Skip to main content

Showing 51–65 of 65 results for author: Ghazi, B

.
  1. arXiv:1906.08320  [pdf, other

    cs.LG cs.CR cs.DC cs.DS stat.ML

    Scalable and Differentially Private Distributed Aggregation in the Shuffled Model

    Authors: Badih Ghazi, Rasmus Pagh, Ameya Velingker

    Abstract: Federated learning promises to make machine learning feasible on distributed, private datasets by implementing gradient descent using secure aggregation methods. The idea is to compute a global weight update without revealing the contributions of individual users. Current practical protocols for secure aggregation work in an "honest but curious" setting where a curious adversary observing all comm… ▽ More

    Submitted 2 December, 2019; v1 submitted 19 June, 2019; originally announced June 2019.

    Comments: 17 pages, 1 figure, 1 table, 2 algorithms

  2. arXiv:1905.12730  [pdf, other

    cs.LG cs.CL cs.DS stat.ML

    Recursive Sketches for Modular Deep Learning

    Authors: Badih Ghazi, Rina Panigrahy, Joshua R. Wang

    Abstract: We present a mechanism to compute a sketch (succinct summary) of how a complex modular deep network processes its inputs. The sketch summarizes essential information about the inputs and outputs of the network and can be used to quickly identify key components and summary statistics of the inputs. Furthermore, the sketch is recursive and can be unrolled to identify sub-components of these componen… ▽ More

    Submitted 6 August, 2019; v1 submitted 29 May, 2019; originally announced May 2019.

    Comments: Published in ICML 2019

  3. arXiv:1808.08907  [pdf, other

    cs.IT

    Communication-Rounds Tradeoffs for Common Randomness and Secret Key Generation

    Authors: Mitali Bafna, Badih Ghazi, Noah Golowich, Madhu Sudan

    Abstract: We study the role of interaction in the Common Randomness Generation (CRG) and Secret Key Generation (SKG) problems. In the CRG problem, two players, Alice and Bob, respectively get samples $X_1,X_2,\dots$ and $Y_1,Y_2,\dots$ with the pairs $(X_1,Y_1)$, $(X_2, Y_2)$, $\dots$ being drawn independently from some known probability distribution $μ$. They wish to communicate so as to agree on $L$ bits… ▽ More

    Submitted 27 August, 2018; originally announced August 2018.

    Comments: 41 pages, 3 figures

  4. arXiv:1708.03808  [pdf, ps, other

    cs.CC cs.IT

    Dimension Reduction for Polynomials over Gaussian Space and Applications

    Authors: Badih Ghazi, Pritish Kamath, Prasad Raghavendra

    Abstract: We introduce a new technique for reducing the dimension of the ambient space of low-degree polynomials in the Gaussian space while preserving their relative correlation structure, analogous to the Johnson-Lindenstrauss lemma. As applications, we address the following problems: 1. Computability of Approximately Optimal Noise Stable function over Gaussian space: The goal is to find a partition of… ▽ More

    Submitted 12 August, 2017; originally announced August 2017.

  5. arXiv:1707.08086  [pdf, ps, other

    cs.CC cs.IT

    Resource-Efficient Common Randomness and Secret-Key Schemes

    Authors: Badih Ghazi, T. S. Jayram

    Abstract: We study common randomness where two parties have access to i.i.d. samples from a known random source, and wish to generate a shared random key using limited (or no) communication with the largest possible probability of agreement. This problem is at the core of secret key generation in cryptography, with connections to communication under uncertainty and locality sensitive hashing. We take the ap… ▽ More

    Submitted 25 July, 2017; originally announced July 2017.

    Comments: 37 pages

  6. arXiv:1705.01082  [pdf, ps, other

    cs.IT

    The Power of Shared Randomness in Uncertain Communication

    Authors: Badih Ghazi, Madhu Sudan

    Abstract: In a recent work (Ghazi et al., SODA 2016), the authors with Komargodski and Kothari initiated the study of communication with contextual uncertainty, a setup aiming to understand how efficient communication is possible when the communicating parties imperfectly share a huge context. In this setting, Alice is given a function $f$ and an input string $x$, and Bob is given a function $g$ and an inpu… ▽ More

    Submitted 2 May, 2017; originally announced May 2017.

    Comments: 32 pages, 1 figure

  7. arXiv:1703.00066  [pdf, ps, other

    cs.LG cs.DS

    On the Power of Learning from $k$-Wise Queries

    Authors: Vitaly Feldman, Badih Ghazi

    Abstract: Several well-studied models of access to data samples, including statistical queries, local differential privacy and low-communication algorithms rely on queries that provide information about a function of a single sample. (For example, a statistical query (SQ) gives an estimate of $Ex_{x \sim D}[q(x)]$ for any choice of the query function $q$ map** $X$ to the reals, where $D$ is an unknown dat… ▽ More

    Submitted 28 February, 2017; originally announced March 2017.

    Comments: 32 pages, Appeared in Innovations in Theoretical Computer Science (ITCS) 2017

  8. arXiv:1612.01041  [pdf, ps, other

    cs.CC cs.IT

    Optimality of Correlated Sampling Strategies

    Authors: Mohammad Bavarian, Badih Ghazi, Elad Haramaty, Pritish Kamath, Ronald L. Rivest, Madhu Sudan

    Abstract: In the "correlated sampling" problem, two players are given probability distributions $P$ and $Q$, respectively, over the same finite set, with access to shared randomness. Without any communication, the two players are each required to output an element sampled according to their respective distributions, while trying to minimize the probability that their outputs disagree. A well known strategy… ▽ More

    Submitted 21 November, 2020; v1 submitted 3 December, 2016; originally announced December 2016.

