that outputs traffic dependent on t… ▽ More

    Submitted 29 November, 2021; originally announced November 2021.

    Comments: 18 pages, 10 figures, submitted to IEEE Transactions on Networking

  19. arXiv:2106.12083  [pdf, other

    cs.CR cs.CY

    Privid: Practical, Privacy-Preserving Video Analytics Queries

    Authors: Frank Cangialosi, Neil Agarwal, Venkat Arun, Junchen Jiang, Srinivas Narayana, Anand Sarwate, Ravi Netravali

    Abstract: Analytics on video recorded by cameras in public areas have the potential to fuel many exciting applications, but also pose the risk of intruding on individuals' privacy. Unfortunately, existing solutions fail to practically resolve this tension between utility and privacy, relying on perfect detection of all private information in each video frame--an elusive requirement. This paper presents: (1)… ▽ More

    Submitted 22 June, 2021; originally announced June 2021.

  20. arXiv:2105.14673  [pdf, ps, other

    cs.LG eess.SP math.ST stat.ML

    A Minimax Lower Bound for Low-Rank Matrix-Variate Logistic Regression

    Authors: Batoul Taki, Mohsen Ghassemi, Anand D. Sarwate, Waheed U. Bajwa

    Abstract: This paper considers the problem of matrix-variate logistic regression. It derives the fundamental error threshold on estimating low-rank coefficient matrices in the logistic regression problem by obtaining a lower bound on the minimax risk. The bound depends explicitly on the dimension and distribution of the covariates, the rank and energy of the coefficient matrix, and the number of samples. Th… ▽ More

    Submitted 28 January, 2022; v1 submitted 30 May, 2021; originally announced May 2021.

    Comments: 8 pages; published in Proc. 55th Asilomar Conf. Signals, Systems, and Computers, Pacific Grove, CA, Oct. 31-Nov. 3, 2021

  21. arXiv:2012.11877  [pdf, other

    cs.SI

    Influencers and the Giant Component: the Fundamental Hardness in Privacy Protection for Socially Contagious Attributes

    Authors: Aria Rezaei, Jie Gao, Anand D. Sarwate

    Abstract: The presence of correlation is known to make privacy protection more difficult. We investigate the privacy of socially contagious attributes on a network of individuals, where each individual possessing that attribute may influence a number of others into adopting it. We show that for contagions following the Independent Cascade model there exists a giant connected component of infected nodes, con… ▽ More

    Submitted 22 December, 2020; originally announced December 2020.

    Comments: SIAM SDM 2021, privacy, social contagions, social networks

  22. arXiv:2006.06792  [pdf, other

    stat.ML cs.LG

    Quantile Multi-Armed Bandits: Optimal Best-Arm Identification and a Differentially Private Scheme

    Authors: Kontantinos E. Nikolakakis, Dionysios S. Kalogerias, Or Sheffet, Anand D. Sarwate

    Abstract: We study the best-arm identification problem in multi-armed bandits with stochastic, potentially private rewards, when the goal is to identify the arm with the highest quantile at a fixed, prescribed level. First, we propose a (non-private) successive elimination algorithm for strictly optimal best-arm identification, we show that our algorithm is $δ$-PAC and we characterize its sample complexity.… ▽ More

    Submitted 4 December, 2022; v1 submitted 11 June, 2020; originally announced June 2020.

    Comments: 18 pages, 4 figures

  23. arXiv:1910.12913  [pdf, other

    stat.ML cs.LG eess.SP

    Improved Differentially Private Decentralized Source Separation for fMRI Data

    Authors: Hafiz Imtiaz, Jafar Mohammadi, Rogers Silva, Bradley Baker, Sergey M. Plis, Anand D. Sarwate, Vince Calhoun

    Abstract: Blind source separation algorithms such as independent component analysis (ICA) are widely used in the analysis of neuroimaging data. In order to leverage larger sample sizes, different data holders/sites may wish to collaboratively learn feature representations. However, such datasets are often privacy-sensitive, precluding centralized analyses that pool the data at a single site. In this work, w… ▽ More

    Submitted 22 February, 2021; v1 submitted 28 October, 2019; originally announced October 2019.

