Skip to main content

Showing 51–100 of 252 results for author: Chaudhuri, K

.
  1. arXiv:2011.03186  [pdf, other

    cs.LG cs.CR

    Revisiting Model-Agnostic Private Learning: Faster Rates and Active Learning

    Authors: Chong Liu, Yuqing Zhu, Kamalika Chaudhuri, Yu-Xiang Wang

    Abstract: The Private Aggregation of Teacher Ensembles (PATE) framework is one of the most promising recent approaches in differentially private learning. Existing theoretical analysis shows that PATE consistently learns any VC-classes in the realizable setting, but falls short in explaining its success in more general cases where the error rate of the optimal classifier is bounded away from zero. We fill i… ▽ More

    Submitted 11 March, 2022; v1 submitted 5 November, 2020; originally announced November 2020.

    Journal ref: Journal of Machine Learning Research 22(262) (2021) 1-44

  2. arXiv:2010.15390  [pdf, other

    cs.LG stat.ML

    Multitask Bandit Learning Through Heterogeneous Feedback Aggregation

    Authors: Zhi Wang, Chicheng Zhang, Manish Kumar Singh, Laurel D. Riek, Kamalika Chaudhuri

    Abstract: In many real-world applications, multiple agents seek to learn how to perform highly related yet slightly different tasks in an online bandit learning protocol. We formulate this problem as the $ε$-multi-player multi-armed bandit problem, in which a set of players concurrently interact with a set of arms, and for each arm, the reward distributions for all players are similar but not necessarily id… ▽ More

    Submitted 19 July, 2021; v1 submitted 29 October, 2020; originally announced October 2020.

    Journal ref: In International Conference on Artificial Intelligence and Statistics (pp. 1531-1539). PMLR (2021, March)

  3. arXiv:2010.08688  [pdf, other

    cs.CR cs.DB

    Locally Differentially Private Analysis of Graph Statistics

    Authors: Jacob Imola, Takao Murakami, Kamalika Chaudhuri

    Abstract: Differentially private analysis of graphs is widely used for releasing statistics from sensitive graphs while still preserving user privacy. Most existing algorithms however are in a centralized privacy model, where a trusted data curator holds the entire graph. As this model raises a number of privacy and security issues -- such as, the trustworthiness of the curator and the possibility of data b… ▽ More

    Submitted 11 February, 2021; v1 submitted 16 October, 2020; originally announced October 2020.

    Comments: This is a full version of the paper accepted at USENIX Security 2021; The first and second authors made equal contributions

  4. arXiv:2008.04449  [pdf, ps, other

    cs.CR cs.AI cs.AR cs.CY cs.LG

    Trustworthy AI Inference Systems: An Industry Research View

    Authors: Rosario Cammarota, Matthias Schunter, Anand Rajan, Fabian Boemer, Ágnes Kiss, Amos Treiber, Christian Weinert, Thomas Schneider, Emmanuel Stapf, Ahmad-Reza Sadeghi, Daniel Demmler, Joshua Stock, Huili Chen, Siam Umar Hussain, Sadegh Riazi, Farinaz Koushanfar, Saransh Gupta, Tajan Simunic Rosing, Kamalika Chaudhuri, Hamid Nejatollahi, Nikil Dutt, Mohsen Imani, Kim Laine, Anuj Dubey, Aydin Aysu , et al. (4 additional authors not shown)

    Abstract: In this work, we provide an industry research view for approaching the design, deployment, and operation of trustworthy Artificial Intelligence (AI) inference systems. Such systems provide customers with timely, informed, and customized inferences to aid their decision, while at the same time utilizing appropriate security protection mechanisms for AI models. Additionally, such systems should also… ▽ More

    Submitted 10 February, 2023; v1 submitted 10 August, 2020; originally announced August 2020.

  5. arXiv:2006.16473  [pdf, other

    physics.optics

    Single and multi-mode directional lasing from arrays of dielectric nanoresonators

    Authors: Shaimaa I. Azzam, Krishnakali Chaudhuri, Alexei Lagutchev, Zubin Jacob, Young L. Kim, Vladimir M. Shalaev, Alexandra Boltasseva, Alexander V. Kildishev

    Abstract: The strong electric and magnetic resonances in dielectric subwavelength structures have enabled unique opportunities for efficient manipulation of light-matter interactions. Besides, the dramatic enhancement of nonlinear light-matter interactions near so-called bound states in the continuum (BICs) has recently attracted enormous attention due to potential advancements in all-optical and quantum co… ▽ More

    Submitted 29 June, 2020; originally announced June 2020.

