Skip to main content

Showing 1–50 of 61 results for author: Lai, L

Searching in archive math. Search in all archives.
.
  1. arXiv:2506.02318  [pdf, ps, other

    cs.LG eess.SP math.ST

    Absorb and Converge: Provable Convergence Guarantee for Absorbing Discrete Diffusion Models

    Authors: Yuchen Liang, Renxiang Huang, Lifeng Lai, Ness Shroff, Yingbin Liang

    Abstract: Discrete state space diffusion models have shown significant advantages in applications involving discrete data, such as text and image generation. It has also been observed that their performance is highly sensitive to the choice of rate matrices, particularly between uniform and absorbing rate matrices. While empirical results suggest that absorbing rate matrices often yield better generation qu… ▽ More

    Submitted 2 June, 2025; originally announced June 2025.

  2. arXiv:2505.23088  [pdf, ps, other

    math.NT

    On the irrationality of certain $p$-adic zeta values

    Authors: Li Lai, Cezar Lupu, Johannes Sprang

    Abstract: A famous theorem of Zudilin states that at least one of the Riemann zeta values $ζ(5), ζ(7), ζ(9), ζ(11)$ is irrational. In this paper, we establish the $p$-adic analogue of Zudilin's theorem. As a weaker form of our result, it is proved that for any prime number $p \geqslant 5$ there exists an odd integer $i$ in the interval $[3,p+p/\log p+5]$ such that the $p$-adic zeta value $ζ_p(i)$ is irratio… ▽ More

    Submitted 29 May, 2025; originally announced May 2025.

    Comments: 24 pages, 1 table

    MSC Class: 11J72 (primary); 11M06; 33C20 (secondary)

  3. arXiv:2505.12687  [pdf, ps, other

    math.NT

    A partial result towards the Chowla--Milnor conjecture

    Authors: Li Lai, Jia Li

    Abstract: The Chowla--Milnor conjecture predicts the linear independence of certain Hurwitz zeta values. In this paper, we prove that for any fixed integer $k \geqslant 2$, the dimension of the $\mathbb{Q}$-linear span of $ζ(k,a/q)-(-1)^{k}ζ(k,1-a/q)$ ($1 \leqslant a < q/2$, $\gcd(a,q)=1$) is at least $(c_k -o(1)) \cdot \log q$ as the positive integer $q \to +\infty$ for some constant $c_k>0$ depending only… ▽ More

    Submitted 19 May, 2025; originally announced May 2025.

    Comments: 39 pages, 7 figures

    MSC Class: 11J72 (primary); 11M35; 33C20 (secondary)

  4. arXiv:2505.05005  [pdf, ps, other

    math.NT math.AG math.CA math.CO

    A note on the irrationality of $ζ_2(5)$

    Authors: Li Lai, Johannes Sprang, Wadim Zudilin

    Abstract: In a spirit of Apéry's proof of the irrationality of $ζ(3)$, we construct a sequence $p_n/q_n$ of rational approximations to the $2$-adic zeta value $ζ_2(5)$ which satisfy $0 < |ζ_2(5)-p_n/q_n|_2 < \max\{|p_n|,|q_n|\}^{-1-δ}$ for an explicit constant $δ>0$. This leads to a new proof of the irrationality of $ζ_2(5)$, the result established recently by Calegari, Dimitrov and Tang using a different m… ▽ More

    Submitted 8 May, 2025; originally announced May 2025.

    Comments: 2^2 x 5 pages

    Report number: MPIM-Bonn-2025 MSC Class: 11J72; 11J82; 11M06; 33C20

  5. arXiv:2501.05321  [pdf, ps, other

    math.NT

    A note on the number of irrational odd zeta values, II

    Authors: Li Lai

    Abstract: We prove that there are at least $1.284 \cdot \sqrt{s/\log s}$ irrational numbers among $ζ(3)$, $ζ(5)$, $ζ(7)$, $\ldots$, $ζ(s-1)$ for any sufficiently large even integer $s$. This result improves upon the previous finding by a constant factor. The proof combines the elimination technique of Fischler-Sprang-Zudilin (2019) with the $Φ_n$ factor method of Zudilin (2001).

    Submitted 12 January, 2025; v1 submitted 9 January, 2025; originally announced January 2025.