    Comments: \c{opyright} 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. arXiv admin note: text overlap with arXiv:1904.10059

  24. arXiv:1909.09596  [pdf, other

    stat.ML cs.IT cs.LG

    Optimal Rates for Learning Hidden Tree Structures

    Authors: Konstantinos E. Nikolakakis, Dionysios S. Kalogerias, Anand D. Sarwate

    Abstract: We provide high probability finite sample complexity guarantees for hidden non-parametric structure learning of tree-shaped graphical models, whose hidden and observable nodes are discrete random variables with either finite or countable alphabets. We study a fundamental quantity called the (noisy) information threshold, which arises naturally from the error analysis of the Chow-Liu algorithm and,… ▽ More

    Submitted 31 March, 2021; v1 submitted 20 September, 2019; originally announced September 2019.

    Comments: 33 pages, 4 figures

  25. Coordination Through Shared Randomness

    Authors: Gowtham R. Kurri, Vinod M. Prabhakaran, Anand D. Sarwate

    Abstract: We study a distributed sampling problem where a set of processors want to output (approximately) independent and identically distributed samples from a joint distribution with the help of a common message from a coordinator. Each processor has access to a subset of sources from a set of independent sources of "shared" randomness. We consider two cases -- in the "omniscient coordinator setting", th… ▽ More

    Submitted 17 June, 2021; v1 submitted 22 August, 2019; originally announced August 2019.

    Comments: 27 pages, 7 figures. Some results of this paper were presented at ISIT 2018 and ITW 2019. This paper subsumes arXiv:1805.03193

  26. arXiv:1904.10059  [pdf, other

    cs.LG stat.ML

    Distributed Differentially Private Computation of Functions with Correlated Noise

    Authors: Hafiz Imtiaz, Jafar Mohammadi, Anand D. Sarwate

    Abstract: Many applications of machine learning, such as human health research, involve processing private or sensitive information. Privacy concerns may impose significant hurdles to collaboration in scenarios where there are multiple sites holding data and the goal is to estimate properties jointly across all datasets. Differentially private decentralized algorithms can provide strong privacy guarantees.… ▽ More

    Submitted 22 February, 2021; v1 submitted 22 April, 2019; originally announced April 2019.

    Comments: The manuscript is partially subsumed by arXiv:1910.12913

  27. arXiv:1903.09284  [pdf, other

    cs.LG cs.IT eess.SP stat.ML

    Learning Mixtures of Separable Dictionaries for Tensor Data: Analysis and Algorithms

    Authors: Mohsen Ghassemi, Zahra Shakeri, Anand D. Sarwate, Waheed U. Bajwa

    Abstract: This work addresses the problem of learning sparse representations of tensor data using structured dictionary learning. It proposes learning a mixture of separable dictionaries to better capture the structure of tensor data by generalizing the separable dictionary learning model. Two different approaches for learning mixture of separable dictionaries are explored and sufficient conditions for loca… ▽ More

    Submitted 13 June, 2020; v1 submitted 21 March, 2019; originally announced March 2019.

    Comments: 18 pages, 4 figures, 3 tables; Published in IEEE Trans. Signal Processing

    Journal ref: IEEE Trans. Signal Processing, vol. 68, pp. 33-48, 2020

  28. arXiv:1812.04700  [pdf, other

    stat.ML cs.IT cs.LG math.ST

    Predictive Learning on Hidden Tree-Structured Ising Models

    Authors: Konstantinos E. Nikolakakis, Dionysios S. Kalogerias, Anand D. Sarwate

    Abstract: We provide high-probability sample complexity guarantees for exact structure recovery and accurate predictive learning using noise-corrupted samples from an acyclic (tree-shaped) graphical model. The hidden variables follow a tree-structured Ising model distribution, whereas the observable variables are generated by a binary symmetric channel taking the hidden variables as its input (flipping each… ▽ More

    Submitted 16 February, 2021; v1 submitted 11 December, 2018; originally announced December 2018.

