Skip to main content

Showing 1–23 of 23 results for author: Data, D

.
  1. Must the Communication Graph of MPC Protocols be an Expander?

    Authors: Elette Boyle, Ran Cohen, Deepesh Data, Pavel Hubáček

    Abstract: Secure multiparty computation (MPC) on incomplete communication networks has been studied within two primary models: (1) Where a partial network is fixed a priori, and thus corruptions can occur dependent on its structure, and (2) Where edges in the communication graph are determined dynamically as part of the protocol. Whereas a rich literature has succeeded in map** out the feasibility and lim… ▽ More

    Submitted 21 June, 2023; v1 submitted 19 May, 2023; originally announced May 2023.

    Journal ref: Journal of Cryptology 36, 20 (2023)

  2. arXiv:2207.01771  [pdf, other

    cs.LG cs.CR stat.ML

    A Generative Framework for Personalized Learning and Estimation: Theory, Algorithms, and Privacy

    Authors: Kaan Ozkara, Antonious M. Girgis, Deepesh Data, Suhas Diggavi

    Abstract: A distinguishing characteristic of federated learning is that the (local) client data could have statistical heterogeneity. This heterogeneity has motivated the design of personalized learning, where individual (personalized) models are trained, through collaboration. There have been various personalization methods proposed in literature, with seemingly very different forms and methods ranging fro… ▽ More

    Submitted 4 July, 2022; originally announced July 2022.

  3. arXiv:2110.09580  [pdf, other

    cs.CR

    Flexible Accuracy for Differential Privacy

    Authors: Aman Bansal, Rahul Chunduru, Deepesh Data, Manoj Prabhakaran

    Abstract: Differential Privacy (DP) has become a gold standard in privacy-preserving data analysis. While it provides one of the most rigorous notions of privacy, there are many settings where its applicability is limited. Our main contribution is in augmenting differential privacy with {\em Flexible Accuracy}, which allows small distortions in the input (e.g., drop** outliers) before measuring accuracy… ▽ More

    Submitted 18 October, 2021; originally announced October 2021.

    Comments: 42 pages

  4. arXiv:2107.13892  [pdf, other

    cs.LG

    QuPeD: Quantized Personalization via Distillation with Applications to Federated Learning

    Authors: Kaan Ozkara, Navjot Singh, Deepesh Data, Suhas Diggavi

    Abstract: Traditionally, federated learning (FL) aims to train a single global model while collaboratively using multiple clients and a server. Two natural challenges that FL algorithms face are heterogeneity in data across clients and collaboration of clients with {\em diverse resources}. In this work, we introduce a \textit{quantized} and \textit{personalized} FL algorithm QuPeD that facilitates collectiv… ▽ More

    Submitted 5 July, 2022; v1 submitted 29 July, 2021; originally announced July 2021.

    Comments: Appeared in NeurIPS2021. arXiv admin note: text overlap with arXiv:2102.11786

  5. arXiv:2107.08763  [pdf, other

    cs.LG cs.CR cs.IT

    Renyi Differential Privacy of the Subsampled Shuffle Model in Distributed Learning

    Authors: Antonious M. Girgis, Deepesh Data, Suhas Diggavi

    Abstract: We study privacy in a distributed learning framework, where clients collaboratively build a learning model iteratively through interactions with a server from whom we need privacy. Motivated by stochastic optimization and the federated learning (FL) paradigm, we focus on the case where a small fraction of data samples are randomly sub-sampled in each round to participate in the learning process, w… ▽ More

    Submitted 19 July, 2021; originally announced July 2021.

    Comments: arXiv admin note: text overlap with arXiv:2105.05180

  6. arXiv:2107.06917  [pdf, other

    cs.LG

    A Field Guide to Federated Optimization

    Authors: Jianyu Wang, Zachary Charles, Zheng Xu, Gauri Joshi, H. Brendan McMahan, Blaise Aguera y Arcas, Maruan Al-Shedivat, Galen Andrew, Salman Avestimehr, Katharine Daly, Deepesh Data, Suhas Diggavi, Hubert Eichner, Advait Gadhikar, Zachary Garrett, Antonious M. Girgis, Filip Hanzely, Andrew Hard, Chaoyang He, Samuel Horvath, Zhouyuan Huo, Alex Ingerman, Martin Jaggi, Tara Javidi, Peter Kairouz , et al. (28 additional authors not shown)

    Abstract: Federated learning and analytics are a distributed approach for collaboratively learning models (or statistics) from decentralized data, motivated by and designed for privacy protection. The distributed learning process can be formulated as solving federated optimization problems, which emphasize communication efficiency, data heterogeneity, compatibility with privacy and system requirements, and… ▽ More

    Submitted 14 July, 2021; originally announced July 2021.

