Skip to main content

Showing 1–42 of 42 results for author: Laarhoven, T

.
  1. arXiv:2403.02443  [pdf, other

    astro-ph.IM

    Tuning neural posterior estimation for gravitational wave inference

    Authors: Alex Kolmus, Justin Janquart, Tomasz Baka, Twan van Laarhoven, Chris Van Den Broeck, Tom Heskes

    Abstract: Modern simulation-based inference techniques use neural networks to solve inverse problems efficiently. One notable strategy is neural posterior estimation (NPE), wherein a neural network parameterizes a distribution to approximate the posterior. This approach is particularly advantageous for tackling low-latency or high-volume inverse problems. However, the accuracy of NPE varies significantly wi… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

    Comments: 28 pages, 9 figures

  2. arXiv:2111.13244  [pdf, other

    cs.CV cs.CR

    Going Grayscale: The Road to Understanding and Improving Unlearnable Examples

    Authors: Zhuoran Liu, Zhengyu Zhao, Alex Kolmus, Tijn Berns, Twan van Laarhoven, Tom Heskes, Martha Larson

    Abstract: Recent work has shown that imperceptible perturbations can be applied to craft unlearnable examples (ULEs), i.e. images whose content cannot be used to improve a classifier during training. In this paper, we reveal the road that researchers should follow for understanding ULEs and improving ULEs as they were originally formulated (ULEOs). The paper makes four contributions. First, we show that ULE… ▽ More

    Submitted 25 November, 2021; originally announced November 2021.

  3. arXiv:2111.00833  [pdf, other

    gr-qc astro-ph.IM cs.LG

    Swift sky localization of gravitational waves using deep learning seeded importance sampling

    Authors: Alex Kolmus, Grégory Baltus, Justin Janquart, Twan van Laarhoven, Sarah Caudill, Tom Heskes

    Abstract: Fast, highly accurate, and reliable inference of the sky origin of gravitational waves would enable real-time multi-messenger astronomy. Current Bayesian inference methodologies, although highly accurate and reliable, are slow. Deep learning models have shown themselves to be accurate and extremely fast for inference tasks on gravitational waves, but their output is inherently questionable due to… ▽ More

    Submitted 1 November, 2021; originally announced November 2021.

    Comments: 12 pages, 9 figures, 1 table

  4. arXiv:2107.02550  [pdf, other

    cs.LG math.RT

    Universal approximation and model compression for radial neural networks

    Authors: Iordan Ganev, Twan van Laarhoven, Robin Walters

    Abstract: We introduce a class of fully-connected neural networks whose activation functions, rather than being pointwise, rescale feature vectors by a function depending only on their norm. We call such networks radial neural networks, extending previous work on rotation equivariant networks that considers rescaling activations in less generality. We prove universal approximation theorems for radial neural… ▽ More

    Submitted 16 February, 2023; v1 submitted 6 July, 2021; originally announced July 2021.

    Comments: 44 pages

  5. arXiv:2011.03974  [pdf, other

    cs.AI

    Gaussian Processes with Skewed Laplace Spectral Mixture Kernels for Long-term Forecasting

    Authors: Kai Chen, Twan van Laarhoven, Elena Marchiori

    Abstract: Long-term forecasting involves predicting a horizon that is far ahead of the last observation. It is a problem of high practical relevance, for instance for companies in order to decide upon expensive long-term investments. Despite the recent progress and success of Gaussian processes (GPs) based on spectral mixture kernels, long-term forecasting remains a challenging problem for these kernels bec… ▽ More

    Submitted 2 October, 2021; v1 submitted 8 November, 2020; originally announced November 2020.