    Comments: 17 pages, 1 table. v2 added a new observation (Rmk. 3.6) and improved the final constant

    MSC Class: 11J72 (primary); 11M06; 33C20 (secondary)

  6. arXiv:2412.00640  [pdf, other

    math.OC

    Stability of first-order methods in tame optimization

    Authors: Lexiao Lai

    Abstract: Modern data science applications demand solving large-scale optimization problems. The prevalent approaches are first-order methods, valued for their scalability. These methods are implemented to tackle highly irregular problems where assumptions of convexity and smoothness are untenable. Seeking to deepen the understanding of these methods, we study first-order methods with constant step size f… ▽ More

    Submitted 30 November, 2024; originally announced December 2024.

    Comments: PhD thesis

  7. arXiv:2410.17487  [pdf, ps, other

    math.OC

    Nonsmooth rank-one symmetric matrix factorization landscape

    Authors: Cédric Josz, Lexiao Lai

    Abstract: We consider nonsmooth rank-one symmetric matrix factorization. It has no spurious second-order stationary points.

    Submitted 26 February, 2025; v1 submitted 22 October, 2024; originally announced October 2024.

  8. arXiv:2410.01265  [pdf, other

    stat.ML cs.AI cs.LG econ.EM math.ST

    Transformers Handle Endogeneity in In-Context Linear Regression

    Authors: Haodong Liang, Krishnakumar Balasubramanian, Lifeng Lai

    Abstract: We explore the capability of transformers to address endogeneity in in-context linear regression. Our main finding is that transformers inherently possess a mechanism to handle endogeneity effectively using instrumental variables (IV). First, we demonstrate that the transformer architecture can emulate a gradient-based bi-level optimization procedure that converges to the widely used two-stage lea… ▽ More

    Submitted 10 May, 2025; v1 submitted 2 October, 2024; originally announced October 2024.

    Comments: 37 pages, 8 figures

  9. arXiv:2408.07182  [pdf, ps, other

    math.OC

    Proximal random reshuffling under local Lipschitz continuity

    Authors: Cedric Josz, Lexiao Lai, Xiaopeng Li

    Abstract: We study proximal random reshuffling for minimizing the sum of locally Lipschitz functions and a proper lower semicontinuous convex function without assuming coercivity or the existence of limit points. The algorithmic guarantees pertaining to near approximate stationarity rely on a new tracking lemma linking the iterates to trajectories of conservative fields. One of the novelties in the analysis… ▽ More

    Submitted 13 August, 2024; originally announced August 2024.

  10. arXiv:2407.14236  [pdf, ps, other

    math.NT

    Small improvements on the Ball-Rivoal theorem and its $p$-adic variant

    Authors: Li Lai

    Abstract: We prove that the dimension of the $\mathbb{Q}$-linear span of $1,ζ(3),ζ(5),\ldots,ζ(s-1)$ is at least $(1.119 \cdot \log s)/(1+\log 2)$ for any sufficiently large even integer $s$. This slightly refines a well-known result of Rivoal (2000) or Ball-Rivoal (2001). Quite unexpectedly, the proof only involves inserting the arithmetic observation of Zudilin (2001) into the original proof of Ball-Rivoa… ▽ More

    Submitted 29 January, 2025; v1 submitted 19 July, 2024; originally announced July 2024.

    Comments: 51 pages, 1 figure, 2 tables; v2 added p-adic analogue, improved the constant 1.108 to 1.119

    MSC Class: 11J72; 11M06; 33C20

  11. arXiv:2405.01718  [pdf, other

    cs.LG math.OC stat.ML

    Robust Risk-Sensitive Reinforcement Learning with Conditional Value-at-Risk

    Authors: Xinyi Ni, Lifeng Lai

    Abstract: Robust Markov Decision Processes (RMDPs) have received significant research interest, offering an alternative to standard Markov Decision Processes (MDPs) that often assume fixed transition probabilities. RMDPs address this by optimizing for the worst-case scenarios within ambiguity sets. While earlier studies on RMDPs have largely centered on risk-neutral reinforcement learning (RL), with the goa… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

  12. arXiv:2308.00899  [pdf, other

    math.OC

    Global stability of first-order methods for coercive tame functions

    Authors: Cédric Josz, Lexiao Lai

    Abstract: We consider first-order methods with constant step size for minimizing locally Lipschitz coercive functions that are tame in an o-minimal structure on the real field. We prove that if the method is approximated by subgradient trajectories, then the iterates eventually remain in a neighborhood of a connected component of the set of critical points. Under suitable method-dependent regularity assumpt… ▽ More

    Submitted 1 August, 2023; originally announced August 2023.