  7. arXiv:2105.05180  [pdf, other

    cs.CR cs.LG

    On the Renyi Differential Privacy of the Shuffle Model

    Authors: Antonious M. Girgis, Deepesh Data, Suhas Diggavi, Ananda Theertha Suresh, Peter Kairouz

    Abstract: The central question studied in this paper is Renyi Differential Privacy (RDP) guarantees for general discrete local mechanisms in the shuffle privacy model. In the shuffle model, each of the $n$ clients randomizes its response using a local differentially private (LDP) mechanism and the untrusted server only receives a random permutation (shuffle) of the client responses without association to ea… ▽ More

    Submitted 11 May, 2021; originally announced May 2021.

  8. arXiv:2102.11786  [pdf, other

    cs.LG cs.DC

    QuPeL: Quantized Personalization with Applications to Federated Learning

    Authors: Kaan Ozkara, Navjot Singh, Deepesh Data, Suhas Diggavi

    Abstract: Traditionally, federated learning (FL) aims to train a single global model while collaboratively using multiple clients and a server. Two natural challenges that FL algorithms face are heterogeneity in data across clients and collaboration of clients with {\em diverse resources}. In this work, we introduce a \textit{quantized} and \textit{personalized} FL algorithm QuPeL that facilitates collectiv… ▽ More

    Submitted 23 February, 2021; originally announced February 2021.

  9. arXiv:2008.07180  [pdf, ps, other

    cs.LG cs.IT stat.ML

    Shuffled Model of Federated Learning: Privacy, Communication and Accuracy Trade-offs

    Authors: Antonious M. Girgis, Deepesh Data, Suhas Diggavi, Peter Kairouz, Ananda Theertha Suresh

    Abstract: We consider a distributed empirical risk minimization (ERM) optimization problem with communication efficiency and privacy requirements, motivated by the federated learning (FL) framework. Unique challenges to the traditional ERM problem in the context of FL include (i) need to provide privacy guarantees on clients' data, (ii) compress the communication between clients and the server, since client… ▽ More

    Submitted 23 September, 2020; v1 submitted 17 August, 2020; originally announced August 2020.

  10. arXiv:2006.13041  [pdf, other

    stat.ML cs.CR cs.DC cs.LG

    Byzantine-Resilient High-Dimensional Federated Learning

    Authors: Deepesh Data, Suhas Diggavi

    Abstract: We study stochastic gradient descent (SGD) with local iterations in the presence of malicious/Byzantine clients, motivated by the federated learning. The clients, instead of communicating with the central server in every iteration, maintain their local models, which they update by taking several SGD iterations based on their own datasets and then communicate the net update with the server, thereby… ▽ More

    Submitted 16 August, 2020; v1 submitted 21 June, 2020; originally announced June 2020.

    Comments: 33 pages; title change; improved bound on the approximation error by the factor of H

  11. arXiv:2005.11651  [pdf, other

    cs.CR cs.IT cs.LG

    Successive Refinement of Privacy

    Authors: Antonious M. Girgis, Deepesh Data, Kamalika Chaudhuri, Christina Fragouli, Suhas Diggavi

    Abstract: This work examines a novel question: how much randomness is needed to achieve local differential privacy (LDP)? A motivating scenario is providing {\em multiple levels of privacy} to multiple analysts, either for distribution or for heavy-hitter estimation, using the \emph{same} (randomized) output. We call this setting \emph{successive refinement of privacy}, as it provides hierarchical access to… ▽ More

    Submitted 24 May, 2020; originally announced May 2020.