    Comments: 19 pages, 34 figures

  6. arXiv:1907.04630  [pdf, ps, other

    cs.DS cs.CG cs.CR cs.DM

    Approximate Voronoi cells for lattices, revisited

    Authors: Thijs Laarhoven

    Abstract: We revisit the approximate Voronoi cells approach for solving the closest vector problem with preprocessing (CVPP) on high-dimensional lattices, and settle the open problem of Doulgerakis-Laarhoven-De Weger [PQCrypto, 2019] of determining exact asymptotics on the volume of these Voronoi cells under the Gaussian heuristic. As a result, we obtain improved upper bounds on the time complexity of the r… ▽ More

    Submitted 10 July, 2019; originally announced July 2019.

    Comments: 18 pages, 1 figure

  7. Evolutionary techniques in lattice sieving algorithms

    Authors: Thijs Laarhoven

    Abstract: Lattice-based cryptography has recently emerged as a prominent candidate for secure communication in the quantum age. Its security relies on the hardness of certain lattice problems, and the inability of known lattice algorithms, such as lattice sieving, to solve these problems efficiently. In this paper we investigate the similarities between lattice sieving and evolutionary algorithms, how vario… ▽ More

    Submitted 10 July, 2019; originally announced July 2019.

    Comments: 9 pages, 2 figures

    Journal ref: 11th International Conference on Evolutionary Computation Theory and Applications (ECTA), pp. 31-39, 2019

  8. arXiv:1907.04628  [pdf, other

    cs.DS cs.CC cs.CG cs.IR

    Polytopes, lattices, and spherical codes for the nearest neighbor problem

    Authors: Thijs Laarhoven

    Abstract: We study locality-sensitive hash methods for the nearest neighbor problem for the angular distance, focusing on the approach of first projecting down onto a low-dimensional subspace, and then partitioning the projected vectors according to Voronoi cells induced by a suitable spherical code. This approach generalizes and interpolates between the fast but suboptimal hyperplane hashing of Charikar [S… ▽ More

    Submitted 22 April, 2020; v1 submitted 10 July, 2019; originally announced July 2019.

    Comments: This is the full version of the paper published in the proceedings of ICALP 2020 under the same title, which only contains Section 1

    Journal ref: ICALP 2020

  9. arXiv:1905.02036  [pdf

    cs.LG cs.CV cs.GT stat.ML

    Unsupervised Domain Adaptation using Graph Transduction Games

    Authors: Sebastiano Vascon, Sinem Aslan, Alessandro Torcinovich, Twan van Laarhoven, Elena Marchiori, Marcello Pelillo

    Abstract: Unsupervised domain adaptation (UDA) amounts to assigning class labels to the unlabeled instances of a dataset from a target domain, using labeled instances of a dataset from a related source domain. In this paper, we propose to cast this problem in a game-theoretic setting as a non-cooperative game and introduce a fully automatized iterative algorithm for UDA based on graph transduction games (GT… ▽ More

    Submitted 6 May, 2019; originally announced May 2019.

    Comments: Oral IJCNN 2019

  10. arXiv:1902.06196  [pdf, other

    cs.CR cs.CC cs.CG cs.DS

    Nearest neighbor decoding for Tardos fingerprinting codes

    Authors: Thijs Laarhoven

    Abstract: Over the past decade, various improvements have been made to Tardos' collusion-resistant fingerprinting scheme [Tardos, STOC 2003], ultimately resulting in a good understanding of what is the minimum code length required to achieve collusion-resistance. In contrast, decreasing the cost of the actual decoding algorithm for identifying the potential colluders has received less attention, even though… ▽ More

    Submitted 16 February, 2019; originally announced February 2019.

    Comments: 6 pages, 1 figure, 2 tables

    Journal ref: ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec), pp. 182-187, 2019

  11. arXiv:1808.02266  [pdf, other

    cs.LG stat.ML

    Multi-Output Convolution Spectral Mixture for Gaussian Processes

    Authors: Kai Chen, Twan van Laarhoven, Perry Groot, **song Chen, Elena Marchiori

    Abstract: Multi-output Gaussian processes (MOGPs) are an extension of Gaussian Processes (GPs) for predicting multiple output variables (also called channels, tasks) simultaneously. In this paper we use the convolution theorem to design a new kernel for MOGPs, by modeling cross channel dependencies through cross convolution of time and phase delayed components in the spectral domain. The resulting kernel is… ▽ More

    Submitted 7 October, 2021; v1 submitted 7 August, 2018; originally announced August 2018.

