Skip to main content

Showing 1–22 of 22 results for author: Fawaz, N

.
  1. arXiv:2305.15534  [pdf, other

    cs.IR cs.CY cs.LG

    Representation Online Matters: Practical End-to-End Diversification in Search and Recommender Systems

    Authors: Pedro Silva, Bhawna Juneja, Shloka Desai, Ashudeep Singh, Nadia Fawaz

    Abstract: As the use of online platforms continues to grow across all demographics, users often express a desire to feel represented in the content. To improve representation in search results and recommendations, we introduce end-to-end diversification, ensuring that diverse content flows throughout the various stages of these systems, from retrieval to ranking. We develop, experiment, and deploy scalable… ▽ More

    Submitted 26 May, 2023; v1 submitted 24 May, 2023; originally announced May 2023.

    Comments: In Proceedings of the 2023 ACM Conference on Fairness, Accountability, and Transparency (FAccT '23), June 12--15, 2023, Chicago, IL, USA

  2. arXiv:1905.06134  [pdf

    cs.IR cs.LG cs.SI stat.ML

    Recommending Dream Jobs in a Biased Real World

    Authors: Nadia Fawaz

    Abstract: Machine learning models learn what we teach them to learn. Machine learning is at the heart of recommender systems. If a machine learning model is trained on biased data, the resulting recommender system may reflect the biases in its recommendations. Biases arise at different stages in a recommender system, from existing societal biases in the data such as the professional gender gap, to biases in… ▽ More

    Submitted 10 May, 2019; originally announced May 2019.

    Comments: Accepted and presented at Grace Hopper Conference, GHC 2017

    Journal ref: Grace Hopper Conference, GHC 2017

  3. arXiv:1704.07554  [pdf, other

    stat.ML

    A relevance-scalability-interpretability tradeoff with temporally evolving user personas

    Authors: Snigdha Panigrahi, Nadia Fawaz

    Abstract: The current work characterizes the users of a VoD streaming space through user-personas based on a tenure timeline and temporal behavioral features in the absence of explicit user profiles. A combination of tenure timeline and temporal characteristics caters to business needs of understanding the evolution and phases of user behavior as their accounts age. The personas constructed in this work suc… ▽ More

    Submitted 13 September, 2017; v1 submitted 25 April, 2017; originally announced April 2017.

  4. arXiv:1503.01910  [pdf, other

    cs.LG cs.AI

    Sequential Relevance Maximization with Binary Feedback

    Authors: Vijay Kamble, Nadia Fawaz, Fernando Silveira

    Abstract: Motivated by online settings where users can provide explicit feedback about the relevance of products that are sequentially presented to them, we look at the recommendation process as a problem of dynamically optimizing this relevance feedback. Such an algorithm optimizes the fine tradeoff between presenting the products that are most likely to be relevant, and learning the preferences of the use… ▽ More

    Submitted 6 March, 2015; originally announced March 2015.

  5. Managing your Private and Public Data: Bringing down Inference Attacks against your Privacy

    Authors: Salman Salamatian, Amy Zhang, Flavio du Pin Calmon, Sandilya Bhamidipati, Nadia Fawaz, Branislav Kveton, Pedro Oliveira, Nina Taft

    Abstract: We propose a practical methodology to protect a user's private data, when he wishes to publicly release data that is correlated with his private data, in the hope of getting some utility. Our approach relies on a general statistical inference framework that captures the privacy threat under inference attacks, given utility constraints. Under this framework, data is distorted before it is released,… ▽ More

    Submitted 15 August, 2014; originally announced August 2014.

  6. arXiv:1408.2055  [pdf

    cs.LG cs.IR stat.ML

    Guess Who Rated This Movie: Identifying Users Through Subspace Clustering

    Authors: Amy Zhang, Nadia Fawaz, Stratis Ioannidis, Andrea Montanari

    Abstract: It is often the case that, within an online recommender system, multiple users share a common account. Can such shared accounts be identified solely on the basis of the userprovided ratings? Once a shared account is identified, can the different users sharing it be identified as well? Whenever such user identification is feasible, it opens the way to possible improvements in personalized recommend… ▽ More

    Submitted 9 August, 2014; originally announced August 2014.

    Comments: Appears in Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence (UAI2012)

    Report number: UAI-P-2012-PG-944-953

  7. arXiv:1403.8084  [pdf, other

    cs.CR cs.LG

    Privacy Tradeoffs in Predictive Analytics

    Authors: Stratis Ioannidis, Andrea Montanari, Udi Weinsberg, Smriti Bhagat, Nadia Fawaz, Nina Taft

    Abstract: Online services routinely mine user data to predict user preferences, make recommendations, and place targeted ads. Recent research has demonstrated that several private user attributes (such as political affiliation, sexual orientation, and gender) can be inferred from such data. Can a privacy-conscious user benefit from personalization while simultaneously protecting her private attributes? We s… ▽ More

    Submitted 31 March, 2014; originally announced March 2014.