    Comments: 82 pages, 8 figures

  29. arXiv:1805.03319  [pdf, other

    cs.IT

    Quadratically Constrained Channels with Causal Adversaries

    Authors: Tongxin Li, Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate

    Abstract: We consider the problem of communication over a channel with a causal jamming adversary subject to quadratic constraints. A sender Alice wishes to communicate a message to a receiver Bob by transmitting a real-valued length-$n$ codeword $\mathbf{x}=x_1,...,x_n$ through a communication channel. Alice and Bob do not share common randomness. Knowing Alice's encoding strategy, an adversarial jammer Ja… ▽ More

    Submitted 8 May, 2018; originally announced May 2018.

    Comments: 80 pages, ISIT 2018

  30. arXiv:1805.03193  [pdf, other

    cs.IT

    Coordination Using Individually Shared Randomness

    Authors: Gowtham R. Kurri, Vinod M. Prabhakaran, Anand D. Sarwate

    Abstract: Two processors output correlated sequences using the help of a coordinator with whom they individually share independent randomness. For the case of unlimited shared randomness, we characterize the rate of communication required from the coordinator to the processors over a broadcast link. We also give an achievable trade-off between the communication and shared randomness rates.

    Submitted 8 May, 2018; originally announced May 2018.

    Comments: Extended version of a paper accepted for presentation at ISIT 2018. 8 pages, 3 figures

  31. Distributed Differentially-Private Algorithms for Matrix and Tensor Factorization

    Authors: Hafiz Imtiaz, Anand D. Sarwate

    Abstract: In many signal processing and machine learning applications, datasets containing private information are held at different locations, requiring the development of distributed privacy-preserving algorithms. Tensor and matrix factorizations are key components of many processing pipelines. In the distributed setting, differentially private algorithms suffer because they introduce noise to guarantee p… ▽ More

    Submitted 26 April, 2018; originally announced April 2018.

    Comments: 39 pages, in review for publication

    Journal ref: IEEE Journal of Selected Topics in Signal Proessing 2018

  32. arXiv:1801.05951  [pdf, other

    cs.IT

    Quadratically Constrained Myopic Adversarial Channels

    Authors: Yihan Zhang, Shashank Vatedka, Sidharth Jaggi, Anand Sarwate

    Abstract: We study communication in the presence of a jamming adversary where quadratic power constraints are imposed on the transmitter and the jammer. The jamming signal is allowed to be a function of the codebook, and a noncausal but noisy observation of the transmitted codeword. For a certain range of the noise-to-signal ratios (NSRs) of the transmitter and the jammer, we are able to characterize the ca… ▽ More

    Submitted 10 August, 2020; v1 submitted 18 January, 2018; originally announced January 2018.

    Comments: Improved z-aware symmetrization bound is added, subsuming those given by z-agnostic symmetrization and the old z-aware symmetrization in the previous version

  33. Identifiability of Kronecker-structured Dictionaries for Tensor Data

    Authors: Zahra Shakeri, Anand D. Sarwate, Waheed U. Bajwa

    Abstract: This paper derives sufficient conditions for local recovery of coordinate dictionaries comprising a Kronecker-structured dictionary that is used for representing $K$th-order tensor data. Tensor observations are assumed to be generated from a Kronecker-structured dictionary multiplied by sparse coefficient tensors that follow the separable sparsity model. This work provides sufficient conditions on… ▽ More

    Submitted 25 May, 2018; v1 submitted 10 December, 2017; originally announced December 2017.

    Comments: 16 pages, to appear in IEEE Journal of Special Topics in Signal Processing

    Journal ref: IEEE J. Sel. Topics Signal Processing, vol. 12, no. 5, pp. 1047-1062, Oct. 2018

  34. arXiv:1711.04887  [pdf, other

    stat.ML cs.LG

    STARK: Structured Dictionary Learning Through Rank-one Tensor Recovery

    Authors: Mohsen Ghassemi, Zahra Shakeri, Anand D. Sarwate, Waheed U. Bajwa

    Abstract: In recent years, a class of dictionaries have been proposed for multidimensional (tensor) data representation that exploit the structure of tensor data by imposing a Kronecker structure on the dictionary underlying the data. In this work, a novel algorithm called "STARK" is provided to learn Kronecker structured dictionaries that can represent tensors of any order. By establishing that the Kroneck… ▽ More

    Submitted 13 November, 2017; originally announced November 2017.