    Comments: 12 pages; Improved presentation (again) based on feedback from anonymous ToC reviewers

  9. arXiv:1611.03069  [pdf, ps, other

    cs.IT cs.CC

    NP-Hardness of Reed-Solomon Decoding, and the Prouhet-Tarry-Escott Problem

    Authors: Venkata Gandikota, Badih Ghazi, Elena Grigorescu

    Abstract: Establishing the complexity of {\em Bounded Distance Decoding} for Reed-Solomon codes is a fundamental open problem in coding theory, explicitly asked by Guruswami and Vardy (IEEE Trans. Inf. Theory, 2005). The problem is motivated by the large current gap between the regime when it is NP-hard, and the regime when it is efficiently solvable (i.e., the Johnson radius). We show the first NP-hardne… ▽ More

    Submitted 9 November, 2016; originally announced November 2016.

  10. arXiv:1607.04322  [pdf, ps, other

    cs.IT cs.CC

    Decidability of Non-Interactive Simulation of Joint Distributions

    Authors: Badih Ghazi, Pritish Kamath, Madhu Sudan

    Abstract: We present decidability results for a sub-class of "non-interactive" simulation problems, a well-studied class of problems in information theory. A non-interactive simulation problem is specified by two distributions $P(x,y)$ and $Q(u,v)$: The goal is to determine if two players, Alice and Bob, that observe sequences $X^n$ and $Y^n$ respectively where $\{(X_i, Y_i)\}_{i=1}^n$ are drawn i.i.d. from… ▽ More

    Submitted 14 July, 2016; originally announced July 2016.

  11. arXiv:1506.00273  [pdf, ps, other

    cs.CC cs.IT

    Communication Complexity of Permutation-Invariant Functions

    Authors: Badih Ghazi, Pritish Kamath, Madhu Sudan

    Abstract: Motivated by the quest for a broader understanding of communication complexity of simple functions, we introduce the class of "permutation-invariant" functions. A partial function $f:\{0,1\}^n \times \{0,1\}^n\to \{0,1,?\}$ is permutation-invariant if for every bijection $π:\{1,\ldots,n\} \to \{1,\ldots,n\}$ and every $\mathbf{x}, \mathbf{y} \in \{0,1\}^n$, it is the case that… ▽ More

    Submitted 31 May, 2015; originally announced June 2015.

  12. arXiv:1504.04813  [pdf, ps, other

    cs.CC cs.IT

    Communication with Contextual Uncertainty

    Authors: Badih Ghazi, Ilan Komargodski, Pravesh Kothari, Madhu Sudan

    Abstract: We introduce a simple model illustrating the role of context in communication and the challenge posed by uncertainty of knowledge of context. We consider a variant of distributional communication complexity where Alice gets some information $x$ and Bob gets $y$, where $(x,y)$ is drawn from a known distribution, and Bob wishes to compute some function $g(x,y)$ (with high probability over $(x,y)$).… ▽ More

    Submitted 19 July, 2015; v1 submitted 19 April, 2015; originally announced April 2015.

    Comments: 20 pages + 1 title page

    ACM Class: F.1.0

  13. arXiv:1410.4241  [pdf, ps, other

    cs.CC cs.IT

    LP/SDP Hierarchy Lower Bounds for Decoding Random LDPC Codes

    Authors: Badih Ghazi, Euiwoong Lee

    Abstract: Random (dv,dc)-regular LDPC codes are well-known to achieve the Shannon capacity of the binary symmetric channel (for sufficiently large dv and dc) under exponential time decoding. However, polynomial time algorithms are only known to correct a much smaller fraction of errors. One of the most powerful polynomial-time algorithms with a formal analysis is the LP decoding algorithm of Feldman et al.… ▽ More

    Submitted 15 October, 2014; originally announced October 2014.

    Comments: 23 pages

  14. arXiv:1303.1209  [pdf, ps, other

    cs.DS cs.IT

    Sample-Optimal Average-Case Sparse Fourier Transform in Two Dimensions

    Authors: Badih Ghazi, Haitham Hassanieh, Piotr Indyk, Dina Katabi, Eric Price, Lixin Shi

    Abstract: We present the first sample-optimal sublinear time algorithms for the sparse Discrete Fourier Transform over a two-dimensional sqrt{n} x sqrt{n} grid. Our algorithms are analyzed for /average case/ signals. For signals whose spectrum is exactly sparse, our algorithms use O(k) samples and run in O(k log k) time, where k is the expected sparsity of the signal. For signals whose spectrum is approxima… ▽ More

    Submitted 5 March, 2013; originally announced March 2013.

    Comments: 30 pages, 2 figures

  15. arXiv:1301.6410  [pdf, ps, other

    cs.IT

    Linear Programming Decoding of Spatially Coupled Codes

    Authors: Louay Bazzi, Badih Ghazi, Rudiger Urbanke

    Abstract: For a given family of spatially coupled codes, we prove that the LP threshold on the BSC of the graph cover ensemble is the same as the LP threshold on the BSC of the derived spatially coupled ensemble. This result is in contrast with the fact that the BP threshold of the derived spatially coupled ensemble is believed to be larger than the BP threshold of the graph cover ensemble as noted by the w… ▽ More

    Submitted 5 March, 2013; v1 submitted 27 January, 2013; originally announced January 2013.

    Comments: 37 pages; Added tightness construction, expanded abstract