-
The Safety-Privacy Tradeoff in Linear Bandits
Authors:
Arghavan Zibaie,
Spencer Hutchinson,
Ramtin Pedarsani,
Mahnoosh Alizadeh
Abstract:
We consider a collection of linear stochastic bandit problems, each modeling the random response of different agents to proposed interventions, coupled together by a global safety constraint. We assume a central coordinator must choose actions to play on each bandit with the objective of regret minimization, while also ensuring that the expected response of all agents satisfies the global safety c…
▽ More
We consider a collection of linear stochastic bandit problems, each modeling the random response of different agents to proposed interventions, coupled together by a global safety constraint. We assume a central coordinator must choose actions to play on each bandit with the objective of regret minimization, while also ensuring that the expected response of all agents satisfies the global safety constraints at each round, in spite of uncertainty about the bandits' parameters. The agents consider their observed responses to be private and in order to protect their sensitive information, the data sharing with the central coordinator is performed under local differential privacy (LDP). However, providing higher level of privacy to different agents would have consequences in terms of safety and regret. We formalize these tradeoffs by building on the notion of the sharpness of the safety set - a measure of how the geometric properties of the safe set affects the growth of regret - and propose a unilaterally unimprovable vector of privacy levels for different agents given a maximum regret budget.
△ Less
Submitted 22 April, 2025;
originally announced April 2025.
-
Constrained Online Convex Optimization with Polyak Feasibility Steps
Authors:
Spencer Hutchinson,
Mahnoosh Alizadeh
Abstract:
In this work, we study online convex optimization with a fixed constraint function $g : \mathbb{R}^d \rightarrow \mathbb{R}$. Prior work on this problem has shown $O(\sqrt{T})$ regret and cumulative constraint satisfaction $\sum_{t=1}^{T} g(x_t) \leq 0$, while only accessing the constraint value and subgradient at the played actions $g(x_t), \partial g(x_t)$. Using the same constraint information,…
▽ More
In this work, we study online convex optimization with a fixed constraint function $g : \mathbb{R}^d \rightarrow \mathbb{R}$. Prior work on this problem has shown $O(\sqrt{T})$ regret and cumulative constraint satisfaction $\sum_{t=1}^{T} g(x_t) \leq 0$, while only accessing the constraint value and subgradient at the played actions $g(x_t), \partial g(x_t)$. Using the same constraint information, we show a stronger guarantee of anytime constraint satisfaction $g(x_t) \leq 0 \ \forall t \in [T]$, and matching $O(\sqrt{T})$ regret guarantees. These contributions are thanks to our approach of using Polyak feasibility steps to ensure constraint satisfaction, without sacrificing regret. Specifically, after each step of online gradient descent, our algorithm applies a subgradient descent step on the constraint function where the step-size is chosen according to the celebrated Polyak step-size. We further validate this approach with numerical experiments.
△ Less
Submitted 18 February, 2025;
originally announced February 2025.
-
Online Nonstochastic Control with Convex Safety Constraints
Authors:
Nanfei Jiang,
Spencer Hutchinson,
Mahnoosh Alizadeh
Abstract:
This paper considers the online nonstochastic control problem of a linear time-invariant system under convex state and input constraints that need to be satisfied at all times. We propose an algorithm called Online Gradient Descent with Buffer Zone for Convex Constraints (OGD-BZC), designed to handle scenarios where the system operates within general convex safety constraints. We demonstrate that…
▽ More
This paper considers the online nonstochastic control problem of a linear time-invariant system under convex state and input constraints that need to be satisfied at all times. We propose an algorithm called Online Gradient Descent with Buffer Zone for Convex Constraints (OGD-BZC), designed to handle scenarios where the system operates within general convex safety constraints. We demonstrate that OGD-BZC, with appropriate parameter selection, satisfies all the safety constraints under bounded adversarial disturbances. Additionally, to evaluate the performance of OGD-BZC, we define the regret with respect to the best safe linear policy in hindsight. We prove that OGD-BZC achieves $\tilde{O} (\sqrt{T})$ regret given proper parameter choices. Our numerical results highlight the efficacy and robustness of the proposed algorithm.
△ Less
Submitted 29 January, 2025;
originally announced January 2025.