  6. arXiv:2006.00392  [pdf, other

    cs.LG stat.ML

    The Expressive Power of a Class of Normalizing Flow Models

    Authors: Zhifeng Kong, Kamalika Chaudhuri

    Abstract: Normalizing flows have received a great deal of recent attention as they allow flexible generative modeling as well as easy likelihood computation. While a wide variety of flow models have been proposed, there is little formal understanding of the representation power of these models. In this work, we study some basic normalizing flows and rigorously establish bounds on their expressive power. Our… ▽ More

    Submitted 30 May, 2020; originally announced June 2020.

    Comments: 29 pages, 7 figures; to appear on AISTATS 2020

  7. arXiv:2005.11651  [pdf, other

    cs.CR cs.IT cs.LG

    Successive Refinement of Privacy

    Authors: Antonious M. Girgis, Deepesh Data, Kamalika Chaudhuri, Christina Fragouli, Suhas Diggavi

    Abstract: This work examines a novel question: how much randomness is needed to achieve local differential privacy (LDP)? A motivating scenario is providing {\em multiple levels of privacy} to multiple analysts, either for distribution or for heavy-hitter estimation, using the \emph{same} (randomized) output. We call this setting \emph{successive refinement of privacy}, as it provides hierarchical access to… ▽ More

    Submitted 24 May, 2020; originally announced May 2020.

  8. Detecting Parkinsonian Tremor from IMU Data Collected In-The-Wild using Deep Multiple-Instance Learning

    Authors: Alexandros Papadopoulos, Konstantinos Kyritsis, Lisa Klingelhoefer, Sevasti Bostanjopoulou, K. Ray Chaudhuri, Anastasios Delopoulos

    Abstract: Parkinson's Disease (PD) is a slowly evolving neuro-logical disease that affects about 1% of the population above 60 years old, causing symptoms that are subtle at first, but whose intensity increases as the disease progresses. Automated detection of these symptoms could offer clues as to the early onset of the disease, thus improving the expected clinical outcomes of the patients via appropriatel… ▽ More

    Submitted 6 May, 2020; originally announced May 2020.

  9. arXiv:2004.05675  [pdf, other

    cs.LG stat.ML

    A Non-Parametric Test to Detect Data-Copying in Generative Models

    Authors: Casey Meehan, Kamalika Chaudhuri, Sanjoy Dasgupta

    Abstract: Detecting overfitting in generative models is an important challenge in machine learning. In this work, we formalize a form of overfitting that we call {\em{data-copying}} -- where the generative model memorizes and outputs training samples or small variations thereof. We provide a three sample non-parametric test for detecting data-copying that uses the training set, a separate sample from the ta… ▽ More

    Submitted 12 April, 2020; originally announced April 2020.

    Comments: To be published in AISTATS 2020

  10. arXiv:2003.06121  [pdf, other

    cs.LG stat.ML

    When are Non-Parametric Methods Robust?

    Authors: Robi Bhattacharjee, Kamalika Chaudhuri

    Abstract: A growing body of research has shown that many classifiers are susceptible to {\em{adversarial examples}} -- small strategic modifications to test inputs that lead to misclassification. In this work, we study general non-parametric methods, with a view towards understanding when they are robust to these modifications. We establish general conditions under which non-parametric methods are r-consist… ▽ More

    Submitted 28 December, 2020; v1 submitted 13 March, 2020; originally announced March 2020.

    Comments: accepted to ICML 2020

  11. arXiv:2003.02460  [pdf, other

    cs.LG cs.CR stat.ML

    A Closer Look at Accuracy vs. Robustness

    Authors: Yao-Yuan Yang, Cyrus Rashtchian, Hongyang Zhang, Ruslan Salakhutdinov, Kamalika Chaudhuri

    Abstract: Current methods for training robust networks lead to a drop in test accuracy, which has led prior works to posit that a robustness-accuracy tradeoff may be inevitable in deep learning. We take a closer look at this phenomenon and first show that real image datasets are actually separated. With this property in mind, we then prove that robustness and accuracy should both be achievable for benchmark… ▽ More

    Submitted 12 July, 2020; v1 submitted 5 March, 2020; originally announced March 2020.

