Skip to main content

Showing 1–14 of 14 results for author: Horel, T

.
  1. arXiv:2406.12648  [pdf, ps, other

    cs.GT eess.SY math.OC

    Mitigating Information Asymmetry in Two-Stage Contracts with Non-Myopic Agents

    Authors: Munther A. Dahleh, Thibaut Horel, M. Umar B. Niazi

    Abstract: We consider a Stackelberg game in which a principal (she) establishes a two-stage contract with a non-myopic agent (he) whose type is unknown. The contract takes the form of an incentive function map** the agent's first-stage action to his second-stage incentive. While the first-stage action reveals the agent's type under truthful play, a non-myopic agent could benefit from portraying a false ty… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

  2. arXiv:2310.02864  [pdf, other

    cs.LG math.ST

    Estimation of Models with Limited Data by Leveraging Shared Structure

    Authors: Maryann Rui, Thibaut Horel, Munther Dahleh

    Abstract: Modern data sets, such as those in healthcare and e-commerce, are often derived from many individuals or systems but have insufficient data from each source alone to separately estimate individual, often high-dimensional, model parameters. If there is shared structure among systems however, it may be possible to leverage data from other systems to help estimate individual parameters, which could o… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

    Comments: Accepted to IEEE Conference on Decision and Control (CDC) 2023

  3. arXiv:2302.12223  [pdf, ps, other

    cs.GT econ.TH

    Coordination via Selling Information

    Authors: Alessandro Bonatti, Munther Dahleh, Thibaut Horel, Amir Nouripour

    Abstract: We consider games of incomplete information in which the players' payoffs depend both on a privately observed type and an unknown but common "state of nature". External to the game, a data provider knows the state of nature and sells information to the players, thus solving a joint information and mechanism design problem: deciding which information to sell while eliciting the player' types and co… ▽ More

    Submitted 23 February, 2023; originally announced February 2023.

  4. arXiv:2202.08780  [pdf, other

    cs.GT

    Selling Information in Competitive Environments

    Authors: Alessandro Bonatti, Munther Dahleh, Thibaut Horel, Amir Nouripour

    Abstract: Data buyers compete in a game of incomplete information about which a single data seller owns some payoff-relevant information. The seller faces a joint information- and mechanism-design problem: deciding which information to sell, while eliciting the buyers' types and imposing payments. We derive the welfare- and revenue-optimal mechanisms for a class of games with binary actions and states. Our… ▽ More

    Submitted 5 December, 2022; v1 submitted 17 February, 2022; originally announced February 2022.

  5. Entropic Compressibility of Lévy Processes

    Authors: Julien Fageot, Alireza Fallah, Thibaut Horel

    Abstract: In contrast to their seemingly simple and shared structure of independence and stationarity, Lévy processes exhibit a wide variety of behaviors, from the self-similar Wiener process to piecewise-constant compound Poisson processes. Inspired by the recent paper of Ghourchian, Amini, and Gohari (2018), we characterize their compressibility by studying the entropy of their double discretization (both… ▽ More

    Submitted 15 May, 2022; v1 submitted 22 September, 2020; originally announced September 2020.

    Comments: 34 pages, 1 figure

    MSC Class: 60E07; 94A17; 60G18

  6. arXiv:2006.05973  [pdf, other

    math.ST cs.IT cs.LG math.OC

    Optimal Bounds between $f$-Divergences and Integral Probability Metrics

    Authors: Rohit Agrawal, Thibaut Horel

    Abstract: The families of $f$-divergences (e.g. the Kullback-Leibler divergence) and Integral Probability Metrics (e.g. total variation distance or maximum mean discrepancies) are widely used to quantify the similarity between probability distributions. In this work, we systematically study the relationship between these two families from the perspective of convex duality. Starting from a tight variational… ▽ More

    Submitted 5 June, 2021; v1 submitted 10 June, 2020; originally announced June 2020.

    MSC Class: 62B10 (Primary) 94A17; 52A40; 46N10 (Secondary)

    Journal ref: J. Mach. Learn. Res. 22(128):1-59, 2021

  7. arXiv:2003.08345  [pdf, other

    cs.GT

    Towards Data Auctions with Externalities

    Authors: Anish Agarwal, Munther Dahleh, Thibaut Horel, Maryann Rui

    Abstract: The design of data markets has gained importance as firms increasingly use machine learning models fueled by externally acquired training data. A key consideration is the externalities firms face when data, though inherently freely replicable, is allocated to competing firms. In this setting, we demonstrate that a data seller's optimal revenue increases as firms can pay to prevent allocations to o… ▽ More

    Submitted 20 September, 2023; v1 submitted 18 March, 2020; originally announced March 2020.