-
Safe Online Convex Optimization with Multi-Point Feedback
Authors:
Spencer Hutchinson,
Mahnoosh Alizadeh
Abstract:
Motivated by the stringent safety requirements that are often present in real-world applications, we study a safe online convex optimization setting where the player needs to simultaneously achieve sublinear regret and zero constraint violation while only using zero-order information. In particular, we consider a multi-point feedback setting, where the player chooses $d + 1$ points in each round (…
▽ More
Motivated by the stringent safety requirements that are often present in real-world applications, we study a safe online convex optimization setting where the player needs to simultaneously achieve sublinear regret and zero constraint violation while only using zero-order information. In particular, we consider a multi-point feedback setting, where the player chooses $d + 1$ points in each round (where $d$ is the problem dimension) and then receives the value of the constraint function and cost function at each of these points. To address this problem, we propose an algorithm that leverages forward-difference gradient estimation as well as optimistic and pessimistic action sets to achieve $\mathcal{O}(d \sqrt{T})$ regret and zero constraint violation under the assumption that the constraint function is smooth and strongly convex. We then perform a numerical study to investigate the impacts of the unknown constraint and zero-order feedback on empirical performance.
△ Less
Submitted 16 July, 2024;
originally announced July 2024.
-
Optimistic Safety for Online Convex Optimization with Unknown Linear Constraints
Authors:
Spencer Hutchinson,
Tianyi Chen,
Mahnoosh Alizadeh
Abstract:
We study the problem of online convex optimization (OCO) under unknown linear constraints that are either static, or stochastically time-varying. For this problem, we introduce an algorithm that we term Optimistically Safe OCO (OSOCO) and show that it enjoys $\tilde{O}(\sqrt{T})$ regret and no constraint violation. In the case of static linear constraints, this improves on the previous best known…
▽ More
We study the problem of online convex optimization (OCO) under unknown linear constraints that are either static, or stochastically time-varying. For this problem, we introduce an algorithm that we term Optimistically Safe OCO (OSOCO) and show that it enjoys $\tilde{O}(\sqrt{T})$ regret and no constraint violation. In the case of static linear constraints, this improves on the previous best known $\tilde{O}(T^{2/3})$ regret under the same assumptions. In the case of stochastic time-varying constraints, our work supplements existing results that show $O(\sqrt{T})$ regret and $O(\sqrt{T})$ cumulative violation under more general convex constraints and a different set of assumptions. In addition to our theoretical guarantees, we also give numerical results that further validate the effectiveness of our approach.
△ Less
Submitted 14 October, 2024; v1 submitted 8 March, 2024;
originally announced March 2024.
-
A Safe First-Order Method for Pricing-Based Resource Allocation in Safety-Critical Networks
Authors:
Berkay Turan,
Spencer Hutchinson,
Mahnoosh Alizadeh
Abstract:
We introduce a novel algorithm for solving network utility maximization (NUM) problems that arise in resource allocation schemes over networks with known safety-critical constraints, where the constraints form an arbitrary convex and compact feasible set. Inspired by applications where customers' demand can only be affected through posted prices and real-time two-way communication with customers i…
▽ More
We introduce a novel algorithm for solving network utility maximization (NUM) problems that arise in resource allocation schemes over networks with known safety-critical constraints, where the constraints form an arbitrary convex and compact feasible set. Inspired by applications where customers' demand can only be affected through posted prices and real-time two-way communication with customers is not available, we require an algorithm to generate ``safe prices''. This means that at no iteration should the realized demand in response to the posted prices violate the safety constraints of the network. Thus, in contrast to existing distributed first-order methods, our algorithm, called safe pricing for NUM (SPNUM), is guaranteed to produce feasible primal iterates at all iterations. At the heart of the algorithm lie two key steps that must go hand in hand to guarantee safety and convergence: 1) applying a projected gradient method on a shrunk feasible set to get the desired demand, and 2) estimating the price response function of the users and determining the price so that the induced demand is close to the desired demand. We ensure safety by adjusting the shrinkage to account for the error between the induced demand and the desired demand. In addition, by gradually reducing the amount of shrinkage and the step size of the gradient method, we prove that the primal iterates produced by the SPNUM achieve a sublinear static regret of ${\cal O}(\log{(T)})$ after $T$ time steps.
△ Less
Submitted 17 May, 2024; v1 submitted 5 October, 2023;
originally announced October 2023.
-
Desensitization and Deception in Differential Games with Asymmetric Information
Authors:
Vinodhini Comandur,
Tulasi Ram Vechalapu,
Venkata Ramana Makkapati,
Panagiotis Tsiotras,
Seth Hutchinson
Abstract:
Desensitization addresses safe optimal planning under parametric uncertainties by providing sensitivity function-based risk estimates. This paper expands upon the existing work on desensitization in optimal control to address safe planning for a class of two-player differential games. In the proposed game, parametric uncertainties correspond to variations of the model parameters for each player ab…
▽ More
Desensitization addresses safe optimal planning under parametric uncertainties by providing sensitivity function-based risk estimates. This paper expands upon the existing work on desensitization in optimal control to address safe planning for a class of two-player differential games. In the proposed game, parametric uncertainties correspond to variations of the model parameters for each player about their nominal values. The two players in the proposed formulation are assumed to have perfect information about these nominal parameter values. However, it is assumed that only one of the players has complete knowledge of the actual parameter value, resulting in information asymmetry in the proposed game. This lack of knowledge regarding the parameter variations is expected to result in state constraint violations for the player with an information disadvantage. In this regard, a desensitized feedback strategy that provides safe trajectories is proposed for the player with incomplete information. The proposed feedback strategy is evaluated for instances involving a single pursuer and a single evader with an uncertain moving obstacle, where the pursuer is assumed to only know the nominal value of the obstacle's speed. At the same time, the evader knows the obstacle's true speed, and also the fact that the pursuer knows only the nominal value of the obstacle's speed. Subsequently, deceptive strategies are proposed for the evader, who has an information advantage, and these strategies are assessed against the pursuer's desensitized strategy.