  12. arXiv:2002.10077  [pdf, other

    cs.LG stat.ML

    Approximate Data Deletion from Machine Learning Models

    Authors: Zachary Izzo, Mary Anne Smart, Kamalika Chaudhuri, James Zou

    Abstract: Deleting data from a trained machine learning (ML) model is a critical task in many applications. For example, we may want to remove the influence of training points that might be out of date or outliers. Regulations such as EU's General Data Protection Regulation also stipulate that individuals can request to have their data deleted. The naive approach to data deletion is to retrain the ML model… ▽ More

    Submitted 23 February, 2021; v1 submitted 24 February, 2020; originally announced February 2020.

    Comments: 20 pages, 1 figure, accepted for publication at AISTATS 2021

  13. arXiv:1912.04228  [pdf, other

    cs.LG stat.ML

    Location Trace Privacy Under Conditional Priors

    Authors: Casey Meehan, Kamalika Chaudhuri

    Abstract: Providing meaningful privacy to users of location based services is particularly challenging when multiple locations are revealed in a short period of time. This is primarily due to the tremendous degree of dependence that can be anticipated between points. We propose a Rényi differentially private framework for bounding expected privacy loss for conditionally dependent data. Additionally, we demo… ▽ More

    Submitted 9 December, 2019; originally announced December 2019.

    Comments: Included in NeurIPS 2019 PriML workshop https://priml-workshop.github.io/priml2019/

  14. arXiv:1907.02159  [pdf, other

    cs.LG cs.CR stat.ML

    Capacity Bounded Differential Privacy

    Authors: Kamalika Chaudhuri, Jacob Imola, Ashwin Machanavajjhala

    Abstract: Differential privacy, a notion of algorithmic stability, is a gold standard for measuring the additional risk an algorithm's output poses to the privacy of a single record in the dataset. Differential privacy is defined as the distance between the output distribution of an algorithm on neighboring datasets that differ in one entry. In this work, we present a novel relaxation of differential privac… ▽ More

    Submitted 3 July, 2019; originally announced July 2019.

    Comments: 10 pages, 2 figures, Neurips 2019

  15. arXiv:1906.03310  [pdf, other

    cs.LG cs.CR cs.DS stat.ML

    Robustness for Non-Parametric Classification: A Generic Attack and Defense

    Authors: Yao-Yuan Yang, Cyrus Rashtchian, Yizhen Wang, Kamalika Chaudhuri

    Abstract: Adversarially robust machine learning has received much recent attention. However, prior attacks and defenses for non-parametric classifiers have been developed in an ad-hoc or classifier-specific basis. In this work, we take a holistic look at adversarial examples for non-parametric classifiers, including nearest neighbors, decision trees, and random forests. We provide a general defense method,… ▽ More

    Submitted 24 February, 2020; v1 submitted 7 June, 2019; originally announced June 2019.

    Comments: AISTATS 2020

  16. arXiv:1905.12791  [pdf, other

    stat.ML cs.LG

    The Label Complexity of Active Learning from Observational Data

    Authors: Songbai Yan, Kamalika Chaudhuri, Tara Javidi

    Abstract: Counterfactual learning from observational data involves learning a classifier on an entire population based on data that is observed conditioned on a selection policy. This work considers this problem in an active setting, where the learner additionally has access to unlabeled examples and can choose to get a subset of these labeled by an oracle. Prior work on this problem uses disagreement-bas… ▽ More

    Submitted 27 October, 2019; v1 submitted 29 May, 2019; originally announced May 2019.

    Comments: NeurIPS 2019

  17. arXiv:1905.12121  [pdf, other

    cs.LG cs.CR stat.ML

    An Investigation of Data Poisoning Defenses for Online Learning

    Authors: Yizhen Wang, Somesh Jha, Kamalika Chaudhuri

    Abstract: Data poisoning attacks -- where an adversary can modify a small fraction of training data, with the goal of forcing the trained classifier to high loss -- are an important threat for machine learning in many applications. While a body of prior work has developed attacks and defenses, there is not much general understanding on when various attacks and defenses are effective. In this work, we undert… ▽ More

    Submitted 19 February, 2020; v1 submitted 28 May, 2019; originally announced May 2019.