  12. arXiv:2005.07866  [pdf, other

    stat.ML cs.CR cs.DC cs.LG

    Byzantine-Resilient SGD in High Dimensions on Heterogeneous Data

    Authors: Deepesh Data, Suhas Diggavi

    Abstract: We study distributed stochastic gradient descent (SGD) in the master-worker architecture under Byzantine attacks. We consider the heterogeneous data model, where different workers may have different local datasets, and we do not make any probabilistic assumptions on data generation. At the core of our algorithm, we use the polynomial-time outlier-filtering procedure for robust mean estimation prop… ▽ More

    Submitted 16 May, 2020; originally announced May 2020.

    Comments: 57 pages, 2 figures

  13. arXiv:2005.07041  [pdf, other

    cs.LG cs.DC stat.ML

    SQuARM-SGD: Communication-Efficient Momentum SGD for Decentralized Optimization

    Authors: Navjot Singh, Deepesh Data, Jemin George, Suhas Diggavi

    Abstract: In this paper, we propose and analyze SQuARM-SGD, a communication-efficient algorithm for decentralized training of large-scale machine learning models over a network. In SQuARM-SGD, each node performs a fixed number of local SGD steps using Nesterov's momentum and then sends sparsified and quantized updates to its neighbors regulated by a locally computable triggering criterion. We provide conver… ▽ More

    Submitted 11 October, 2021; v1 submitted 12 May, 2020; originally announced May 2020.

    Comments: 58 pages, 8 figures

  14. arXiv:1910.14280  [pdf, other

    stat.ML cs.DC cs.LG math.OC

    SPARQ-SGD: Event-Triggered and Compressed Communication in Decentralized Stochastic Optimization

    Authors: Navjot Singh, Deepesh Data, Jemin George, Suhas Diggavi

    Abstract: In this paper, we propose and analyze SPARQ-SGD, which is an event-triggered and compressed algorithm for decentralized training of large-scale machine learning models. Each node can locally compute a condition (event) which triggers a communication where quantized and sparsified local model parameters are sent. In SPARQ-SGD each node takes at least a fixed number ($H$) of local gradient steps and… ▽ More

    Submitted 24 February, 2020; v1 submitted 31 October, 2019; originally announced October 2019.

    Comments: 41 pages, 4 figures

  15. arXiv:1907.02664  [pdf, other

    cs.DC cs.CR cs.LG

    Data Encoding for Byzantine-Resilient Distributed Optimization

    Authors: Deepesh Data, Linqi Song, Suhas Diggavi

    Abstract: We study distributed optimization in the presence of Byzantine adversaries, where both data and computation are distributed among $m$ worker machines, $t$ of which may be corrupt. The compromised nodes may collaboratively and arbitrarily deviate from their pre-specified programs, and a designated (master) node iteratively computes the model/parameter vector for generalized linear models. In this w… ▽ More

    Submitted 4 November, 2020; v1 submitted 4 July, 2019; originally announced July 2019.

    Comments: 38 pages, Accepted for publication in the IEEE Transactions on Information Theory

  16. arXiv:1906.02367  [pdf, other

    stat.ML cs.DC cs.LG math.OC

    Qsparse-local-SGD: Distributed SGD with Quantization, Sparsification, and Local Computations

    Authors: Debraj Basu, Deepesh Data, Can Karakus, Suhas Diggavi

    Abstract: Communication bottleneck has been identified as a significant issue in distributed optimization of large-scale learning models. Recently, several approaches to mitigate this problem have been proposed, including different forms of gradient compression or computing local models and mixing them iteratively. In this paper, we propose \emph{Qsparse-local-SGD} algorithm, which combines aggressive spars… ▽ More

    Submitted 2 November, 2019; v1 submitted 5 June, 2019; originally announced June 2019.

    Comments: 50 pages; 8 figures; full version of a paper in NeurIPS 2019 with the same title

  17. Estimating the sample mean and standard deviation from commonly reported quantiles in meta-analysis

    Authors: Sean McGrath, XiaoFei Zhao, Russell Steele, Brett D. Thombs, Andrea Benedetti, the DEPRESsion Screening Data, Collaboration

    Abstract: Researchers increasingly use meta-analysis to synthesize the results of several studies in order to estimate a common effect. When the outcome variable is continuous, standard meta-analytic approaches assume that the primary studies report the sample mean and standard deviation of the outcome. However, when the outcome is skewed, authors sometimes summarize the data by reporting the sample median… ▽ More

    Submitted 25 March, 2019; originally announced March 2019.