    Comments: 30 pages, 1 figure

  13. arXiv:2307.07670  [pdf, other

    cs.LG cs.AI cs.CR math.OC

    Efficient Adversarial Attacks on Online Multi-agent Reinforcement Learning

    Authors: Guanlin Liu, Lifeng Lai

    Abstract: Due to the broad range of applications of multi-agent reinforcement learning (MARL), understanding the effects of adversarial attacks against MARL model is essential for the safe applications of this model. Motivated by this, we investigate the impact of adversarial attacks on MARL. In the considered setup, there is an exogenous attacker who is able to modify the rewards before the agents receive… ▽ More

    Submitted 14 July, 2023; originally announced July 2023.

  14. arXiv:2307.07666  [pdf, other

    cs.LG cs.AI math.OC

    Efficient Action Robust Reinforcement Learning with Probabilistic Policy Execution Uncertainty

    Authors: Guanlin Liu, Zhihan Zhou, Han Liu, Lifeng Lai

    Abstract: Robust reinforcement learning (RL) aims to find a policy that optimizes the worst-case performance in the face of uncertainties. In this paper, we focus on action robust RL with the probabilistic policy execution uncertainty, in which, instead of always carrying out the action specified by the policy, the agent will take the action specified by the policy with probability $1-ρ$ and an alternative… ▽ More

    Submitted 20 July, 2023; v1 submitted 14 July, 2023; originally announced July 2023.

  15. arXiv:2307.03331  [pdf, ps, other

    math.OC

    Convergence of the momentum method for semialgebraic functions with locally Lipschitz gradients

    Authors: Cédric Josz, Lexiao Lai, Xiaopeng Li

    Abstract: We propose a new length formula that governs the iterates of the momentum method when minimizing differentiable semialgebraic functions with locally Lipschitz gradients. It enables us to establish local convergence, global convergence, and convergence to local minimizers without assuming global Lipschitz continuity of the gradient, coercivity, and a global growth condition, as is done in the liter… ▽ More

    Submitted 7 January, 2024; v1 submitted 6 July, 2023; originally announced July 2023.

    Comments: 33 pages. Accepted for publication at SIAM Journal on Optimization

  16. arXiv:2306.10393  [pdf, ps, other

    math.NT

    Many $p$-adic odd zeta values are irrational

    Authors: Li Lai, Johannes Sprang

    Abstract: For any prime $p$ and $\varepsilon>0$ we prove that for any sufficiently large positive odd integer $s$ at least $(c_p-\varepsilon) \sqrt{\frac{s}{\log s}}$ of the $p$-adic zeta values $ζ_p(3),ζ_p(5),\dots,ζ_p(s)$ are irrational. The constant $c_p$ is positive and does only depend on $p$. This result establishes a $p$-adic version of the elimination technique used by Fischler--Sprang--Zudilin and… ▽ More

    Submitted 17 February, 2025; v1 submitted 17 June, 2023; originally announced June 2023.

    Comments: 36 pages, to appear in Michigan Math. J

    MSC Class: 11J72 (Primary) 11F85; 11M06 (Secondary)

  17. arXiv:2304.00816  [pdf, ps, other

    math.NT

    On the irrationality of certain $2$-adic zeta values

    Authors: Li Lai

    Abstract: Let $ζ_2(\cdot)$ be the Kubota-Leopoldt $2$-adic zeta function. We prove that, for every nonnegative integer $s$, there exists an odd integer $j$ in the interval $[s+3,3s+5]$ such that $ζ_2(j)$ is irrational. In particular, at least one of $ζ_2(7),ζ_2(9),ζ_2(11),ζ_2(13)$ is irrational. Our approach is inspired by the recent work of Sprang. We construct explicit rational functions. The Volkenborn… ▽ More

    Submitted 3 April, 2023; originally announced April 2023.

    Comments: 21 pages

    MSC Class: 11J72 (Primary) 11F85; 11M06 (Secondary)

  18. arXiv:2211.14852  [pdf, other

    math.OC

    Sufficient conditions for instability of the subgradient method with constant step size

    Authors: Cédric Josz, Lexiao Lai

    Abstract: We provide sufficient conditions for instability of the subgradient method with constant step size around a local minimum of a locally Lipschitz semi-algebraic function. They are satisfied by several spurious local minima arising in robust principal component analysis and neural networks.

    Submitted 29 June, 2023; v1 submitted 27 November, 2022; originally announced November 2022.

    Comments: 18 pages, 5 figures

  19. Lyapunov stability of the subgradient method with constant step size

    Authors: Cédric Josz, Lexiao Lai

    Abstract: We consider the subgradient method with constant step size for minimizing locally Lipschitz semi-algebraic functions. In order to analyze the behavior of its iterates in the vicinity of a local minimum, we introduce a notion of discrete Lyapunov stability and propose necessary and sufficient conditions for stability.