  18. arXiv:1903.09084  [pdf, other

    cs.CR cs.LG stat.ML

    Profile-Based Privacy for Locally Private Computations

    Authors: Joseph Geumlek, Kamalika Chaudhuri

    Abstract: Differential privacy has emerged as a gold standard in privacy-preserving data analysis. A popular variant is local differential privacy, where the data holder is the trusted curator. A major barrier, however, towards a wider adoption of this model is that it offers a poor privacy-utility tradeoff. In this work, we address this problem by introducing a new variant of local privacy called profile… ▽ More

    Submitted 16 June, 2019; v1 submitted 20 January, 2019; originally announced March 2019.

  19. arXiv:1811.02054  [pdf, other

    cs.LG cs.CR stat.ML

    Exploring Connections Between Active Learning and Model Extraction

    Authors: Varun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan

    Abstract: Machine learning is being increasingly used by individuals, research institutions, and corporations. This has resulted in the surge of Machine Learning-as-a-Service (MLaaS) - cloud services that provide (a) tools and resources to learn the model, and (b) a user-friendly query interface to access the model. However, such MLaaS systems raise privacy concerns such as model extraction. In model extrac… ▽ More

    Submitted 19 November, 2019; v1 submitted 5 November, 2018; originally announced November 2018.

  20. arXiv:1809.04542  [pdf, ps, other

    cs.LG stat.ML

    The Inductive Bias of Restricted f-GANs

    Authors: Shuang Liu, Kamalika Chaudhuri

    Abstract: Generative adversarial networks are a novel method for statistical inference that have achieved much empirical success; however, the factors contributing to this success remain ill-understood. In this work, we attempt to analyze generative adversarial learning -- that is, statistical inference as the result of a game between a generator and a discriminator -- with the view of understanding how it… ▽ More

    Submitted 12 September, 2018; originally announced September 2018.

  21. arXiv:1809.02575  [pdf, other

    cs.CR cs.DS

    Differentially Private Continual Release of Graph Statistics

    Authors: Shuang Song, Susan Little, Sanjay Mehta, Staal Vinterbo, Kamalika Chaudhuri

    Abstract: Motivated by understanding the dynamics of sensitive social networks over time, we consider the problem of continual release of statistics in a network that arrives online, while preserving privacy of its participants. For our privacy notion, we use differential privacy -- the gold standard in privacy for statistical data analysis. The main challenge in this problem is maintaining a good privacy-u… ▽ More

    Submitted 18 September, 2018; v1 submitted 7 September, 2018; originally announced September 2018.

  22. arXiv:1808.08994  [pdf, other

    cs.LG stat.ML

    Data Poisoning Attacks against Online Learning

    Authors: Yizhen Wang, Kamalika Chaudhuri

    Abstract: We consider data poisoning attacks, a class of adversarial attacks on machine learning where an adversary has the power to alter a small fraction of the training data in order to make the trained classifier satisfy certain objectives. While there has been much prior work on data poisoning, most of it is in the offline setting, and attacks for online learning, where training data arrives in a strea… ▽ More

    Submitted 27 August, 2018; originally announced August 2018.

  23. arXiv:1802.09069  [pdf, other

    cs.LG stat.ML

    Active Learning with Logged Data

    Authors: Songbai Yan, Kamalika Chaudhuri, Tara Javidi

    Abstract: We consider active learning with logged data, where labeled examples are drawn conditioned on a predetermined logging policy, and the goal is to learn a classifier on the entire population, not just conditioned on the logging policy. Prior work addresses this problem either when only logged data is available, or purely in a controlled random experimentation setting where the logged data is ignored… ▽ More

    Submitted 13 June, 2018; v1 submitted 25 February, 2018; originally announced February 2018.

    Comments: ICML 2018

  24. arXiv:1802.02498  [pdf, other

    cs.LG stat.ML

    Spectral Learning of Binomial HMMs for DNA Methylation Data

    Authors: Chicheng Zhang, Eran A. Mukamel, Kamalika Chaudhuri

    Abstract: We consider learning parameters of Binomial Hidden Markov Models, which may be used to model DNA methylation data. The standard algorithm for the problem is EM, which is computationally expensive for sequences of the scale of the mammalian genome. Recently developed spectral algorithms can learn parameters of latent variable models via tensor decomposition, and are highly efficient for large data.… ▽ More

    Submitted 7 February, 2018; originally announced February 2018.