    Journal ref: Stat. Methods Med. Res. 29 (2020) 2520-2537

  18. Interactive Secure Function Computation

    Authors: Deepesh Data, Gowtham R. Kurri, Jithin Ravi, Vinod M. Prabhakaran

    Abstract: We consider interactive computation of randomized functions between two users with the following privacy requirement: the interaction should not reveal to either user any extra information about the other user's input and output other than what can be inferred from the user's own input and output. We also consider the case where privacy is required against only one of the users. For both cases, we… ▽ More

    Submitted 9 March, 2020; v1 submitted 10 December, 2018; originally announced December 2018.

    Comments: 30 pages. Revised based on comments from the reviewers

  19. arXiv:1705.07081  [pdf, other

    cs.IT

    Secure Computation of Randomized Functions: Further Results

    Authors: Deepesh Data, Vinod M. Prabhakaran

    Abstract: We consider secure computation of randomized functions between two users, where both the users (Alice and Bob) have inputs, Alice sends a message to Bob over a rate-limited, noise-free link, and then Bob produces the output. We study two cases: (i) when privacy condition is required only against Bob, who tries to learn more about Alice's input from the message than what can be inferred by his own… ▽ More

    Submitted 19 May, 2017; originally announced May 2017.

    Comments: This is an extended version of a submission to ITW, 2017

  20. Secure Computation of Randomized Functions

    Authors: Deepesh Data

    Abstract: Two user secure computation of randomized functions is considered, where only one user computes the output. Both the users are semi-honest; and computation is such that no user learns any additional information about the other user's input and output other than what cannot be inferred from its own input and output. First we consider a scenario, where privacy conditions are against both the users.… ▽ More

    Submitted 10 May, 2016; v1 submitted 25 January, 2016; originally announced January 2016.

    Comments: 10 pages, 1 figure, Accepted in IEEE International Symposium on Information Theory 2016

  21. Communication and Randomness Lower Bounds for Secure Computation

    Authors: Deepesh Data, Vinod M. Prabhakaran, Manoj M. Prabhakaran

    Abstract: In secure multiparty computation (MPC), mutually distrusting users collaborate to compute a function of their private data without revealing any additional information about their data to other users. While it is known that information theoretically secure MPC is possible among $n$ users (connected by secure and noiseless links and have access to private randomness) against the collusion of less t… ▽ More

    Submitted 10 May, 2016; v1 submitted 24 December, 2015; originally announced December 2015.

    Comments: 30 pages, To Appear in the IEEE Transaction of Information Theory. arXiv admin note: substantial text overlap with arXiv:1311.7584

  22. How to Securely Compute the Modulo-Two Sum of Binary Sources

    Authors: Deepesh Data, Bikash Kumar Dey, Manoj Mishra, Vinod M. Prabhakaran

    Abstract: In secure multiparty computation, mutually distrusting users in a network want to collaborate to compute functions of data which is distributed among the users. The users should not learn any additional information about the data of others than what they may infer from their own data and the functions they are computing. Previous works have mostly considered the worst case context (i.e., without a… ▽ More

    Submitted 26 May, 2014; v1 submitted 11 May, 2014; originally announced May 2014.

    Comments: 6 pages, 1 figure, extended version of submission to IEEE Information Theory Workshop, 2014

  23. arXiv:1311.7584  [pdf, other

    cs.CR cs.IT

    On the Communication Complexity of Secure Computation

    Authors: Deepesh Data, Vinod M. Prabhakaran, Manoj M. Prabhakaran

    Abstract: Information theoretically secure multi-party computation (MPC) is a central primitive of modern cryptography. However, relatively little is known about the communication complexity of this primitive. In this work, we develop powerful information theoretic tools to prove lower bounds on the communication complexity of MPC. We restrict ourselves to a 3-party setting in order to bring out the power… ▽ More

    Submitted 13 April, 2014; v1 submitted 29 November, 2013; originally announced November 2013.

    Comments: 37 pages