    Comments: Extended version of the paper appearing in SIGMETRICS 2014

  8. arXiv:1402.1774  [pdf, ps, other

    cs.IT

    From the Information Bottleneck to the Privacy Funnel

    Authors: Ali Makhdoumi, Salman Salamatian, Nadia Fawaz, Muriel Medard

    Abstract: We focus on the privacy-utility trade-off encountered by users who wish to disclose some information to an analyst, that is correlated with their private data, in the hope of receiving some utility. We rely on a general privacy statistical inference framework, under which data is transformed before it is disclosed, according to a probabilistic privacy map**. We show that when the log-loss is int… ▽ More

    Submitted 29 September, 2014; v1 submitted 7 February, 2014; originally announced February 2014.

  9. arXiv:1301.6447  [pdf, ps, other

    cs.DS

    Nearly Optimal Private Convolution

    Authors: Nadia Fawaz, S. Muthukrishnan, Aleksandar Nikolov

    Abstract: We study computing the convolution of a private input $x$ with a public input $h$, while satisfying the guarantees of $(ε, δ)$-differential privacy. Convolution is a fundamental operation, intimately related to Fourier Transforms. In our setting, the private input may represent a time series of sensitive events or a histogram of a database of confidential personal information. Convolution then cap… ▽ More

    Submitted 27 January, 2013; originally announced January 2013.

  10. arXiv:1210.2123  [pdf, ps, other

    cs.IT cs.CR

    Privacy Against Statistical Inference

    Authors: Flavio du Pin Calmon, Nadia Fawaz

    Abstract: We propose a general statistical inference framework to capture the privacy threat incurred by a user that releases data to a passive but curious adversary, given utility constraints. We show that applying this general framework to the setting where the adversary uses the self-information cost function naturally leads to a non-asymptotic information-theoretic approach for characterizing the best a… ▽ More

    Submitted 7 October, 2012; originally announced October 2012.

    Comments: Allerton 2012, 8 pages

  11. arXiv:1208.1544  [pdf, other

    cs.LG

    Guess Who Rated This Movie: Identifying Users Through Subspace Clustering

    Authors: Amy Zhang, Nadia Fawaz, Stratis Ioannidis, Andrea Montanari

    Abstract: It is often the case that, within an online recommender system, multiple users share a common account. Can such shared accounts be identified solely on the basis of the user- provided ratings? Once a shared account is identified, can the different users sharing it be identified as well? Whenever such user identification is feasible, it opens the way to possible improvements in personalized recomme… ▽ More

    Submitted 7 August, 2012; originally announced August 2012.

    Comments: 10 pages

    Journal ref: 28th Conference on Uncertainty in Artificial Intelligence (UAI 2012)

  12. arXiv:1207.6379  [pdf, ps, other

    cs.IR cs.LG stat.ML

    Identifying Users From Their Rating Patterns

    Authors: José Bento, Nadia Fawaz, Andrea Montanari, Stratis Ioannidis

    Abstract: This paper reports on our analysis of the 2011 CAMRa Challenge dataset (Track 2) for context-aware movie recommendation systems. The train dataset comprises 4,536,891 ratings provided by 171,670 users on 23,974$ movies, as well as the household grou**s of a subset of the users. The test dataset comprises 5,450 ratings for which the user label is missing, but the household label is provided. The… ▽ More

    Submitted 26 July, 2012; originally announced July 2012.

    Comments: Winner of the 2011 Challenge on Context-Aware Movie Recommendation (RecSys 2011 - CAMRa2011)

  13. arXiv:1202.0835  [pdf, ps, other

    cs.IT

    Reducibility of joint relay positioning and flow optimization problem

    Authors: Mohit Thakur, Nadia Fawaz, Muriel Médard

    Abstract: This paper shows how to reduce the otherwise hard joint relay positioning and flow optimization problem into a sequence a two simpler decoupled problems. We consider a class of wireless multicast hypergraphs mainly characterized by their hyperarc rate functions, that are increasing and convex in power, and decreasing in distance between the transmit node and the farthest end node of the hyperarc.… ▽ More

    Submitted 3 February, 2012; originally announced February 2012.

  14. arXiv:1111.2885  [pdf, ps, other

    cs.GT cs.DS

    Privacy Auctions for Recommender Systems

    Authors: Pranav Dandekar, Nadia Fawaz, Stratis Ioannidis

    Abstract: We study a market for private data in which a data analyst publicly releases a statistic over a database of private information. Individuals that own the data incur a cost for their loss of privacy proportional to the differential privacy guarantee given by the analyst at the time of the release. The analyst incentivizes individuals by compensating them, giving rise to a \emph{privacy auction}. Mo… ▽ More

    Submitted 27 September, 2012; v1 submitted 11 November, 2011; originally announced November 2011.

  15. Private Decayed Sum Estimation under Continual Observation

    Authors: Jean Bolot, Nadia Fawaz, S. Muthukrishnan, Aleksandar Nikolov, Nina Taft

    Abstract: In monitoring applications, recent data is more important than distant data. How does this affect privacy of data analysis? We study a general class of data analyses - computing predicate sums - with privacy. Formally, we study the problem of estimating predicate sums {\em privately}, for sliding windows (and other well-known decay models of data, i.e. exponential and polynomial decay). We extend… ▽ More

    Submitted 2 March, 2012; v1 submitted 30 August, 2011; originally announced August 2011.