  25. arXiv:1710.00892  [pdf, other

    cs.LG cs.AI cs.CR

    Rényi Differential Privacy Mechanisms for Posterior Sampling

    Authors: Joseph Geumlek, Shuang Song, Kamalika Chaudhuri

    Abstract: Using a recently proposed privacy definition of Rényi Differential Privacy (RDP), we re-examine the inherent privacy of releasing a single sample from a posterior distribution. We exploit the impact of the prior distribution in mitigating the influence of individual data points. In particular, we focus on sampling from an exponential family and specific generalized linear models, such as logistic… ▽ More

    Submitted 2 October, 2017; originally announced October 2017.

    Comments: to be published in NIPS 2017

  26. arXiv:1709.00666  [pdf

    physics.hist-ph physics.pop-ph

    Einstein's Patents and Inventions

    Authors: Asis Kumar Chaudhuri

    Abstract: Times magazine selected Albert Einstein, the German born Jewish Scientist as the person of the 20th century. Undoubtedly, 20th century was the age of science and Einstein's contributions in unraveling mysteries of nature was unparalleled. However, few are aware that Einstein was also a great inventor. He and his collaborators had patented a wide variety of inventions in several countries. After a… ▽ More

    Submitted 5 September, 2017; v1 submitted 3 September, 2017; originally announced September 2017.

    Comments: 15 pages, 7 figures (minor corrections)

  27. Learning to Blame: Localizing Novice Type Errors with Data-Driven Diagnosis

    Authors: Eric L. Seidel, Huma Sibghat, Kamalika Chaudhuri, Westley Weimer, Ranjit Jhala

    Abstract: Localizing type errors is challenging in languages with global type inference, as the type checker must make assumptions about what the programmer intended to do. We introduce Nate, a data-driven approach to error localization based on supervised learning. Nate analyzes a large corpus of training data -- pairs of ill-typed programs and their "fixed" versions -- to automatically learn a model of wh… ▽ More

    Submitted 17 September, 2017; v1 submitted 24 August, 2017; originally announced August 2017.

    Comments: OOPSLA '17

  28. arXiv:1707.02702  [pdf, ps, other

    cs.LG cs.CR stat.ML

    Composition Properties of Inferential Privacy for Time-Series Data

    Authors: Shuang Song, Kamalika Chaudhuri

    Abstract: With the proliferation of mobile devices and the internet of things, develo** principled solutions for privacy in time series applications has become increasingly important. While differential privacy is the gold standard for database privacy, many time series applications require a different kind of guarantee, and a number of recent works have used some form of inferential privacy to address th… ▽ More

    Submitted 10 July, 2017; originally announced July 2017.

  29. arXiv:1706.03922  [pdf, other

    stat.ML cs.CR cs.LG

    Analyzing the Robustness of Nearest Neighbors to Adversarial Examples

    Authors: Yizhen Wang, Somesh Jha, Kamalika Chaudhuri

    Abstract: Motivated by safety-critical applications, test-time attacks on classifiers via adversarial examples has recently received a great deal of attention. However, there is a general lack of understanding on why adversarial examples arise; whether they originate due to inherent properties of data or due to lack of training samples remains ill-understood. In this work, we introduce a theoretical framewo… ▽ More

    Submitted 18 June, 2019; v1 submitted 13 June, 2017; originally announced June 2017.

    Journal ref: International Conference on Machine Learning (ICML) 2018, Page 5133--5142

  30. arXiv:1705.08991  [pdf, other

    cs.LG stat.ML

    Approximation and Convergence Properties of Generative Adversarial Learning

    Authors: Shuang Liu, Olivier Bousquet, Kamalika Chaudhuri

    Abstract: Generative adversarial networks (GAN) approximate a target data distribution by jointly optimizing an objective function through a "two-player game" between a generator and a discriminator. Despite their empirical success, however, two very basic questions on how well they can approximate the target distribution remain unanswered. First, it is not known how restricting the discriminator family aff… ▽ More

    Submitted 24 May, 2017; originally announced May 2017.

  31. arXiv:1611.00340  [pdf, other

    stat.ML cs.CR

    Variational Bayes In Private Settings (VIPS)

    Authors: Mijung Park, James Foulds, Kamalika Chaudhuri, Max Welling

    Abstract: Many applications of Bayesian data analysis involve sensitive information, motivating methods which ensure that privacy is protected. We introduce a general privacy-preserving framework for Variational Bayes (VB), a widely used optimization-based Bayesian inference method. Our framework respects differential privacy, the gold-standard privacy criterion, and encompasses a large class of probabilist… ▽ More

    Submitted 3 December, 2018; v1 submitted 1 November, 2016; originally announced November 2016.

