Skip to main content

Showing 1–19 of 19 results for author: Goldwasser, S

.
  1. arXiv:2405.15722  [pdf, other

    cs.LG cs.CC cs.SE

    Models That Prove Their Own Correctness

    Authors: Noga Amit, Shafi Goldwasser, Orr Paradise, Guy Rothblum

    Abstract: How can we trust the correctness of a learned model on a particular input of interest? Model accuracy is typically measured *on average* over a distribution of inputs, giving no guarantee for any fixed input. This paper proposes a theoretically-founded solution to this problem: to train *Self-Proving models* that prove the correctness of their output to a verification algorithm $V$ via an Interact… ▽ More

    Submitted 7 June, 2024; v1 submitted 24 May, 2024; originally announced May 2024.

  2. A Systematic Study of Ia-CSM Supernovae from the ZTF Bright Transient Survey

    Authors: Yashvi Sharma, Jesper Sollerman, Christoffer Fremling, Shrinivas R. Kulkarni, Kishalay De, Ido Irani, Steve Schulze, Nora Linn Strotjohann, Avishay Gal-Yam, Kate Maguire, Daniel A. Perley, Eric C. Bellm, Erik C. Kool, Thomas Brink, Rachel Bruch, Maxime Deckers, Richard Dekany, Alison Dugas, Samantha Goldwasser, Matthew J. Graham, Melissa L. Graham, Steven L. Groom, Matt Hankins, Jacob Jencson, Joel P. Johansson , et al. (13 additional authors not shown)

    Abstract: Among the supernovae (SNe) that show strong interaction with the circumstellar medium, there is a rare subclass of Type Ia supernovae, SNe Ia-CSM, that show strong narrow hydrogen emission lines much like SNe IIn but on top of a diluted over-luminous Type Ia spectrum. In the only previous systematic study of this class (Silverman et al. 2013), 16 objects were identified, 8 historic and 8 from the… ▽ More

    Submitted 11 January, 2023; originally announced January 2023.

    Comments: 26 pages, 14 figures, 5 tables. Submitted to ApJ

  3. arXiv:2211.11081  [pdf, other

    cs.CL cs.LG

    A Theory of Unsupervised Translation Motivated by Understanding Animal Communication

    Authors: Shafi Goldwasser, David F. Gruber, Adam Tauman Kalai, Orr Paradise

    Abstract: Neural networks are capable of translating between languages -- in some cases even between two languages where there is little or no access to parallel translations, in what is known as Unsupervised Machine Translation (UMT). Given this progress, it is intriguing to ask whether machine learning tools can ultimately enable understanding animal communication, particularly that of highly intelligent… ▽ More

    Submitted 3 November, 2023; v1 submitted 20 November, 2022; originally announced November 2022.

    ACM Class: I.2.7; I.2.6

  4. arXiv:2204.06974  [pdf, other

    cs.LG cs.CR

    Planting Undetectable Backdoors in Machine Learning Models

    Authors: Shafi Goldwasser, Michael P. Kim, Vinod Vaikuntanathan, Or Zamir

    Abstract: Given the computational cost and technical expertise required to train machine learning models, users may delegate the task of learning to a service provider. We show how a malicious learner can plant an undetectable backdoor into a classifier. On the surface, such a backdoored classifier behaves normally, but in reality, the learner maintains a mechanism for changing the classification of any inp… ▽ More

    Submitted 14 April, 2022; originally announced April 2022.

  5. arXiv:2112.14988  [pdf, other

    quant-ph cs.CR

    Deniable Encryption in a Quantum World

    Authors: Andrea Coladangelo, Shafi Goldwasser, Umesh Vazirani

    Abstract: (Sender-)Deniable encryption provides a very strong privacy guarantee: a sender who is coerced by an attacker into "opening" their ciphertext after-the-fact is able to generate "fake" local random choices that are consistent with any plaintext of their choice. The only known fully-efficient constructions of public-key deniable encryption rely on indistinguishability obfuscation (iO) (which current… ▽ More

    Submitted 3 June, 2022; v1 submitted 30 December, 2021; originally announced December 2021.

  6. arXiv:2104.08614  [pdf

    cs.SD cs.AI cs.CL cs.LG cs.RO eess.AS

    Cetacean Translation Initiative: a roadmap to deciphering the communication of sperm whales

    Authors: Jacob Andreas, Gašper Beguš, Michael M. Bronstein, Roee Diamant, Denley Delaney, Shane Gero, Shafi Goldwasser, David F. Gruber, Sarah de Haas, Peter Malkin, Roger Payne, Giovanni Petri, Daniela Rus, Pratyusha Sharma, Dan Tchernov, Pernille Tønnesen, Antonio Torralba, Daniel Vogt, Robert J. Wood

    Abstract: The past decade has witnessed a groundbreaking rise of machine learning for human language analysis, with current methods capable of automatically accurately recovering various aspects of syntax and semantics - including sentence structure and grounded word meaning - from large data collections. Recent research showed the promise of such tools for analyzing acoustic communication in nonhuman speci… ▽ More

    Submitted 17 April, 2021; originally announced April 2021.