    Submitted 6 March, 2023; v1 submitted 27 November, 2022; originally announced November 2022.

    Comments: 11 pages, 2 figures

    MSC Class: 65K05 90C30

    Journal ref: Mathematical Programming 2023

  20. arXiv:2211.14848  [pdf, other

    math.OC

    Nonsmooth rank-one matrix factorization landscape

    Authors: Cédric Josz, Lexiao Lai

    Abstract: We provide the first positive result on the nonsmooth optimization landscape of robust principal component analysis, to the best of our knowledge. It is the object of several conjectures and remains mostly uncharted territory. We identify a necessary and sufficient condition for the absence of spurious local minima in the rank-one case. Our proof exploits the subdifferential regularity of the obje… ▽ More

    Submitted 27 November, 2022; originally announced November 2022.

    Comments: 23 pages, 5 figures

  21. On two conjectures of Sun concerning Apéry-like series

    Authors: Steven Charlton, Herbert Gangl, Li Lai, Ce Xu, Jianqiang Zhao

    Abstract: In this paper, we shall prove two conjectures of Z.-W. Sun concerning Apéry-like series. One of the series is alternating whereas the other one is not. Our main strategy is to convert the series (resp.~the alternating series) to log-sine-cosine (resp.~log-sinh-cosh) integrals. Then we express all these integrals in terms of single-valued Bloch-Wigner-Ramakrishnan-Wojtkowiak-Zagier polylogarithms.… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

    Comments: 19 pages

    Journal ref: Forum Math. 2023

  22. arXiv:2201.09262  [pdf, ps, other

    math.NT

    Elementary proofs of Zagier's formula for multiple zeta values and its odd variant

    Authors: Li Lai, Cezar Lupu, Derek Orr

    Abstract: In this paper, we give elementary proofs of Zagier's formula for multiple zeta values involving Hoffman element and its odd variant due to Murakami. Zagier's formula was a key ingredient in the proof of Hoffman's conjecture. Moreover, using the same approach, we prove Murakami's formula for multiple $t$-values. This formula is essential in proving a Brown type result which asserts that each multip… ▽ More

    Submitted 29 January, 2022; v1 submitted 23 January, 2022; originally announced January 2022.

    Comments: 15 pages, new version

    MSC Class: Primary 11M06; 11M32. Secondary 11B65; 11B68

  23. arXiv:2112.05367  [pdf, ps, other

    cs.LG cs.CR math.OC stat.ML

    Efficient Action Poisoning Attacks on Linear Contextual Bandits

    Authors: Guanlin Liu, Lifeng Lai

    Abstract: Contextual bandit algorithms have many applicants in a variety of scenarios. In order to develop trustworthy contextual bandit systems, understanding the impacts of various adversarial attacks on contextual bandit algorithms is essential. In this paper, we propose a new class of attacks: action poisoning attacks, where an adversary can change the action signal selected by the agent. We design acti… ▽ More

    Submitted 10 December, 2021; originally announced December 2021.

  24. arXiv:2112.00087  [pdf, other

    math.NA cs.DC

    Coupling and Simulation of Fluid-Structure Interaction Problems for Automotive Sun-roof on Graphics Processing Unit

    Authors: Liang S. Lai, Choi-Hong Lai, Abal-Kassim Cheik Ahamed, Frederic Magoules

    Abstract: In this paper, the authors propose an analysis of the frequency response function in a car compartment, subject to some fluctuating pressure distribution along the open cavity of the sun-roof at the top of a car. Coupling of a computational fluid dynamics and of a computational acoustics code is considered to simulate the acoustic fluid-structure interaction problem. Iterative Krylov methods and d… ▽ More

    Submitted 30 November, 2021; originally announced December 2021.

  25. arXiv:2110.04471  [pdf, ps, other

    cs.LG cs.AI cs.CR math.OC

    Provably Efficient Black-Box Action Poisoning Attacks Against Reinforcement Learning

    Authors: Guanlin Liu, Lifeng Lai

    Abstract: Due to the broad range of applications of reinforcement learning (RL), understanding the effects of adversarial attacks against RL model is essential for the safe applications of this model. Prior theoretical works on adversarial attacks against RL mainly focus on either observation poisoning attacks or environment poisoning attacks. In this paper, we introduce a new class of attacks named action… ▽ More

    Submitted 26 October, 2021; v1 submitted 9 October, 2021; originally announced October 2021.