△ Less
Submitted 6 February, 2024; v1 submitted 17 September, 2023;
originally announced September 2023.
-
The Impact of the Geometric Properties of the Constraint Set in Safe Optimization with Bandit Feedback
Authors:
Spencer Hutchinson,
Berkay Turan,
Mahnoosh Alizadeh
Abstract:
We consider a safe optimization problem with bandit feedback in which an agent sequentially chooses actions and observes responses from the environment, with the goal of maximizing an arbitrary function of the response while respecting stage-wise constraints. We propose an algorithm for this problem, and study how the geometric properties of the constraint set impact the regret of the algorithm. I…
▽ More
We consider a safe optimization problem with bandit feedback in which an agent sequentially chooses actions and observes responses from the environment, with the goal of maximizing an arbitrary function of the response while respecting stage-wise constraints. We propose an algorithm for this problem, and study how the geometric properties of the constraint set impact the regret of the algorithm. In order to do so, we introduce the notion of the sharpness of a particular constraint set, which characterizes the difficulty of performing learning within the constraint set in an uncertain setting. This concept of sharpness allows us to identify the class of constraint sets for which the proposed algorithm is guaranteed to enjoy sublinear regret. Simulation results for this algorithm support the sublinear regret bound and provide empirical evidence that the sharpness of the constraint set impacts the performance of the algorithm.
△ Less
Submitted 1 May, 2023;
originally announced May 2023.
-
Safe Optimal Control under Parametric Uncertainties
Authors:
Hemanth Sarabu,
Venkata Ramana Makkapati,
Vinodhini Comandur,
Panagiotis Tsiotras,
Seth Hutchinson
Abstract:
We address the issue of safe optimal path planning under parametric uncertainties using a novel regularizer that allows trading off optimality with safety. The proposed regularizer leverages the notion that collisions may be modeled as constraint violations in an optimal control setting in order to produce open-loop trajectories with reduced risk of collisions. The risk of constraint violation is…
▽ More
We address the issue of safe optimal path planning under parametric uncertainties using a novel regularizer that allows trading off optimality with safety. The proposed regularizer leverages the notion that collisions may be modeled as constraint violations in an optimal control setting in order to produce open-loop trajectories with reduced risk of collisions. The risk of constraint violation is evaluated using a state-dependent relevance function and first-order variations in the constraint function with respect to parametric variations. The approach is generic and can be adapted to any optimal control formulation that deals with constraints under parametric uncertainty. Simulations using a holonomic robot avoiding multiple dynamic obstacles with uncertain velocities are used to demonstrate the effectiveness of the proposed approach. Finally, we introduce the car vs. train problem to emphasize the dependence of the resultant risk aversion behavior on the form of the constraint function used to derive the regularizer.
△ Less
Submitted 20 July, 2020; v1 submitted 25 February, 2020;
originally announced February 2020.
-
Chromatic (co)homology of finite general linear groups
Authors:
Samuel Hutchinson,
Samuel Marsh,
Neil Strickland
Abstract:
We study the Morava $E$-theory (at a prime $p$) of $BGL_d(F)$, where $F$ is a finite field with $|F|=1\pmod{p}$. Taking all $d$ together, we obtain a structure with two products $\times$ and $\bullet$. We prove that it is a polynomial ring under $\times$, and that the module of $\times$-indecomposables inherits a $\bullet$-product, and we describe the structure of the resulting ring. In the proces…
▽ More
We study the Morava $E$-theory (at a prime $p$) of $BGL_d(F)$, where $F$ is a finite field with $|F|=1\pmod{p}$. Taking all $d$ together, we obtain a structure with two products $\times$ and $\bullet$. We prove that it is a polynomial ring under $\times$, and that the module of $\times$-indecomposables inherits a $\bullet$-product, and we describe the structure of the resulting ring. In the process, we prove many auxiliary structural results.
△ Less
Submitted 16 February, 2021; v1 submitted 10 July, 2019;
originally announced July 2019.