  35. A Unified Optimization Approach for Sparse Tensor Operations on GPUs

    Authors: Bangtian Liu, Chengyao Wen, Anand D. Sarwate, Maryam Mehri Dehnavi

    Abstract: Sparse tensors appear in many large-scale applications with multidimensional and sparse data. While multidimensional sparse data often need to be processed on manycore processors, attempts to develop highly-optimized GPU-based implementations of sparse tensor operations are rare. The irregular computation patterns and sparsity structures as well as the large memory footprints of sparse tensor oper… ▽ More

    Submitted 28 May, 2017; originally announced May 2017.

  36. Minimax Lower Bounds on Dictionary Learning for Tensor Data

    Authors: Zahra Shakeri, Waheed U. Bajwa, Anand D. Sarwate

    Abstract: This paper provides fundamental limits on the sample complexity of estimating dictionaries for tensor data. The specific focus of this work is on $K$th-order tensor data and the case where the underlying dictionary can be expressed in terms of $K$ smaller dictionaries. It is assumed the data are generated by linear combinations of these structured dictionary atoms and observed through white Gaussi… ▽ More

    Submitted 18 February, 2018; v1 submitted 9 August, 2016; originally announced August 2016.

    Comments: In IEEE Transactions on Information Theory

    Journal ref: IEEE Trans. Inform. Theory, vol. 64, no. 4, pp. 2706-2726, Apr. 2018

  37. arXiv:1605.05284  [pdf, other

    cs.IT cs.LG stat.ML

    Minimax Lower Bounds for Kronecker-Structured Dictionary Learning

    Authors: Zahra Shakeri, Waheed U. Bajwa, Anand D. Sarwate

    Abstract: Dictionary learning is the problem of estimating the collection of atomic elements that provide a sparse representation of measured/collected signals or data. This paper finds fundamental limits on the sample complexity of estimating dictionaries for tensor data by proving a lower bound on the minimax risk. This lower bound depends on the dimensions of the tensor and parameters of the generative m… ▽ More

    Submitted 17 May, 2016; originally announced May 2016.

    Comments: 5 pages, 1 figure. To appear in 2016 IEEE International Symposium on Information Theory

    Journal ref: Proc. IEEE Intl. Symp. Information Theory, Barcelona, Spain, Jul. 10-15, 2016, pp. 1148-1152

  38. arXiv:1602.03571  [pdf, other

    cs.LG cs.IT stat.ML

    High Dimensional Inference with Random Maximum A-Posteriori Perturbations

    Authors: Tamir Hazan, Francesco Orabona, Anand D. Sarwate, Subhransu Maji, Tommi Jaakkola

    Abstract: This paper presents a new approach, called perturb-max, for high-dimensional statistical inference that is based on applying random perturbations followed by optimization. This framework injects randomness to maximum a-posteriori (MAP) predictors by randomly perturbing the potential function for the input. A classic result from extreme value statistics asserts that perturb-max operations generate… ▽ More

    Submitted 30 May, 2017; v1 submitted 10 February, 2016; originally announced February 2016.

    Comments: 47 pages, 10 figures, under review

  39. arXiv:1602.02384  [pdf, other

    cs.IT cs.CR

    The benefit of a 1-bit jump-start, and the necessity of stochastic encoding, in jamming channels

    Authors: Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate

    Abstract: We consider the problem of communicating a message $m$ in the presence of a malicious jamming adversary (Calvin), who can erase an arbitrary set of up to $pn$ bits, out of $n$ transmitted bits $(x_1,\ldots,x_n)$. The capacity of such a channel when Calvin is exactly causal, i.e. Calvin's decision of whether or not to erase bit $x_i$ depends on his observations $(x_1,\ldots,x_i)$ was recently chara… ▽ More

    Submitted 7 February, 2016; originally announced February 2016.