    Comments: The previous version of this paper had an error in the composition method we used. This version fixed that error

  32. arXiv:1610.09730  [pdf, ps, other

    cs.LG stat.ML

    Active Learning from Imperfect Labelers

    Authors: Songbai Yan, Kamalika Chaudhuri, Tara Javidi

    Abstract: We study active learning where the labeler can not only return incorrect labels but also abstain from labeling. We consider different noise and abstention conditions of the labeler. We propose an algorithm which utilizes abstention responses, and analyze its statistical consistency and query complexity under fairly natural assumptions on the noise and abstention rate of the labeler. This algorithm… ▽ More

    Submitted 30 October, 2016; originally announced October 2016.

    Comments: To appear in NIPS 2016

  33. arXiv:1609.04120  [pdf, other

    stat.ML cs.CR

    Private Topic Modeling

    Authors: Mijung Park, James Foulds, Kamalika Chaudhuri, Max Welling

    Abstract: We develop a privatised stochastic variational inference method for Latent Dirichlet Allocation (LDA). The iterative nature of stochastic variational inference presents challenges: multiple iterations are required to obtain accurate posterior distributions, yet each iteration increases the amount of noise that must be added to achieve a reasonable degree of privacy. We propose a practical algorith… ▽ More

    Submitted 3 December, 2018; v1 submitted 13 September, 2016; originally announced September 2016.

  34. arXiv:1606.04722  [pdf, other

    cs.LG cs.CR cs.DB stat.ML

    Bolt-on Differential Privacy for Scalable Stochastic Gradient Descent-based Analytics

    Authors: Xi Wu, Fengan Li, Arun Kumar, Kamalika Chaudhuri, Somesh Jha, Jeffrey F. Naughton

    Abstract: While significant progress has been made separately on analytics systems for scalable stochastic gradient descent (SGD) and private SGD, none of the major scalable analytics frameworks have incorporated differentially private SGD. There are two inter-related issues for this disconnect between research and practice: (1) low model accuracy due to added noise to guarantee privacy, and (2) high develo… ▽ More

    Submitted 23 March, 2017; v1 submitted 15 June, 2016; originally announced June 2016.

  35. arXiv:1606.04266  [pdf

    physics.pop-ph

    On Science, pseudoscience and String theory

    Authors: Asis Kumar Chaudhuri

    Abstract: The article discusses the demarcation problem; how to distinguish between science and pseudoscience. It then examines the string theory under various demarcation criteria to conclude that string theory cannot be considered as science.

    Submitted 14 June, 2016; originally announced June 2016.

    Comments: 10 pages

  36. arXiv:1605.06995  [pdf, other

    cs.LG cs.AI cs.CR stat.ME stat.ML

    DP-EM: Differentially Private Expectation Maximization

    Authors: Mijung Park, Jimmy Foulds, Kamalika Chaudhuri, Max Welling

    Abstract: The iterative nature of the expectation maximization (EM) algorithm presents a challenge for privacy-preserving estimation, as each iteration increases the amount of noise needed. We propose a practical private EM algorithm that overcomes this challenge using two innovations: (1) a novel moment perturbation formulation for differentially private EM (DP-EM), and (2) the use of two recently develope… ▽ More

    Submitted 31 October, 2016; v1 submitted 23 May, 2016; originally announced May 2016.

  37. arXiv:1605.00761  [pdf

    physics.pop-ph astro-ph.HE hep-ex hep-ph nucl-th

    Gravitational Wave for a pedestrian

    Authors: A K Chaudhuri

    Abstract: The physics of gravitational wave and its detection in the recent experiment by the LIGO collaboration is discussed in simple terms for a general audience. The main article is devoid of any mathematics, but an appendix is included for inquisitive readers where essential mathematics for general theory of relativity and gravitational waves are given.

    Submitted 5 May, 2016; v1 submitted 3 May, 2016; originally announced May 2016.

    Comments: Few mistakes are corrected. 19 pages, 8 figures

  38. arXiv:1604.06162  [pdf, ps, other

    cs.LG

    The Extended Littlestone's Dimension for Learning with Mistakes and Abstentions

    Authors: Chicheng Zhang, Kamalika Chaudhuri

    Abstract: This paper studies classification with an abstention option in the online setting. In this setting, examples arrive sequentially, the learner is given a hypothesis class $\mathcal H$, and the goal of the learner is to either predict a label on each example or abstain, while ensuring that it does not make more than a pre-specified number of mistakes when it does predict a label. Previous work on… ▽ More

    Submitted 28 September, 2016; v1 submitted 20 April, 2016; originally announced April 2016.