  7. Bright, months-long stellar outbursts announce the explosion of interaction-powered supernovae

    Authors: Nora L. Strotjohann, Eran O. Ofek, Avishay Gal-Yam, Rachel Bruch, Steve Schulze, Nir Shaviv, Jesper Sollerman, Alexei V. Filippenko, Ofer Yaron, Christoffer Fremling, Jakob Nordin, Erik C. Kool, Dan A. Perley, Anna Y. Q. Ho, Yi Yang, Yuhan Yao, Maayane T. Soumagnac, Melissa L. Graham, Cristina Barbarino, Leonardo Tartaglia, Kishalay De, Daniel A. Goldstein, David O. Cook, Thomas G. Brink, Kirsty Taggart , et al. (31 additional authors not shown)

    Abstract: Interaction-powered supernovae (SNe) explode within an optically-thick circumstellar medium (CSM) that could be ejected during eruptive events. To identify and characterize such pre-explosion outbursts we produce forced-photometry light curves for 196 interacting SNe, mostly of Type IIn, detected by the Zwicky Transient Facility between early 2018 and June 2020. Extensive tests demonstrate that we… ▽ More

    Submitted 12 March, 2021; v1 submitted 21 October, 2020; originally announced October 2020.

    Journal ref: ApJ 907 99 (2021)

  8. arXiv:2007.05145  [pdf, other

    cs.LG stat.ML

    Beyond Perturbations: Learning Guarantees with Arbitrary Adversarial Test Examples

    Authors: Shafi Goldwasser, Adam Tauman Kalai, Yael Tauman Kalai, Omar Montasser

    Abstract: We present a transductive learning algorithm that takes as input training examples from a distribution $P$ and arbitrary (unlabeled) test examples, possibly chosen by an adversary. This is unlike prior work that assumes that test examples are small perturbations of $P$. Our algorithm outputs a selective classifier, which abstains from predicting on some examples. By considering selective transduct… ▽ More

    Submitted 30 September, 2020; v1 submitted 9 July, 2020; originally announced July 2020.

    Comments: To appear in NeurIPS 2020

  9. arXiv:2002.10635  [pdf, other

    cs.CR

    Formalizing Data Deletion in the Context of the Right to be Forgotten

    Authors: Sanjam Garg, Shafi Goldwasser, Prashant Nalini Vasudevan

    Abstract: The right of an individual to request the deletion of their personal data by an entity that might be storing it -- referred to as the right to be forgotten -- has been explicitly recognized, legislated, and exercised in several jurisdictions across the world, including the European Union, Argentina, and California. However, much of the discussion surrounding this right offers only an intuitive not… ▽ More

    Submitted 24 February, 2020; originally announced February 2020.

  10. arXiv:1911.11368  [pdf, ps, other

    cs.CC cs.DS

    Pseudo-deterministic Streaming

    Authors: Shafi Goldwasser, Ofer Grossman, Sidhanth Mohanty, David P. Woodruff

    Abstract: A pseudo-deterministic algorithm is a (randomized) algorithm which, when run multiple times on the same input, with high probability outputs the same result on all executions. Classic streaming algorithms, such as those for finding heavy hitters, approximate counting, $\ell_2$ approximation, finding a nonzero entry in a vector (for turnstile algorithms) are not pseudo-deterministic. For example, i… ▽ More

    Submitted 26 November, 2019; originally announced November 2019.

    Comments: 26 pages

  11. arXiv:1910.00994  [pdf, ps, other

    cs.CC

    Doubly-Efficient Pseudo-Deterministic Proofs

    Authors: Michel Goemans, Shafi Goldwasser, Dhiraj Holden

    Abstract: In [20] Goldwasser, Grossman and Holden introduced pseudo-deterministic interactive proofs for search problems where a powerful prover can convince a probabilistic polynomial time verifier that a solution to a search problem is canonical. They studied search problems for which polynomial time algorithms are not known and for which many solutions are possible. They showed that whereas there exists… ▽ More

    Submitted 26 April, 2020; v1 submitted 2 October, 2019; originally announced October 2019.

  12. arXiv:1805.02351  [pdf, ps, other

    cs.CC cs.DS

    Fine-grained Complexity Meets IP = PSPACE

    Authors: Lijie Chen, Shafi Goldwasser, Kaifeng Lyu, Guy N. Rothblum, Aviad Rubinstein

    Abstract: In this paper we study the fine-grained complexity of finding exact and approximate solutions to problems in P. Our main contribution is showing reductions from exact to approximate solution for a host of such problems. As one (notable) example, we show that the Closest-LCS-Pair problem (Given two sets of strings $A$ and $B$, compute exactly the maximum $\textsf{LCS}(a, b)$ with… ▽ More

    Submitted 9 December, 2022; v1 submitted 7 May, 2018; originally announced May 2018.