    Comments: 21 pages, 4 figures, extended draft of submission to ISIT 2016

  40. Robust Privacy-Utility Tradeoffs under Differential Privacy and Hamming Distortion

    Authors: Kousha Kalantari, Lalitha Sankar, Anand Sarwate

    Abstract: A privacy-utility tradeoff is developed for an arbitrary set of finite-alphabet source distributions. Privacy is quantified using differential privacy (DP), and utility is quantified using expected Hamming distortion maximized over the set of distributions. The family of source distribution sets (source sets) is categorized into three classes, based on different levels of prior knowledge they capt… ▽ More

    Submitted 1 August, 2018; v1 submitted 24 January, 2016; originally announced January 2016.

    Comments: Extended abstract of ISIT 2016 submission

    Journal ref: K. Kalantari, L. Sankar and A. D. Sarwate, "Robust Privacy-Utility Tradeoffs Under Differential Privacy and Hamming Distortion," in IEEE Transactions on Information Forensics and Security, vol. 13, no. 11, pp. 2816-2830, Nov. 2018

  41. arXiv:1508.01818  [pdf, other

    cs.GT cs.CR

    Designing Incentive Schemes For Privacy-Sensitive Users

    Authors: Chong Huang, Lalitha Sankar, Anand D. Sarwate

    Abstract: Businesses (retailers) often wish to offer personalized advertisements (coupons) to individuals (consumers), but run the risk of strong reactions from consumers who want a customized shopping experience but feel their privacy has been violated. Existing models for privacy such as differential privacy or information theory try to quantify privacy risk but do not capture the subjective experience an… ▽ More

    Submitted 23 September, 2015; v1 submitted 7 August, 2015; originally announced August 2015.

    Comments: 25 pages, 10 figures, submitted to journal of privacy and confidentiality

  42. arXiv:1412.5617  [pdf, other

    cs.LG

    Learning from Data with Heterogeneous Noise using SGD

    Authors: Shuang Song, Kamalika Chaudhuri, Anand D. Sarwate

    Abstract: We consider learning from data of variable quality that may be obtained from different heterogeneous sources. Addressing learning from heterogeneous data in its full generality is a challenging problem. In this paper, we adopt instead a model in which data is observed through heterogeneous noise, where the noise level reflects the quality of the data source. We study how to use stochastic gradient… ▽ More

    Submitted 17 December, 2014; originally announced December 2014.

  43. arXiv:1410.4307  [pdf, other

    math.ST cs.IT math.OC

    Social Learning and Distributed Hypothesis Testing

    Authors: Anusha Lalitha, Tara Javidi, Anand Sarwate

    Abstract: This paper considers a problem of distributed hypothesis testing and social learning. Individual nodes in a network receive noisy local (private) observations whose distribution is parameterized by a discrete parameter (hypotheses). The conditional distributions are known locally at the nodes, but the true parameter/hypothesis is not known. An update rule is analyzed in which nodes first perform a… ▽ More

    Submitted 16 May, 2016; v1 submitted 16 October, 2014; originally announced October 2014.

  44. arXiv:1409.7614  [pdf, other

    math.DS cs.MA eess.SY physics.soc-ph

    Generalized Opinion Dynamics from Local Optimization Rules

    Authors: Avhishek Chatterjee, Anand D. Sarwate, Sriram Vishwanath

    Abstract: We study generalizations of the Hegselmann-Krause (HK) model for opinion dynamics, incorporating features and parameters that are natural components of observed social systems. The first generalization is one where the strength of influence depends on the distance of the agents' opinions. Under this setup, we identify conditions under which the opinions converge in finite time, and provide a quali… ▽ More

    Submitted 25 September, 2014; originally announced September 2014.