    Comments: 12 pages, 48 figures. arXiv admin note: text overlap with arXiv:1808.01132

  12. arXiv:1808.01132  [pdf, other

    cs.LG cs.DS stat.ML

    Multitask Gaussian Process with Hierarchical Latent Interactions

    Authors: Kai Chen, Twan van Laarhoven, Elena Marchiori, Feng Yin, Shuguang Cui

    Abstract: Multitask Gaussian process (MTGP) is powerful for joint learning of multiple tasks with complicated correlation patterns. However, due to the assembling of additive independent latent functions, all current MTGPs including the salient linear model of coregionalization (LMC) and convolution frameworks cannot effectively represent and learn the hierarchical latent interactions between its latent fun… ▽ More

    Submitted 2 October, 2021; v1 submitted 3 August, 2018; originally announced August 2018.

    Comments: 7 pages, 17 figures. arXiv admin note: text overlap with arXiv:1808.02266

  13. Generative models for local network community detection

    Authors: Twan van Laarhoven

    Abstract: Local network community detection aims to find a single community in a large network, while inspecting only a small part of that network around a given seed node. This is much cheaper than finding all communities in a network. Most methods for local community detection are formulated as ad-hoc optimization problems. In this work, we instead start from a generative model for networks with community… ▽ More

    Submitted 12 April, 2018; originally announced April 2018.

    Journal ref: Phys. Rev. E 97, 042316 (2018)

  14. arXiv:1804.04448  [pdf, other

    stat.ML cs.LG

    Adversarial Alignment of Class Prediction Uncertainties for Domain Adaptation

    Authors: Jeroen Manders, Twan van Laarhoven, Elena Marchiori

    Abstract: We consider unsupervised domain adaptation: given labelled examples from a source domain and unlabelled examples from a related target domain, the goal is to infer the labels of target examples. Under the assumption that features from pre-trained deep neural networks are transferable across related domains, domain adaptation reduces to aligning source and target domain at class prediction uncertai… ▽ More

    Submitted 4 January, 2019; v1 submitted 12 April, 2018; originally announced April 2018.

    Comments: To appear in ICPRAM 2019

  15. arXiv:1803.07634  [pdf, ps, other

    stat.ML cs.LG

    Domain Adaptation with Randomized Expectation Maximization

    Authors: Twan van Laarhoven, Elena Marchiori

    Abstract: Domain adaptation (DA) is the task of classifying an unlabeled dataset (target) using a labeled dataset (source) from a related domain. The majority of successful DA methods try to directly match the distributions of the source and target data by transforming the feature space. Despite their success, state of the art methods based on this approach are either involved or unable to directly scale to… ▽ More

    Submitted 20 March, 2018; originally announced March 2018.

  16. arXiv:1712.03158  [pdf, other

    cs.DS cs.CC cs.CG cs.CR cs.IR

    Graph-based time-space trade-offs for approximate near neighbors

    Authors: Thijs Laarhoven

    Abstract: We take a first step towards a rigorous asymptotic analysis of graph-based approaches for finding (approximate) nearest neighbors in high-dimensional spaces, by analyzing the complexity of (randomized) greedy walks on the approximate near neighbor graph. For random data sets of size $n = 2^{o(d)}$ on the $d$-dimensional Euclidean unit sphere, using near neighbor graphs we can provably solve the ap… ▽ More

    Submitted 8 December, 2017; originally announced December 2017.