    Comments: 29 pages, 7 figures; COLT 2016

  39. arXiv:1603.07294  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    On the Theory and Practice of Privacy-Preserving Bayesian Data Analysis

    Authors: James Foulds, Joseph Geumlek, Max Welling, Kamalika Chaudhuri

    Abstract: Bayesian inference has great promise for the privacy-preserving analysis of sensitive data, as posterior sampling automatically preserves differential privacy, an algorithmic notion of data privacy, under certain conditions (Dimitrakakis et al., 2014; Wang et al., 2015). While this one posterior sample (OPS) approach elegantly provides privacy "for free," it is data inefficient in the sense of asy… ▽ More

    Submitted 8 June, 2016; v1 submitted 23 March, 2016; originally announced March 2016.

    Comments: Updated to match the accepted UAI version. Generalized the ARE result and included a more detailed proof. Improved some figures, etc

    Journal ref: Proceedings of the 32nd Conference on Uncertainty in Artificial Intelligence (UAI), 2016

  40. arXiv:1603.03977  [pdf, other

    cs.LG cs.CR stat.ML

    Pufferfish Privacy Mechanisms for Correlated Data

    Authors: Shuang Song, Yizhen Wang, Kamalika Chaudhuri

    Abstract: Many modern databases include personal and sensitive correlated data, such as private information on users connected together in a social network, and measurements of physical activity of single subjects across time. However, differential privacy, the current gold standard in data privacy, does not adequately address privacy issues in this kind of data. This work looks at a recent generalization… ▽ More

    Submitted 12 March, 2017; v1 submitted 12 March, 2016; originally announced March 2016.

  41. arXiv:1603.02641  [pdf, other

    cs.LO

    A Hybrid Linear Logic for Constrained Transition Systems

    Authors: Joelle Despeyroux, Kaustuv Chaudhuri

    Abstract: Linear implication can represent state transitions, but real transition systems operate under temporal, stochastic or probabilistic constraints that are not directly representable in ordinary linear logic. We propose a general modal extension of intuitionistic linear logic where logical truth is indexed by constraints and hybrid connectives combine constraint reasoning with logical reasoning. Th… ▽ More

    Submitted 8 March, 2016; originally announced March 2016.

    Comments: LIPIcs. TYPES'2013, Apr 2013, Toulouse, France. Post-proceedings of TYPES'2013, 19th Intl Conference on Types for Proofs and Programs, LIPIcs., 26, pp.150-168, 2014. arXiv admin note: substantial text overlap with arXiv:1310.4310

  42. arXiv:1602.04409  [pdf, other

    cs.LG

    Convex Optimization For Non-Convex Problems via Column Generation

    Authors: Julian Yarkony, Kamalika Chaudhuri

    Abstract: We apply column generation to approximating complex structured objects via a set of primitive structured objects under either the cross entropy or L2 loss. We use L1 regularization to encourage the use of few structured primitive objects. We attack approximation using convex optimization over an infinite number of variables each corresponding to a primitive structured object that are generated on… ▽ More

    Submitted 13 February, 2016; originally announced February 2016.

  43. arXiv:1601.05983  [pdf

    math.HO hep-ph nucl-ex nucl-th physics.pop-ph

    Much ado about Zero

    Authors: Asis Kumar Chaudhuri

    Abstract: A brief historical introduction for the enigmatic number Zero is given. The discussions are for popular consumption.

    Submitted 7 June, 2016; v1 submitted 22 January, 2016; originally announced January 2016.

    Comments: minor corrections are made. 13 pages, 5 figures

  44. arXiv:1510.02847  [pdf, ps, other

    cs.LG stat.ML

    Active Learning from Weak and Strong Labelers

    Authors: Chicheng Zhang, Kamalika Chaudhuri

    Abstract: An active learner is given a hypothesis class, a large set of unlabeled examples and the ability to interactively query labels to an oracle of a subset of these examples; the goal of the learner is to learn a hypothesis in the class that fits the data well by making as few label queries as possible. This work addresses active learning with labels obtained from strong and weak labelers, where in… ▽ More

    Submitted 15 October, 2015; v1 submitted 9 October, 2015; originally announced October 2015.

