Skip to main content

Showing 1–9 of 9 results for author: Aharoni, E

.
  1. arXiv:2406.11854  [pdf

    cs.CY cs.AI cs.CL

    Attributions toward Artificial Agents in a modified Moral Turing Test

    Authors: Eyal Aharoni, Sharlene Fernandes, Daniel J. Brady, Caelan Alexander, Michael Criner, Kara Queen, Javier Rando, Eddy Nahmias, Victor Crespo

    Abstract: Advances in artificial intelligence (AI) raise important questions about whether people view moral evaluations by AI systems similarly to human-generated moral evaluations. We conducted a modified Moral Turing Test (m-MTT), inspired by Allen and colleagues' (2000) proposal, by asking people to distinguish real human moral evaluations from those made by a popular advanced AI language model: GPT-4.… ▽ More

    Submitted 3 April, 2024; originally announced June 2024.

    Comments: 23 pages, 0 figures, in press

    Journal ref: Scientific Reports (2024)

  2. arXiv:2306.06739  [pdf, other

    cs.CR

    Generating One-Hot Maps under Encryption

    Authors: Ehud Aharoni, Nir Drucker, Eyal Kushnir, Ramy Masalha, Hayim Shaul

    Abstract: One-hot maps are commonly used in the AI domain. Unsurprisingly, they can also bring great benefits to ML-based algorithms such as decision trees that run under Homomorphic Encryption (HE), specifically CKKS. Prior studies in this domain used these maps but assumed that the client encrypts them. Here, we consider different tradeoffs that may affect the client's decision on how to pack and store th… ▽ More

    Submitted 11 June, 2023; originally announced June 2023.

  3. arXiv:2302.03403  [pdf, other

    math.GR

    Simply-laced mixed-sign Coxeter groups, with an associate graph is a line or a simple cycle

    Authors: Yiska Efrat Aharoni, Robert Shwartz

    Abstract: In 2011 Eriko Hironaka introduced an interesting generalization of Coxeter groups, motivated by studying certain map** classes. The generalization is by labeling the vertices of a Coxeter graph either by +1 or by -1, and then generalizing the standard geometric representation of the associated Coxeter group by concerning the labels of the vertices. The group which Hironaka get by that generaliza… ▽ More

    Submitted 7 February, 2023; originally announced February 2023.

  4. arXiv:2207.03384  [pdf, other

    cs.CR cs.LG

    HE-PEx: Efficient Machine Learning under Homomorphic Encryption using Pruning, Permutation and Expansion

    Authors: Ehud Aharoni, Moran Baruch, Pradip Bose, Alper Buyuktosunoglu, Nir Drucker, Subhankar Pal, Tomer Pelleg, Kanthi Sarpatwar, Hayim Shaul, Omri Soceanu, Roman Vaculin

    Abstract: Privacy-preserving neural network (NN) inference solutions have recently gained significant traction with several solutions that provide different latency-bandwidth trade-offs. Of these, many rely on homomorphic encryption (HE), a method of performing computations over encrypted data. However, HE operations even with state-of-the-art schemes are still considerably slow compared to their plaintext… ▽ More

    Submitted 7 July, 2022; originally announced July 2022.

  5. Privacy-preserving record linkage using local sensitive hash and private set intersection

    Authors: Allon Adir, Ehud Aharoni, Nir Drucker, Eyal Kushnir, Ramy Masalha, Michael Mirkin, Omri Soceanu

    Abstract: The amount of data stored in data repositories increases every year. This makes it challenging to link records between different datasets across companies and even internally, while adhering to privacy regulations. Address or name changes, and even different spelling used for entity data, can prevent companies from using private deduplication or record-linking solutions such as private set interse… ▽ More

    Submitted 27 March, 2022; originally announced March 2022.

  6. HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data

    Authors: Ehud Aharoni, Allon Adir, Moran Baruch, Nir Drucker, Gilad Ezov, Ariel Farkash, Lev Greenberg, Ramy Masalha, Guy Moshkowich, Dov Murik, Hayim Shaul, Omri Soceanu

    Abstract: Privacy-preserving solutions enable companies to offload confidential data to third-party services while fulfilling their government regulations. To accomplish this, they leverage various cryptographic techniques such as Homomorphic Encryption (HE), which allows performing computation on encrypted data. Most HE schemes work in a SIMD fashion, and the data packing method can dramatically affect the… ▽ More

    Submitted 1 January, 2023; v1 submitted 3 November, 2020; originally announced November 2020.

    Comments: 17 pages, 7 figures

    ACM Class: E.1; E.3

  7. arXiv:1804.10256  [pdf, other

    stat.ME

    Optimal and Maximin Procedures for Multiple Testing Problems

    Authors: Saharon Rosset, Ruth Heller, Amichai Painsky, Ehud Aharoni

    Abstract: Multiple testing problems are a staple of modern statistical analysis. The fundamental objective of multiple testing procedures is to reject as many false null hypotheses as possible (that is, maximize some notion of power), subject to controlling an overall measure of false discovery, like family-wise error rate (FWER) or false discovery rate (FDR). In this paper we formulate multiple testing of… ▽ More

    Submitted 25 November, 2020; v1 submitted 26 April, 2018; originally announced April 2018.

  8. arXiv:1402.5311  [pdf, ps, other

    cs.CC

    On the Power of Multiplexing in Number-on-the-Forehead Protocols

    Authors: Eldar Aharoni, Eyal Kushilevitz

    Abstract: We study the direct-sum problem for $k$-party ``Number On the Forehead'' (NOF) deterministic communication complexity. We prove several positive results, showing that the complexity of computing a function $f$ in this model, on $\ell$ instances, may be significantly cheaper than $\ell$ times the complexity of computing $f$ on a single instance. Quite surprisingly, we show that this is the case for… ▽ More

    Submitted 21 February, 2014; originally announced February 2014.

  9. arXiv:1307.0522  [pdf, ps, other

    stat.ME

    Generalized Alpha Investing: Definitions, Optimality Results, and Application to Public Databases

    Authors: Ehud Aharoni, Saharon Rosset

    Abstract: The increasing prevalence and utility of large, public databases necessitates the development of appropriate methods for controlling false discovery. Motivated by this challenge, we discuss the generic problem of testing a possibly infinite stream of null hypotheses. In this context, Foster and Stine (2008) suggested a novel method named Alpha Investing for controlling a false discovery measure kn… ▽ More

    Submitted 1 July, 2013; originally announced July 2013.