  26. arXiv:2109.15030  [pdf, other

    math.OC cs.LG

    On the Convergence of Projected Alternating Maximization for Equitable and Optimal Transport

    Authors: Minhui Huang, Shiqian Ma, Lifeng Lai

    Abstract: This paper studies the equitable and optimal transport (EOT) problem, which has many applications such as fair division problems and optimal transport with multiple agents etc. In the discrete distributions case, the EOT problem can be formulated as a linear program (LP). Since this LP is prohibitively large for general LP solvers, Scetbon \etal \cite{scetbon2021equitable} suggests to perturb the… ▽ More

    Submitted 30 September, 2021; v1 submitted 29 September, 2021; originally announced September 2021.

  27. arXiv:2103.14894  [pdf, ps, other

    math.NT

    On the largest prime divisor of $n!+1$

    Authors: Li Lai

    Abstract: For an integer $m >1$, we denote by $P(m)$ the largest prime divisor of $m$. We prove that $\limsup_{n \rightarrow +\infty} P(n!+1)/n \geqslant 1+9\log 2>7.238$, which improves a result of Stewart. More generally, for any nonzero polynomial $f(X)$ with integer coefficients, we show that $\limsup_{n \rightarrow +\infty} P(n!+f(n))/n \geqslant 1+9\log2$. This improves a result of Luca and Shparlinsk… ▽ More

    Submitted 27 March, 2021; originally announced March 2021.

    Comments: 11 pages

    MSC Class: 11D75; 11J25

  28. arXiv:2103.11113  [pdf, other

    math.OC

    Exploration Enhancement of Nature-Inspired Swarm-based Optimization Algorithms

    Authors: Kwok Pui Choi, Enzio Hai Hong Kam, Tze Leung Lai, Xin T. Tong, Weng Kee Wong

    Abstract: Nature-inspired swarm-based algorithms have been widely applied to tackle high-dimensional and complex optimization problems across many disciplines. They are general purpose optimization algorithms, easy to use and implement, flexible and assumption-free. A common drawback of these algorithms is premature convergence and the solution found is not a global optimum. We provide sufficient conditions… ▽ More

    Submitted 20 March, 2021; originally announced March 2021.

    Comments: 20 pages, 9 figures

  29. arXiv:2103.00904  [pdf, ps, other

    math.NT

    At least two of $ζ(5),ζ(7),\ldots,ζ(35)$ are irrational

    Authors: Li Lai, Li Zhou

    Abstract: Let $ζ(s)$ be the Riemann zeta function. We prove the statement in the title, which improves a recent result of Rivoal and Zudilin by lowering $69$ to $35$. We also prove that at least one of $β(2),β(4),\ldots,β(10)$ is irrational, where $β(s) = L(s,χ_4)$ and $χ_4$ is the Dirichlet character with conductor $4$.

    Submitted 18 October, 2021; v1 submitted 1 March, 2021; originally announced March 2021.

    Comments: 14 pages. A better collection of parameters for Thm. 6.1 (motivated by one referee). Some minor corrections according to referee reports

    MSC Class: 11J72 (primary); 11M06; 33C20 (secondary)

  30. arXiv:2012.05199  [pdf, other

    cs.LG math.OC stat.ML

    A Riemannian Block Coordinate Descent Method for Computing the Projection Robust Wasserstein Distance

    Authors: Minhui Huang, Shiqian Ma, Lifeng Lai

    Abstract: The Wasserstein distance has become increasingly important in machine learning and deep learning. Despite its popularity, the Wasserstein distance is hard to approximate because of the curse of dimensionality. A recently proposed approach to alleviate the curse of dimensionality is to project the sampled data from the high dimensional probability distribution onto a lower-dimensional subspace, and… ▽ More

    Submitted 27 September, 2021; v1 submitted 9 December, 2020; originally announced December 2020.

  31. arXiv:2010.10045  [pdf, ps, other

    cs.LG eess.SP math.OC stat.ML

    On the Adversarial Robustness of LASSO Based Feature Selection

    Authors: Fuwei Li, Lifeng Lai, Shuguang Cui

    Abstract: In this paper, we investigate the adversarial robustness of feature selection based on the $\ell_1$ regularized linear regression model, namely LASSO. In the considered model, there is a malicious adversary who can observe the whole dataset, and then will carefully modify the response values or the feature matrix in order to manipulate the selected features. We formulate the modification strategy… ▽ More

    Submitted 20 October, 2020; originally announced October 2020.