    Comments: Fixed a mistake in Theorem 11.2 (we thank Ray Li for pointing it out to us); all main results are unaffected

  13. arXiv:1803.02540  [pdf, ps, other

    cs.DC cs.DS

    Population stability: regulating size in the presence of an adversary

    Authors: Shafi Goldwasser, Rafail Ostrovsky, Alessandra Scafuro, Adam Sealfon

    Abstract: We introduce a new coordination problem in distributed computing that we call the population stability problem. A system of agents each with limited memory and communication, as well as the ability to replicate and self-destruct, is subjected to attacks by a worst-case adversary that can at a bounded rate (1) delete agents chosen arbitrarily and (2) insert additional agents with arbitrary initial… ▽ More

    Submitted 7 March, 2018; originally announced March 2018.

  14. arXiv:1706.04641  [pdf, ps, other

    cs.CC

    Pseudo-deterministic Proofs

    Authors: Shafi Goldwasser, Ofer Grossman, Dhiraj Holden

    Abstract: We introduce pseudo-deterministic interactive proofs (psdAM): interactive proof systems for search problems where the verifier is guaranteed with high probability to output the same output on different executions. As in the case with classical interactive proofs, the verifier is a probabilistic polynomial time algorithm interacting with an untrusted powerful prover. We view pseudo-deterministic… ▽ More

    Submitted 14 June, 2017; originally announced June 2017.

    MSC Class: 68Q15 ACM Class: F.1.3

  15. arXiv:1601.02298  [pdf, other

    cs.GT cs.CR

    How to Incentivize Data-Driven Collaboration Among Competing Parties

    Authors: Pablo Azar, Shafi Goldwasser, Sunoo Park

    Abstract: The availability of vast amounts of data is changing how we can make medical discoveries, predict global market trends, save energy, and develop educational strategies. In some settings such as Genome Wide Association Studies or deep learning, sheer size of data seems critical. When data is held distributedly by many parties, they must share it to reap its full benefits. One obstacle to this rev… ▽ More

    Submitted 10 January, 2016; originally announced January 2016.

  16. arXiv:1503.01588  [pdf, ps, other

    cs.CR cs.DC

    Adaptively Secure Coin-Flip**, Revisited

    Authors: Shafi Goldwasser, Yael Tauman Kalai, Sunoo Park

    Abstract: The full-information model was introduced by Ben-Or and Linial in 1985 to study collective coin-flip**: the problem of generating a common bounded-bias bit in a network of $n$ players with $t=t(n)$ faults. They showed that the majority protocol can tolerate $t=O(\sqrt n)$ adaptive corruptions, and conjectured that this is optimal in the adaptive setting. Lichtenstein, Linial, and Saks proved tha… ▽ More

    Submitted 4 May, 2015; v1 submitted 5 March, 2015; originally announced March 2015.

  17. arXiv:1401.0348  [pdf, other

    cs.CR

    The impossibility of obfuscation with auxiliary input or a universal simulator

    Authors: Nir Bitansky, Ran Canetti, Henry Cohn, Shafi Goldwasser, Yael Tauman Kalai, Omer Paneth, Alon Rosen

    Abstract: In this paper we show that the existence of general indistinguishability obfuscators conjectured in a few recent works implies, somewhat counterintuitively, strong impossibility results for virtual black box obfuscation. In particular, we show that indistinguishability obfuscation for all circuits implies: * The impossibility of average-case virtual black box obfuscation with auxiliary input for… ▽ More

    Submitted 12 February, 2014; v1 submitted 1 January, 2014; originally announced January 2014.

    Comments: 19 pages

  18. arXiv:cs/0212056  [pdf, ps, other

    cs.CC

    On the Work of Madhu Sudan: the 2002 Nevalinna Prize Winner

    Authors: Shafi Goldwasser

    Abstract: Madhu Sudan's work spans many areas of computer science theory including computational complexity theory, the design of efficient algorithms, algorithmic coding theory, and the theory of program checking and correcting. Two results of Sudan stand out in the impact they have had on the mathematics of computation. The first work shows a probabilistic characterization of the class NP -- those set… ▽ More

    Submitted 30 November, 2002; originally announced December 2002.

    Report number: ICM-2002

    Journal ref: Proceedings of the ICM, Bei**g 2002, vol. 1, 105--115

  19. arXiv:cs/0212055  [pdf, ps, other

    cs.CR cs.CC

    Mathematical foundations of modern cryptography: computational complexity perspective

    Authors: Shafi Goldwasser

    Abstract: Theoretical computer science has found fertile ground in many areas of mathematics. The approach has been to consider classical problems through the prism of computational complexity, where the number of basic computational steps taken to solve a problem is the crucial qualitative parameter. This new approach has led to a sequence of advances, in setting and solving new mathematical challenges a… ▽ More

    Submitted 30 November, 2002; originally announced December 2002.

    Report number: ICM-2002 MSC Class: 68Qxx; 11xx

    Journal ref: Proceedings of the ICM, Bei**g 2002, vol. 1, 245--272