    Comments: 26 pages, 4 figures

    Journal ref: 34th International Symposium on Computational Geometry (SoCG), pp. 57:1-57:14, 2018

  17. Spectral-spatial classification of hyperspectral images: three tricks and a new supervised learning setting

    Authors: Jacopo Acquarelli, Elena Marchiori, Lutgarde M. C. Buydens, Thanh Tran, Twan van Laarhoven

    Abstract: Spectral-spatial classification of hyperspectral images has been the subject of many studies in recent years. In the presence of only very few labeled pixels, this task becomes challenging. In this paper we address the following two research questions: 1) Can a simple neural network with just a single hidden layer achieve state of the art performance in the presence of few labeled pixels? 2) How i… ▽ More

    Submitted 23 July, 2018; v1 submitted 15 November, 2017; originally announced November 2017.

    Comments: Remote Sensing 2018

  18. arXiv:1709.05956  [pdf, other

    cs.CV cs.NE

    Deep Learning for Automatic Stereotypical Motor Movement Detection using Wearable Sensors in Autism Spectrum Disorders

    Authors: Nastaran Mohammadian Rad, Seyed Mostafa Kia, Calogero Zarbo, Twan van Laarhoven, Giuseppe Jurman, Paola Venuti, Elena Marchiori, Cesare Furlanello

    Abstract: Autism Spectrum Disorders are associated with atypical movements, of which stereotypical motor movements (SMMs) interfere with learning and social interaction. The automatic SMM detection using inertial measurement units (IMU) remains complex due to the strong intra and inter-subject variability, especially when handcrafted features are extracted from the signal. We propose a new application of th… ▽ More

    Submitted 14 September, 2017; originally announced September 2017.

  19. arXiv:1706.05350  [pdf, ps, other

    cs.LG stat.ML

    L2 Regularization versus Batch and Weight Normalization

    Authors: Twan van Laarhoven

    Abstract: Batch Normalization is a commonly used trick to improve the training of deep neural networks. These neural networks use L2 regularization, also called weight decay, ostensibly to prevent overfitting. However, we show that L2 regularization has no regularizing effect when combined with normalization. Instead, regularization has an influence on the scale of weights, and thereby on the effective lear… ▽ More

    Submitted 16 June, 2017; originally announced June 2017.

  20. arXiv:1706.05335  [pdf, ps, other

    stat.ML cs.LG

    Unsupervised Domain Adaptation with Random Walks on Target Labelings

    Authors: Twan van Laarhoven, Elena Marchiori

    Abstract: Unsupervised Domain Adaptation (DA) is used to automatize the task of labeling data: an unlabeled dataset (target) is annotated using a labeled dataset (source) from a related domain. We cast domain adaptation as the problem of finding stable labels for target examples. A new definition of label stability is proposed, motivated by a generalization error bound for large margin linear classifiers: a… ▽ More

    Submitted 20 March, 2018; v1 submitted 16 June, 2017; originally announced June 2017.

    Comments: Source code to reproduce our experiments is available at https://github.com/twanvl/rwa-da

  21. arXiv:1705.02828  [pdf, other

    cs.DS cs.CR

    Faster tuple lattice sieving using spherical locality-sensitive filters

    Authors: Thijs Laarhoven

    Abstract: To overcome the large memory requirement of classical lattice sieving algorithms for solving hard lattice problems, Bai-Laarhoven-Stehlé [ANTS 2016] studied tuple lattice sieving, where tuples instead of pairs of lattice vectors are combined to form shorter vectors. Herold-Kirshanova [PKC 2017] recently improved upon their results for arbitrary tuple sizes, for example showing that a triple sieve… ▽ More

    Submitted 23 February, 2018; v1 submitted 8 May, 2017; originally announced May 2017.

    Comments: 12 pages + references, 2 figures. Subsumed/merged into Cryptology ePrint Archive 2017/228, available at https://ia.cr/2017/1228

  22. arXiv:1702.05760  [pdf, other

    cs.DS cs.CC cs.CG cs.CR

    Hypercube LSH for approximate near neighbors

    Authors: Thijs Laarhoven

    Abstract: A celebrated technique for finding near neighbors for the angular distance involves using a set of \textit{random} hyperplanes to partition the space into hash regions [Charikar, STOC 2002]. Experiments later showed that using a set of \textit{orthogonal} hyperplanes, thereby partitioning the space into the Voronoi regions induced by a hypercube, leads to even better results [Terasawa and Tanaka,… ▽ More

    Submitted 19 February, 2017; originally announced February 2017.