    Comments: To appear in NIPS 2015

  45. arXiv:1507.07597   

    cs.LO cs.PL

    Proceedings Tenth International Workshop on Logical Frameworks and Meta Languages: Theory and Practice

    Authors: Iliano Cervesato, Kaustuv Chaudhuri

    Abstract: This volume constitutes the proceedings of LFMTP 2015, the Tenth International Workshop on Logical Frameworks and Meta-Languages: Theory and Practice, held on August 1st, 2015 in Berlin, Germany. The workshop was a one-day satellite event of CADE-25, the 25th International Conference on Automated Deduction. Logical frameworks and meta-languages form a common substrate for representing, implementi… ▽ More

    Submitted 27 July, 2015; originally announced July 2015.

    Journal ref: EPTCS 185, 2015

  46. arXiv:1507.04898  [pdf, ps, other

    nucl-th hep-ph

    Fluctuations in slope parameter in event-by-event hydrodynamics and momentum anisotropy in heavy ion collisions

    Authors: A. K. Chaudhuri

    Abstract: In event by event hydrodynamic model, we have simulated 30-40\% Au+Au collisions at RHIC and computed the slope parameter from the invariant pion distribution. In each event, the slope parameter fluctuates azimuthally. Fourier expansion coefficients $T_n$ for the slope parameter and the Fourier expansion coefficients $v_n$ for the azimuthal distribution $\frac{dN}{dφ}$ are found to be strongly cor… ▽ More

    Submitted 17 July, 2015; originally announced July 2015.

    Comments: 6 pages, 4 figures. arXiv admin note: text overlap with arXiv:1210.2249

  47. arXiv:1506.02348  [pdf, ps, other

    cs.LG stat.ML

    Convergence Rates of Active Learning for Maximum Likelihood Estimation

    Authors: Kamalika Chaudhuri, Sham Kakade, Praneeth Netrapalli, Sujay Sanghavi

    Abstract: An active learner is given a class of models, a large set of unlabeled examples, and the ability to interactively query labels of a subset of these examples; the goal of the learner is to learn a model in the class that fits the data well. Previous theoretical work has rigorously characterized label complexity of active learning, but most of this work has focused on the PAC or the agnostic PAC m… ▽ More

    Submitted 8 June, 2015; originally announced June 2015.

  48. arXiv:1506.01744  [pdf, other

    stat.ML cs.LG math.ST q-bio.GN

    Spectral Learning of Large Structured HMMs for Comparative Epigenomics

    Authors: Chicheng Zhang, Jimin Song, Kevin C Chen, Kamalika Chaudhuri

    Abstract: We develop a latent variable model and an efficient spectral algorithm motivated by the recent emergence of very large data sets of chromatin marks from multiple human cell types. A natural model for chromatin data in one cell type is a Hidden Markov Model (HMM); we model the relationship between multiple cell types by connecting their hidden states by a fixed tree of known structure. The main cha… ▽ More

    Submitted 4 June, 2015; originally announced June 2015.

    Comments: 27 pages, 3 figures

  49. arXiv:1504.00064  [pdf, other

    stat.ML cs.LG

    Crowdsourcing Feature Discovery via Adaptively Chosen Comparisons

    Authors: James Y. Zou, Kamalika Chaudhuri, Adam Tauman Kalai

    Abstract: We introduce an unsupervised approach to efficiently discover the underlying features in a data set via crowdsourcing. Our queries ask crowd members to articulate a feature common to two out of three displayed examples. In addition we also ask the crowd to provide binary labels to the remaining examples based on the discovered features. The triples are chosen adaptively based on the labels of the… ▽ More

    Submitted 31 March, 2015; originally announced April 2015.

  50. Undecidability of Multiplicative Subexponential Logic

    Authors: Kaustuv Chaudhuri

    Abstract: Subexponential logic is a variant of linear logic with a family of exponential connectives--called subexponentials--that are indexed and arranged in a pre-order. Each subexponential has or lacks associated structural properties of weakening and contraction. We show that classical propositional multiplicative linear logic extended with one unrestricted and two incomparable linear subexponentials… ▽ More

    Submitted 16 February, 2015; originally announced February 2015.

    Comments: In Proceedings LINEARITY 2014, arXiv:1502.04419

    ACM Class: F.4.2

    Journal ref: EPTCS 176, 2015, pp. 1-8