  32. arXiv:2008.07740  [pdf, other

    cs.LG math.OC stat.ML

    Robust Low-rank Matrix Completion via an Alternating Manifold Proximal Gradient Continuation Method

    Authors: Minhui Huang, Shiqian Ma, Lifeng Lai

    Abstract: Robust low-rank matrix completion (RMC), or robust principal component analysis with partially observed data, has been studied extensively for computer vision, signal processing and machine learning applications. This problem aims to decompose a partially observed matrix into the superposition of a low-rank matrix and a sparse matrix, where the sparse matrix captures the grossly corrupted entries… ▽ More

    Submitted 18 August, 2020; originally announced August 2020.

  33. arXiv:2002.08000  [pdf, other

    cs.LG cs.CR math.OC stat.ML

    Action-Manipulation Attacks Against Stochastic Bandits: Attacks and Defense

    Authors: Guanlin Liu, Lifeng lai

    Abstract: Due to the broad range of applications of stochastic multi-armed bandit model, understanding the effects of adversarial attacks and designing bandit algorithms robust to attacks are essential for the safe applications of this model. In this paper, we introduce a new class of attack named action-manipulation attack. In this attack, an adversary can change the action signal selected by the user. We… ▽ More

    Submitted 21 February, 2020; v1 submitted 18 February, 2020; originally announced February 2020.

    Comments: 13 pages, 7 figures, submitted to IEEE Transaction on Signal Processing

  34. arXiv:1911.10560  [pdf, other

    gr-qc math.AP math.DG

    On the rigidity of stationary charged black holes: small perturbations of the non-extremal Kerr-Newman family

    Authors: Li Lai, Jiong-Yue Li, Pin Yu

    Abstract: We prove a perturbative result concerning the uniqueness of Kerr-Newman family of black holes: given an asymptotically flat space-time with bifurcate horizons, if it agrees with a non-extremal Kerr-Newman space-time asymptotically flat at infinity and it is sufficiently close to the Kerr-Newman family, then the space-time must be one of the Kerr-Newman solutions. The closeness to the Kerr-Newman f… ▽ More

    Submitted 24 November, 2019; originally announced November 2019.

    Comments: 36 pages, 4 figures

  35. A note on the number of irrational odd zeta values

    Authors: Li Lai, Pin Yu

    Abstract: It is proved that, for all odd integer $s \geqslant s_0(\varepsilon)$, there are at least $\big( c_0 - \varepsilon \big) \frac{s^{1/2}}{(\log s)^{1/2}} $ many irrational numbers among the following odd zeta values: $ζ(3),ζ(5),ζ(7),\cdots,ζ(s)$. The constant $c_0 = 1.192507\ldots$ can be expressed in closed form. The work is based on the previous work of Fischler, Sprang and Zudilin [FSZ19], improv… ▽ More

    Submitted 16 January, 2020; v1 submitted 19 November, 2019; originally announced November 2019.

    Comments: 15 pages, corrected typos, improved the constant 1/10 to about 1.19

    MSC Class: 11J72 (primary); 11M06; 33C20 (secondary)

    Journal ref: Compositio Math. 156 (2020) 1699-1717

  36. arXiv:1910.10513  [pdf, other

    math.ST cs.LG stat.ML

    Minimax Rate Optimal Adaptive Nearest Neighbor Classification and Regression

    Authors: Puning Zhao, Lifeng Lai

    Abstract: k Nearest Neighbor (kNN) method is a simple and popular statistical method for classification and regression. For both classification and regression problems, existing works have shown that, if the distribution of the feature vector has bounded support and the probability density function is bounded away from zero in its support, the convergence rate of the standard kNN method, in which k is the s… ▽ More

    Submitted 22 October, 2019; originally announced October 2019.

  37. arXiv:1903.11220  [pdf, ps, other

    stat.ML cs.IT cs.LG math.ST

    On the Adversarial Robustness of Multivariate Robust Estimation

    Authors: Erhan Bayraktar, Lifeng Lai

    Abstract: In this paper, we investigate the adversarial robustness of multivariate $M$-Estimators. In the considered model, after observing the whole dataset, an adversary can modify all data points with the goal of maximizing inference errors. We use adversarial influence function (AIF) to measure the asymptotic rate at which the adversary can change the inference result. We first characterize the adversar… ▽ More

    Submitted 26 March, 2019; originally announced March 2019.

  38. arXiv:1903.01332  [pdf, other

    math.OC

    Time-Dependent Surveillance-Evasion Games

    Authors: Elliot Cartee, Lexiao Lai, Qianli Song, Alexander Vladimirsky

    Abstract: Surveillance-Evasion (SE) games form an important class of adversarial trajectory-planning problems. We consider time-dependent SE games, in which an Evader is trying to reach its target while minimizing the cumulative exposure to a moving enemy Observer. That Observer is simultaneously aiming to maximize the same exposure by choosing how often to use each of its predefined patrol trajectories. Fo… ▽ More

    Submitted 5 September, 2019; v1 submitted 4 March, 2019; originally announced March 2019.