    Comments: 18 pages, 4 figures

    Journal ref: 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS 2017), pp. 7:1-7:20, 2017

  23. arXiv:1608.03580  [pdf, other

    cs.DS cs.CC cs.CG cs.IR

    Optimal Hashing-based Time-Space Trade-offs for Approximate Near Neighbors

    Authors: Alexandr Andoni, Thijs Laarhoven, Ilya Razenshteyn, Erik Waingarten

    Abstract: [See the paper for the full abstract.] We show tight upper and lower bounds for time-space trade-offs for the $c$-Approximate Near Neighbor Search problem. For the $d$-dimensional Euclidean space and $n$-point datasets, we develop a data structure with space $n^{1 + ρ_u + o(1)} + O(dn)$ and query time $n^{ρ_q + o(1)} + d n^{o(1)}$ for every $ρ_u, ρ_q \geq 0$ such that: \begin{equation} c^2 \sqrt… ▽ More

    Submitted 21 May, 2017; v1 submitted 11 August, 2016; originally announced August 2016.

    Comments: 62 pages, 5 figures; a merger of arXiv:1511.07527 [cs.DS] and arXiv:1605.02701 [cs.DS], which subsumes both of the preprints. New version contains more elaborated proofs and fixed some typos

  24. Sieving for closest lattice vectors (with preprocessing)

    Authors: Thijs Laarhoven

    Abstract: Lattice-based cryptography has recently emerged as a prime candidate for efficient and secure post-quantum cryptography. The two main hard problems underlying its security are the shortest vector problem (SVP) and the closest vector problem (CVP). Various algorithms have been studied for solving these problems, and for SVP, lattice sieving currently dominates in terms of the asymptotic time comple… ▽ More

    Submitted 16 July, 2016; originally announced July 2016.

    Comments: 23rd Conference on Selected Areas in Cryptography (SAC), 2016

    Journal ref: 23rd International Conference on Selected Areas in Cryptography (SAC), pp. 523-542, 2016

  25. arXiv:1605.02701  [pdf, other

    cs.DS cs.CC cs.CG cs.IT

    Lower Bounds on Time-Space Trade-Offs for Approximate Near Neighbors

    Authors: Alexandr Andoni, Thijs Laarhoven, Ilya Razenshteyn, Erik Waingarten

    Abstract: We show tight lower bounds for the entire trade-off between space and query time for the Approximate Near Neighbor search problem. Our lower bounds hold in a restricted model of computation, which captures all hashing-based approaches. In articular, our lower bound matches the upper bound recently shown in [Laarhoven 2015] for the random instance on a Euclidean sphere (which we show in fact extend… ▽ More

    Submitted 18 August, 2016; v1 submitted 9 May, 2016; originally announced May 2016.

    Comments: 47 pages, 2 figures; v2: substantially revised introduction, lots of small corrections; subsumed by arXiv:1608.03580 [cs.DS] (along with arXiv:1511.07527 [cs.DS])

  26. arXiv:1601.05775  [pdf, ps, other

    cs.SI cs.LG stat.ML

    Local Network Community Detection with Continuous Optimization of Conductance and Weighted Kernel K-Means

    Authors: Twan van Laarhoven, Elena Marchiori

    Abstract: Local network community detection is the task of finding a single community of nodes concentrated around few given seed nodes in a localized way. Conductance is a popular objective function used in many algorithms for local community detection. This paper studies a continuous relaxation of conductance. We show that continuous optimization of this objective still leads to discrete communities. We i… ▽ More

    Submitted 17 August, 2016; v1 submitted 21 January, 2016; originally announced January 2016.