    Comments: 20 pages, under review

  45. Redundancy of Exchangeable Estimators

    Authors: Narayana P. Santhanam, Anand D. Sarwate, Jae Oh Woo

    Abstract: Exchangeable random partition processes are the basis for Bayesian approaches to statistical inference in large alphabet settings. On the other hand, the notion of the pattern of a sequence provides an information-theoretic framework for data compression in large alphabet scenarios. Because data compression and parameter estimation are intimately related, we study the redundancy of Bayes estimator… ▽ More

    Submitted 20 October, 2014; v1 submitted 21 July, 2014; originally announced July 2014.

    Comments: 18 pages

  46. arXiv:1310.4227  [pdf, other

    cs.LG math.PR

    On Measure Concentration of Random Maximum A-Posteriori Perturbations

    Authors: Francesco Orabona, Tamir Hazan, Anand D. Sarwate, Tommi Jaakkola

    Abstract: The maximum a-posteriori (MAP) perturbation framework has emerged as a useful approach for inference and learning in high dimensional complex models. By maximizing a randomly perturbed potential function, MAP perturbations generate unbiased samples from the Gibbs distribution. Unfortunately, the computational cost of generating so many high-dimensional random variables can be prohibitive. More eff… ▽ More

    Submitted 15 October, 2013; originally announced October 2013.

  47. arXiv:1306.2347  [pdf, other

    cs.LG

    Auditing: Active Learning with Outcome-Dependent Query Costs

    Authors: Sivan Sabato, Anand D. Sarwate, Nathan Srebro

    Abstract: We propose a learning setting in which unlabeled data is free, and the cost of a label depends on its value, which is not known in advance. We study binary classification in an extreme case, where the algorithm only pays for negative labels. Our motivation are applications such as fraud detection, in which investigating an honest transaction should be avoided if possible. We term the setting audit… ▽ More

    Submitted 12 July, 2015; v1 submitted 10 June, 2013; originally announced June 2013.

    Comments: Corrections in section 5

    Journal ref: Neural Information Processing Systems 26 (NIPS), 512-520, 2013

  48. arXiv:1305.4548  [pdf, other

    math.OC cs.MA eess.SY

    Distributed Learning of Distributions via Social Sampling

    Authors: Anand D. Sarwate, Tara Javidi

    Abstract: A protocol for distributed estimation of discrete distributions is proposed. Each agent begins with a single sample from the distribution, and the goal is to learn the empirical distribution of the samples. The protocol is based on a simple message-passing model motivated by communication in social networks. Agents sample a message randomly from their current estimates of the distribution, resulti… ▽ More

    Submitted 5 June, 2014; v1 submitted 20 May, 2013; originally announced May 2013.

    Comments: 17 pages, accepted to IEEE Transactions on Automatic Control

  49. arXiv:1209.2755  [pdf, ps, other

    cs.IT

    Relaxing the Gaussian AVC

    Authors: Anand D. Sarwate, Michael Gastpar

    Abstract: The arbitrarily varying channel (AVC) is a conservative way of modeling an unknown interference, and the corresponding capacity results are pessimistic. We reconsider the Gaussian AVC by relaxing the classical model and thereby weakening the adversarial nature of the interference. We examine three different relaxations. First, we show how a very small amount of common randomness between transmitte… ▽ More

    Submitted 12 September, 2012; originally announced September 2012.

    Comments: Submitted to the IEEE Transactions on Information Theory

  50. arXiv:1207.2812  [pdf, other

    stat.ML cs.CR cs.LG

    Near-Optimal Algorithms for Differentially-Private Principal Components

    Authors: Kamalika Chaudhuri, Anand D. Sarwate, Kaushik Sinha

    Abstract: Principal components analysis (PCA) is a standard tool for identifying good low-dimensional approximations to data in high dimension. Many data sets of interest contain private or sensitive information about individuals. Algorithms which operate on such data should be sensitive to the privacy risks in publishing their outputs. Differential privacy is a framework for developing tradeoffs between pr… ▽ More

    Submitted 7 August, 2013; v1 submitted 11 July, 2012; originally announced July 2012.

    Comments: 37 pages, 8 figures; final version to appear in the Journal of Machine Learning Research, preliminary version was at NIPS 2012