  16. arXiv:1106.0027  [pdf, ps, other

    cs.IT cs.NI

    On the geometry of wireless network multicast in 2-D

    Authors: Mohit Thakur, Nadia Fawaz, Muriel Médard

    Abstract: We provide a geometric solution to the problem of optimal relay positioning to maximize the multicast rate for low-SNR networks. The networks we consider, consist of a single source, multiple receivers and the only intermediate and locatable node as the relay. We construct network the hypergraph of the system nodes from the underlying information theoretic model of low-SNR regime that operates usi… ▽ More

    Submitted 31 May, 2011; originally announced June 2011.

  17. arXiv:1008.3295  [pdf, ps, other

    cs.IT cs.NI

    Optimal relay location and power allocation for low SNR broadcast relay channels

    Authors: Mohit Thakur, Nadia Fawaz, Muriel Médard

    Abstract: We consider the broadcast relay channel (BRC), where a single source transmits to multiple destinations with the help of a relay, in the limit of a large bandwidth. We address the problem of optimal relay positioning and power allocations at source and relay, to maximize the multicast rate from source to all destinations. To solve such a network planning problem, we develop a three-faceted approac… ▽ More

    Submitted 14 January, 2011; v1 submitted 19 August, 2010; originally announced August 2010.

    Comments: In Proceedings of INFOCOM 2011

  18. On the Non-Coherent Wideband Multipath Fading Relay Channel

    Authors: Nadia Fawaz, Muriel Medard

    Abstract: We investigate the multipath fading relay channel in the limit of a large bandwidth, and in the non-coherent setting, where the channel state is unknown to all terminals, including the relay and the destination. We propose a hypergraph model of the wideband multipath fading relay channel, and show that its min-cut is achieved by a non-coherent peaky frequency binning scheme. The so-obtained lowe… ▽ More

    Submitted 28 April, 2010; v1 submitted 16 February, 2010; originally announced February 2010.

    Comments: 8 pages, 4 figures, longer version (including proof) of the paper in Proc. of IEEE ISIT 2010

  19. From Spectrum Pooling to Space Pooling: Opportunistic Interference Alignment in MIMO Cognitive Networks

    Authors: S. M. Perlaza, N. Fawaz, S. Lasaulce, M. Debbah

    Abstract: We describe a non-cooperative interference alignment (IA) technique which allows an opportunistic multiple input multiple output (MIMO) link (secondary) to harmlessly coexist with another MIMO link (primary) in the same frequency band. Assuming perfect channel knowledge at the primary receiver and transmitter, capacity is achieved by transmiting along the spatial directions (SD) associated with… ▽ More

    Submitted 24 December, 2009; v1 submitted 7 July, 2009; originally announced July 2009.

    Comments: Submitted to IEEE Trans. in Signal Processing. Revised on 23-11-09

  20. Asymptotic Capacity and Optimal Precoding in MIMO Multi-Hop Relay Networks

    Authors: Nadia Fawaz, Keyvan Zarifi, Merouane Debbah, David Gesbert

    Abstract: A multi-hop relaying system is analyzed where data sent by a multi-antenna source is relayed by successive multi-antenna relays until it reaches a multi-antenna destination. Assuming correlated fading at each hop, each relay receives a faded version of the signal from the previous level, performs linear precoding and retransmits it to the next level. Using free probability theory and assuming th… ▽ More

    Submitted 29 May, 2009; originally announced June 2009.

    Comments: 45 pages, 7 figures, submitted to IEEE Transactions on Information Theory, December 2008

  21. Asymptotic Capacity and Optimal Precoding Strategy of Multi-Level Precode & Forward in Correlated Channels

    Authors: Nadia Fawaz, Keyvan Zarifi, Merouane Debbah, David Gesbert

    Abstract: We analyze a multi-level MIMO relaying system where a multiple-antenna transmitter sends data to a multipleantenna receiver through several relay levels, also equipped with multiple antennas. Assuming correlated fading in each hop, each relay receives a faded version of the signal transmitted by the previous level, performs precoding on the received signal and retransmits it to the next level. U… ▽ More

    Submitted 7 March, 2008; originally announced March 2008.

    Comments: 5 pages, 3 figures, to be published in proceedings of IEEE Information Theory Workshop 2008

  22. arXiv:0707.0978  [pdf, ps, other

    cs.IT

    When Network Coding and Dirty Paper Coding meet in a Cooperative Ad Hoc Network

    Authors: Nadia Fawaz, David Gesbert, Merouane Debbah

    Abstract: We develop and analyze new cooperative strategies for ad hoc networks that are more spectrally efficient than classical DF cooperative protocols. Using analog network coding, our strategies preserve the practical half-duplex assumption but relax the orthogonality constraint. The introduction of interference due to non-orthogonality is mitigated thanks to precoding, in particular Dirty Paper codi… ▽ More

    Submitted 6 July, 2007; originally announced July 2007.

    Comments: 7 pages, 7 figures