  27. arXiv:1511.07527  [pdf, other

    cs.DS cs.CG cs.IR

    Tradeoffs for nearest neighbors on the sphere

    Authors: Thijs Laarhoven

    Abstract: We consider tradeoffs between the query and update complexities for the (approximate) nearest neighbor problem on the sphere, extending the recent spherical filters to sparse regimes and generalizing the scheme and analysis to account for different tradeoffs. In a nutshell, for the sparse regime the tradeoff between the query complexity $n^{ρ_q}$ and update complexity $n^{ρ_u}$ for data sets of si… ▽ More

    Submitted 9 September, 2016; v1 submitted 23 November, 2015; originally announced November 2015.

    Comments: 16 pages, 1 table, 2 figures. Mostly subsumed by arXiv:1608.03580 [cs.DS] (along with arXiv:1605.02701 [cs.DS])

  28. arXiv:1509.02897  [pdf, other

    cs.DS cs.CG cs.IR

    Practical and Optimal LSH for Angular Distance

    Authors: Alexandr Andoni, Piotr Indyk, Thijs Laarhoven, Ilya Razenshteyn, Ludwig Schmidt

    Abstract: We show the existence of a Locality-Sensitive Hashing (LSH) family for the angular distance that yields an approximate Near Neighbor Search algorithm with the asymptotically optimal running time exponent. Unlike earlier algorithms with this property (e.g., Spherical LSH [Andoni, Indyk, Nguyen, Razenshteyn 2014], [Andoni, Razenshteyn 2015]), our algorithm is also practical, improving upon the well-… ▽ More

    Submitted 9 September, 2015; originally announced September 2015.

    Comments: 22 pages, an extended abstract is to appear in the proceedings of the 29th Annual Conference on Neural Information Processing Systems (NIPS 2015)

  29. Optimal sequential fingerprinting: Wald vs. Tardos

    Authors: Thijs Laarhoven

    Abstract: We study sequential collusion-resistant fingerprinting, where the fingerprinting code is generated in advance but accusations may be made between rounds, and show that in this setting both the dynamic Tardos scheme and schemes building upon Wald's sequential probability ratio test (SPRT) are asymptotically optimal. We further compare these two approaches to sequential fingerprinting, highlighting… ▽ More

    Submitted 12 February, 2015; originally announced February 2015.

    Comments: 12 pages, 10 figures

    Journal ref: ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec), pp. 97-107, 2015

  30. arXiv:1407.5924  [pdf, ps, other

    stat.ML

    Resolution-limit-free and local Non-negative Matrix Factorization quality functions for graph clustering

    Authors: Twan van Laarhoven, Elena Marchiori

    Abstract: Many graph clustering quality functions suffer from a resolution limit, the inability to find small clusters in large graphs. So called resolution-limit-free quality functions do not have this limit. This property was previously introduced for hard clustering, that is, graph partitioning. We investigate the resolution-limit-free property in the context of Non-negative Matrix Factorization (NMF)… ▽ More

    Submitted 22 July, 2014; originally announced July 2014.

  31. arXiv:1404.2825  [pdf, other

    cs.IT cs.CR math.ST

    Asymptotics of Fingerprinting and Group Testing: Capacity-Achieving Log-Likelihood Decoders

    Authors: Thijs Laarhoven

    Abstract: We study the large-coalition asymptotics of fingerprinting and group testing, and derive explicit decoders that provably achieve capacity for many of the considered models. We do this both for simple decoders (fast but suboptimal) and for joint decoders (slow but optimal), and both for informed and uninformed settings. For fingerprinting, we show that if the pirate strategy is known, the Neyman-… ▽ More

    Submitted 9 April, 2014; originally announced April 2014.

    Comments: 14 pages, 2 figures

    Journal ref: EURASIP Journal on Information Security, 2016:3

  32. Asymptotics of Fingerprinting and Group Testing: Tight Bounds from Channel Capacities

    Authors: Thijs Laarhoven

    Abstract: In this work we consider the large-coalition asymptotics of various fingerprinting and group testing games, and derive explicit expressions for the capacities for each of these models. We do this both for simple decoders (fast but suboptimal) and for joint decoders (slow but optimal). For fingerprinting, we show that if the pirate strategy is known, the capacity often decreases linearly with the… ▽ More

    Submitted 9 April, 2014; originally announced April 2014.