    Comments: 6 pages, Latex, final version for IEEE CDC 2019

  39. arXiv:1812.11891  [pdf, other

    cs.IT cs.LG eess.SP math.OC stat.ML

    How did Donald Trump Surprisingly Win the 2016 United States Presidential Election? an Information-Theoretic Perspective (Clean Sensing for Big Data Analytics:Optimal Strategies,Estimation Error Bounds Tighter than the Cramér-Rao Bound)

    Authors: Weiyu Xu, Lifeng Lai, Amin Khajehnejad

    Abstract: Donald Trump was lagging behind in nearly all opinion polls leading up to the 2016 US presidential election, but he surprisingly won the election. This raises the following important questions: 1) why most opinion polls were not accurate in 2016? and 2) how to improve the accuracies of opinion polls? In this paper, we study the inaccuracies of opinion polls in the 2016 election through the lens of… ▽ More

    Submitted 31 December, 2018; originally announced December 2018.

    Comments: 45 pages

  40. arXiv:1810.11571  [pdf, other

    stat.ML cs.IT cs.LG math.ST

    Analysis of KNN Information Estimators for Smooth Distributions

    Authors: Puning Zhao, Lifeng Lai

    Abstract: KSG mutual information estimator, which is based on the distances of each sample to its k-th nearest neighbor, is widely used to estimate mutual information between two continuous random variables. Existing work has analyzed the convergence rate of this estimator for random variables whose densities are bounded away from zero in its support. In practice, however, KSG estimator also performs well f… ▽ More

    Submitted 24 October, 2019; v1 submitted 26 October, 2018; originally announced October 2018.

  41. arXiv:1806.03801  [pdf, other

    math.ST

    On the adversarial robustness of robust estimators

    Authors: Lifeng Lai, Erhan Bayraktar

    Abstract: Motivated by recent data analytics applications, we study the adversarial robustness of robust estimators. Instead of assuming that only a fraction of the data points are outliers as considered in the classic robust estimation setup, in this paper, we consider an adversarial setup in which an attacker can observe the whole dataset and can modify all data samples in an adversarial manner so as to m… ▽ More

    Submitted 30 March, 2020; v1 submitted 11 June, 2018; originally announced June 2018.

  42. arXiv:1609.02661  [pdf, other

    math.ST cs.IT stat.ME

    Efficient Byzantine Sequential Change Detection

    Authors: Georgios Fellouris, Erhan Bayraktar, Lifeng Lai

    Abstract: In the multisensor sequential change detection problem, a disruption occurs in an environment monitored by multiple sensors. This disruption induces a change in the observations of an unknown subset of sensors. In the Byzantine version of this problem, which is the focus of this work, it is further assumed that the postulated change-point model may be misspecified for an unknown subset of sensors.… ▽ More

    Submitted 23 August, 2017; v1 submitted 9 September, 2016; originally announced September 2016.

    Comments: 36 pages, 4 figures

    MSC Class: 62L10; 60G40

  43. arXiv:1509.04376  [pdf, ps, other

    cs.IT cs.LG math.OC stat.ML

    Precise Phase Transition of Total Variation Minimization

    Authors: Bingwen Zhang, Weiyu Xu, Jian-Feng Cai, Lifeng Lai

    Abstract: Characterizing the phase transitions of convex optimizations in recovering structured signals or data is of central importance in compressed sensing, machine learning and statistics. The phase transitions of many convex optimization signal recovery methods such as $\ell_1$ minimization and nuclear norm minimization are well understood through recent years' research. However, rigorously characteriz… ▽ More

    Submitted 14 September, 2015; originally announced September 2015.

    Comments: 6 pages

  44. A general theory of particle filters in hidden Markov models and some applications

    Authors: Hock Peng Chan, Tze Leung Lai

    Abstract: By making use of martingale representations, we derive the asymptotic normality of particle filters in hidden Markov models and a relatively simple formula for their asymptotic variances. Although repeated resamplings result in complicated dependence among the sample paths, the asymptotic variance formula and martingale representations lead to consistent estimates of the standard errors of the par… ▽ More

    Submitted 18 December, 2013; originally announced December 2013.