    Comments: Corrected error in previously labeled Theorem 3

  8. arXiv:1907.08355  [pdf, ps, other

    cs.DS cs.CR

    Data Structures Meet Cryptography: 3SUM with Preprocessing

    Authors: Alexander Golovnev, Siyao Guo, Thibaut Horel, Sunoo Park, Vinod Vaikuntanathan

    Abstract: This paper shows several connections between data structure problems and cryptography against preprocessing attacks. Our results span data structure upper bounds, cryptographic applications, and data structure lower bounds, as summarized next. First, we apply Fiat--Naor inversion, a technique with cryptographic origins, to obtain a data structure upper bound. In particular, our technique yields… ▽ More

    Submitted 12 July, 2021; v1 submitted 18 July, 2019; originally announced July 2019.

  9. arXiv:1902.11202  [pdf, other

    cs.CR cs.CC

    Unifying computational entropies via Kullback-Leibler divergence

    Authors: Rohit Agrawal, Yi-Hsiu Chen, Thibaut Horel, Salil Vadhan

    Abstract: We introduce hardness in relative entropy, a new notion of hardness for search problems which on the one hand is satisfied by all one-way functions and on the other hand implies both next-block pseudoentropy and inaccessible entropy, two forms of computational entropy used in recent constructions of pseudorandom generators and statistically hiding commitment schemes, respectively. Thus, hardness i… ▽ More

    Submitted 20 August, 2019; v1 submitted 28 February, 2019; originally announced February 2019.

  10. How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts

    Authors: Thibaut Horel, Sunoo Park, Silas Richelson, Vinod Vaikuntanathan

    Abstract: We study secure and undetectable communication in a world where governments can read all encrypted communications of citizens. We consider a world where the only permitted communication method is via a government-mandated encryption scheme, using government-mandated keys. Citizens caught trying to communicate otherwise (e.g., by encrypting strings which do not appear to be natural language plainte… ▽ More

    Submitted 20 February, 2018; originally announced February 2018.

    Journal ref: 10th Innovations in Theoretical Computer Science Conference (ITCS 2019)

  11. arXiv:1510.00967  [pdf, other

    math.ST stat.CO stat.ME stat.ML

    The Proximal Robbins-Monro Method

    Authors: Panos Toulis, Thibaut Horel, Edoardo M. Airoldi

    Abstract: The need for parameter estimation with massive datasets has reinvigorated interest in stochastic optimization and iterative estimation procedures. Stochastic approximations are at the forefront of this recent development as they yield procedures that are simple, general, and fast. However, standard stochastic approximations are often numerically unstable. Deterministic optimization, on the other h… ▽ More

    Submitted 1 February, 2020; v1 submitted 4 October, 2015; originally announced October 2015.

    Comments: 35 pages, 2 figures

  12. arXiv:1505.05663  [pdf, other

    cs.SI cs.LG stat.ML

    Inferring Graphs from Cascades: A Sparse Recovery Framework

    Authors: Jean Pouget-Abadie, Thibaut Horel

    Abstract: In the Network Inference problem, one seeks to recover the edges of an unknown graph from the observations of cascades propagating over this graph. In this paper, we approach this problem from the sparse recovery perspective. We introduce a general model of cascades, including the voter model and the independent cascade model, for which we provide the first algorithm which recovers the graph's edg… ▽ More

    Submitted 21 May, 2015; originally announced May 2015.

    Comments: Full version of the ICML paper with the same title

  13. arXiv:1503.01438  [pdf, other

    cs.SI physics.soc-ph

    Scalable Methods for Adaptively Seeding a Social Network

    Authors: Thibaut Horel, Yaron Singer

    Abstract: In recent years, social networking platforms have developed into extraordinary channels for spreading and consuming information. Along with the rise of such infrastructure, there is continuous progress on techniques for spreading information effectively through influential users. In many applications, one is restricted to select influencers from a set of users who engaged with the topic being prom… ▽ More

    Submitted 5 March, 2015; v1 submitted 4 March, 2015; originally announced March 2015.

    Comments: Full version of the paper appearing in WWW 2015

  14. Budget Feasible Mechanisms for Experimental Design

    Authors: Thibaut Horel, Stratis Ioannidis, S. Muthukrishnan

    Abstract: In the classical experimental design setting, an experimenter E has access to a population of $n$ potential experiment subjects $i\in \{1,...,n\}$, each associated with a vector of features $x_i\in R^d$. Conducting an experiment with subject $i$ reveals an unknown value $y_i\in R$ to E. E typically assumes some hypothetical relationship between $x_i$'s and $y_i$'s, e.g., $y_i \approx βx_i$, and es… ▽ More

    Submitted 11 July, 2013; v1 submitted 22 February, 2013; originally announced February 2013.

    Journal ref: LATIN 2014: Theoretical Informatics. Lecture Notes in Computer Science Volume 8392, 2014, pp 719-730