    Comments: 14 pages, 6 figures

    Journal ref: IEEE Transactions on Information Forensics and Security, vol. 10, no. 9, pp. 1967-1980, 2015

  33. Capacities and Capacity-Achieving Decoders for Various Fingerprinting Games

    Authors: Thijs Laarhoven

    Abstract: Combining an information-theoretic approach to fingerprinting with a more constructive, statistical approach, we derive new results on the fingerprinting capacities for various informed settings, as well as new log-likelihood decoders with provable code lengths that asymptotically match these capacities. The simple decoder built against the interleaving attack is further shown to achieve the simpl… ▽ More

    Submitted 2 April, 2014; v1 submitted 22 January, 2014; originally announced January 2014.

    Comments: 13 pages, 2 figures

    Journal ref: ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec), pp. 123-134, 2014

  34. arXiv:1308.3383  [pdf, other

    cs.CV cs.LG stat.ML

    Axioms for graph clustering quality functions

    Authors: Twan van Laarhoven, Elena Marchiori

    Abstract: We investigate properties that intuitively ought to be satisfied by graph clustering quality functions, that is, functions that assign a score to a clustering of a graph. Graph clustering, also known as network community detection, is often performed by optimizing such a function. Two axioms tailored for graph clustering quality functions are introduced, and the four axioms introduced in previous… ▽ More

    Submitted 22 July, 2014; v1 submitted 15 August, 2013; originally announced August 2013.

    Comments: 23 pages. Full text and sources available on: http://www.cs.ru.nl/~T.vanLaarhoven/graph-clustering-axioms-2014/

    Journal ref: Journal of Machine Learning Research, 15(Jan):193-215, 2014

  35. Efficient Probabilistic Group Testing Based on Traitor Tracing

    Authors: Thijs Laarhoven

    Abstract: Inspired by recent results from collusion-resistant traitor tracing, we provide a framework for constructing efficient probabilistic group testing schemes. In the traditional group testing model, our scheme asymptotically requires T ~ 2 K ln N tests to find (with high probability) the correct set of K defectives out of N items. The framework is also applied to several noisy group testing and thres… ▽ More

    Submitted 9 April, 2014; v1 submitted 9 July, 2013; originally announced July 2013.

    Comments: 8 pages, 3 figures, 1 table

    Journal ref: 51st Annual Allerton Conference on Communication, Control and Computing (Allerton), pp. 1458-1465, 2013

  36. Dynamic Traitor Tracing Schemes, Revisited

    Authors: Thijs Laarhoven

    Abstract: We revisit recent results from the area of collusion-resistant traitor tracing, and show how they can be combined and improved to obtain more efficient dynamic traitor tracing schemes. In particular, we show how the dynamic Tardos scheme of Laarhoven et al. can be combined with the optimized score functions of Oosterwijk et al. to trace coalitions much faster. If the attack strategy is known, in m… ▽ More

    Submitted 30 June, 2013; originally announced July 2013.

    Comments: 7 pages, 1 figure (6 subfigures), 1 table

    Journal ref: IEEE Workshop on Information Forensics and Security (WIFS), pp. 191-196, 2013

  37. Discrete Distributions in the Tardos Scheme, Revisited

    Authors: Thijs Laarhoven, Benne de Weger

    Abstract: The Tardos scheme is a well-known traitor tracing scheme to protect copyrighted content against collusion attacks. The original scheme contained some suboptimal design choices, such as the score function and the distribution function used for generating the biases. Skoric et al. previously showed that a symbol-symmetric score function leads to shorter codes, while Nuida et al. obtained the optimal… ▽ More

    Submitted 29 April, 2013; v1 submitted 7 February, 2013; originally announced February 2013.