    Comments: Published in at http://dx.doi.org/10.1214/13-AOS1172 the Annals of Statistics (http://www.imstat.org/aos/) by the Institute of Mathematical Statistics (http://www.imstat.org)

    Report number: IMS-AOS-AOS1172

    Journal ref: Annals of Statistics 2013, Vol. 41, No. 6, 2877-2904

  45. On the definition and K-theory realization of a modular functor

    Authors: Igor Kriz, Luhang Lai

    Abstract: We present a definition of a (super)-modular functor which includes certain interesting cases that previous definitions do not allow. We also introduce a notion of topological twisting of a modular functor, and construct formally a realization by a 2-dimensional topological field theory valued in twisted K-modules. We discuss, among other things, the N=1-supersymmetric minimal models from the poin… ▽ More

    Submitted 7 January, 2018; v1 submitted 18 October, 2013; originally announced October 2013.

    Comments: Accepted for publication in the Reviews in Mathematical Physics

    MSC Class: 57R56; 19L50; 19K56

  46. arXiv:1306.2086  [pdf, ps, other

    math.PR cs.IT eess.SY math.OC

    Byzantine Fault Tolerant Distributed Quickest Change Detection

    Authors: Erhan Bayraktar, Lifeng Lai

    Abstract: We introduce and solve the problem of Byzantine fault tolerant distributed quickest change detection in both continuous and discrete time setups. In this problem, multiple sensors sequentially observe random signals from the environment and send their observations to a control center that will determine whether there is a change in the statistical behavior of the observations. We assume that the s… ▽ More

    Submitted 29 December, 2014; v1 submitted 9 June, 2013; originally announced June 2013.

    Comments: Final version. To appear in the SIAM Journal on Control and Optimization. Keywords: (Non-Bayesian) quickest change detection, Byzantine fault tolerance, distributed sensor network, robust optimal stopping in continuous and discrete time

  47. Evaluating probability forecasts

    Authors: Tze Leung Lai, Shulamith T. Gross, David Bo Shen

    Abstract: Probability forecasts of events are routinely used in climate predictions, in forecasting default probabilities on bank loans or in estimating the probability of a patient's positive response to treatment. Scoring rules have long been used to assess the efficacy of the forecast probabilities after observing the occurrence, or nonoccurrence, of the predicted events. We develop herein a statistical… ▽ More

    Submitted 23 February, 2012; originally announced February 2012.

    Comments: Published in at http://dx.doi.org/10.1214/11-AOS902 the Annals of Statistics (http://www.imstat.org/aos/) by the Institute of Mathematical Statistics (http://www.imstat.org)

    Report number: IMS-AOS-AOS902

    Journal ref: Annals of Statistics 2011, Vol. 39, No. 5, 2356-2382

  48. A sequential Monte Carlo approach to computing tail probabilities in stochastic models

    Authors: Hock Peng Chan, Tze Leung Lai

    Abstract: Sequential Monte Carlo methods which involve sequential importance sampling and resampling are shown to provide a versatile approach to computing probabilities of rare events. By making use of martingale representations of the sequential Monte Carlo estimators, we show how resampling weights can be chosen to yield logarithmically efficient Monte Carlo estimates of large deviation probabilities for… ▽ More

    Submitted 21 February, 2012; originally announced February 2012.

    Comments: Published in at http://dx.doi.org/10.1214/10-AAP758 the Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute of Mathematical Statistics (http://www.imstat.org)

    Report number: IMS-AAP-AAP758

    Journal ref: Annals of Applied Probability 2011, Vol. 21, No. 6, 2315-2342

  49. arXiv:1107.1919  [pdf, ps, other

    stat.ME math.ST

    Multistage tests of multiple hypotheses

    Authors: Jay Bartroff, Tze Leung Lai

    Abstract: Conventional multiple hypothesis tests use step-up, step-down, or closed testing methods to control the overall error rates. We will discuss marrying these methods with adaptive multistage sampling rules and stopping rules to perform efficient multiple hypothesis testing in sequential experimental designs. The result is a multistage step-down procedure that adaptively tests multiple hypotheses whi… ▽ More

    Submitted 10 July, 2011; originally announced July 2011.

  50. Modern Sequential Analysis and its Applications to Computerized Adaptive Testing

    Authors: Jay Bartroff, Matthew Finkelman, Tze Leung Lai

    Abstract: After a brief review of recent advances in sequential analysis involving sequential generalized likelihood ratio tests, we discuss their use in psychometric testing and extend the asymptotic optimality theory of these sequential tests to the case of sequentially generated experiments, of particular interest in computerized adaptive testing. We then show how these methods can be used to design adap… ▽ More

    Submitted 13 June, 2011; originally announced June 2011.

    Journal ref: Psychometrika 73 (2008) 473-486