    Comments: 5 pages, 2 figures

    ACM Class: E.4; G.1.4

    Journal ref: ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec), pp. 13-18, 2013

  38. Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search

    Authors: Thijs Laarhoven, Michele Mosca, Joop van de Pol

    Abstract: By applying Grover's quantum search algorithm to the lattice algorithms of Micciancio and Voulgaris, Nguyen and Vidick, Wang et al., and Pujol and Stehlé, we obtain improved asymptotic quantum results for solving the shortest vector problem. With quantum computers we can provably find a shortest vector in time $2^{1.799n + o(n)}$, improving upon the classical time complexity of… ▽ More

    Submitted 25 January, 2013; originally announced January 2013.

    Comments: 19 pages

    Journal ref: 5th International Workshop on Post-Quantum Cryptography (PQCrypto), pp. 83-101, 2013

  39. arXiv:1209.3495  [pdf, ps, other

    math.NT cs.DM math.DS

    The Collatz conjecture and De Bruijn graphs

    Authors: Thijs Laarhoven, Benne de Weger

    Abstract: We study variants of the well-known Collatz graph, by considering the action of the 3n+1 function on congruence classes. For moduli equal to powers of 2, these graphs are shown to be isomorphic to binary De Bruijn graphs. Unlike the Collatz graph, these graphs are very structured, and have several interesting properties. We then look at a natural generalization of these finite graphs to the 2-adic… ▽ More

    Submitted 16 September, 2012; originally announced September 2012.

    Comments: 9 pages, 8 figures

    Journal ref: Indagationes Mathematicae, vol. 24, no. 4, pp. 971-983, 2013

  40. Dynamic Traitor Tracing for Arbitrary Alphabets: Divide and Conquer

    Authors: Thijs Laarhoven, Jan-Jaap Oosterwijk, Jeroen Doumen

    Abstract: We give a generic divide-and-conquer approach for constructing collusion-resistant probabilistic dynamic traitor tracing schemes with larger alphabets from schemes with smaller alphabets. This construction offers a linear tradeoff between the alphabet size and the codelength. In particular, we show that applying our results to the binary dynamic Tardos scheme of Laarhoven et al. leads to schemes t… ▽ More

    Submitted 26 September, 2012; v1 submitted 28 June, 2012; originally announced June 2012.

    Comments: 6 pages, 1 figure

    Journal ref: IEEE International Workshop on Information Forensics and Security (WIFS), pp. 240-245, 2012

  41. Dynamic Tardos Traitor Tracing Schemes

    Authors: Thijs Laarhoven, Jeroen Doumen, Peter Roelse, Boris Skoric, Benne de Weger

    Abstract: We construct binary dynamic traitor tracing schemes, where the number of watermark bits needed to trace and disconnect any coalition of pirates is quadratic in the number of pirates, and logarithmic in the total number of users and the error probability. Our results improve upon results of Tassa, and our schemes have several other advantages, such as being able to generate all codewords in advance… ▽ More

    Submitted 25 January, 2013; v1 submitted 15 November, 2011; originally announced November 2011.

    Comments: 13 pages, 5 figures

    MSC Class: 68P30; 94B60

    Journal ref: IEEE Transactions on Information Theory, vol. 59, no. 7, pp. 4230-4242, 2013

  42. Optimal symmetric Tardos traitor tracing schemes

    Authors: Thijs Laarhoven, Benne de Weger

    Abstract: For the Tardos traitor tracing scheme, we show that by combining the symbol-symmetric accusation function of Skoric et al. with the improved analysis of Blayer and Tassa we get further improvements. Our construction gives codes that are up to 4 times shorter than Blayer and Tassa's, and up to 2 times shorter than the codes from Skoric et al. Asymptotically, we achieve the theoretical optimal codel… ▽ More

    Submitted 15 November, 2011; v1 submitted 18 July, 2011; originally announced July 2011.

    Comments: 16 pages, 1 figure

    MSC Class: 68P30; 94B60

    Journal ref: Designs, Codes and Cryptography, vol. 71, no. 1, pp. 83-103, 2014