Skip to main content

Showing 1–7 of 7 results for author: Manoj, N S

.
  1. arXiv:2311.11185  [pdf, ps, other

    cs.DS cs.LG stat.ML

    Dueling Optimization with a Monotone Adversary

    Authors: Avrim Blum, Meghal Gupta, Gene Li, Naren Sarayu Manoj, Aadirupa Saha, Yuanyuan Yang

    Abstract: We introduce and study the problem of dueling optimization with a monotone adversary, which is a generalization of (noiseless) dueling convex optimization. The goal is to design an online algorithm to find a minimizer $\mathbf{x}^{*}$ for a function $f\colon X \to \mathbb{R}$, where $X \subseteq \mathbb{R}^d$. In each round, the algorithm submits a pair of guesses, i.e., $\mathbf{x}^{(1)}$ and… ▽ More

    Submitted 18 November, 2023; originally announced November 2023.

    Comments: 21 pages. comments welcome

  2. arXiv:2311.10013  [pdf, ps, other

    math.FA cs.DS math.PR

    The Change-of-Measure Method, Block Lewis Weights, and Approximating Matrix Block Norms

    Authors: Naren Sarayu Manoj, Max Ovsiankin

    Abstract: Given a matrix $\mathbf{A} \in \mathbb{R}^{k \times n}$, a partitioning of $[k]$ into groups $S_1,\dots,S_m$, an outer norm $p$, and a collection of inner norms such that either $p \ge 1$ and $p_1,\dots,p_m \ge 2$ or $p_1=\dots=p_m=p \ge 1/\log n$, we prove that there is a sparse weight vector $\mathbfβ \in \mathbb{R}^{m}$ such that… ▽ More

    Submitted 16 November, 2023; originally announced November 2023.

    Comments: 53 pages. comments welcome

  3. arXiv:2311.09460  [pdf, other

    cs.DS cs.CG

    Near-Optimal Streaming Ellipsoidal Rounding for General Convex Polytopes

    Authors: Yury Makarychev, Naren Sarayu Manoj, Max Ovsiankin

    Abstract: We give near-optimal algorithms for computing an ellipsoidal rounding of a convex polytope whose vertices are given in a stream. The approximation factor is linear in the dimension (as in John's theorem) and only loses an excess logarithmic factor in the aspect ratio of the polytope. Our algorithms are nearly optimal in two senses: first, their runtimes nearly match those of the most efficient kno… ▽ More

    Submitted 15 November, 2023; originally announced November 2023.

  4. arXiv:2302.07263  [pdf, other

    cs.LG cs.DS cs.IT stat.ML

    Interpolation Learning With Minimum Description Length

    Authors: Naren Sarayu Manoj, Nathan Srebro

    Abstract: We prove that the Minimum Description Length learning rule exhibits tempered overfitting. We obtain tempered agnostic finite sample learning guarantees and characterize the asymptotic behavior in the presence of random label noise.

    Submitted 14 February, 2023; originally announced February 2023.

  5. arXiv:2206.07250  [pdf, ps, other

    cs.DS cs.CG

    Streaming Algorithms for Ellipsoidal Approximation of Convex Polytopes

    Authors: Yury Makarychev, Naren Sarayu Manoj, Max Ovsiankin

    Abstract: We give efficient deterministic one-pass streaming algorithms for finding an ellipsoidal approximation of a symmetric convex polytope. The algorithms are near-optimal in that their approximation factors differ from that of the optimal offline solution only by a factor sub-logarithmic in the aspect ratio of the polytope.

    Submitted 14 June, 2022; originally announced June 2022.

    Comments: Accepted to COLT 2022

  6. arXiv:2204.01224  [pdf, ps, other

    cs.DS cs.CC

    An Optimal Algorithm for Certifying Monotone Functions

    Authors: Meghal Gupta, Naren Sarayu Manoj

    Abstract: Given query access to a monotone function $f\colon\{0,1\}^n\to\{0,1\}$ with certificate complexity $C(f)$ and an input $x^{\star}$, we design an algorithm that outputs a size-$C(f)$ subset of $x^{\star}$ certifying the value of $f(x^{\star})$. Our algorithm makes $O(C(f) \cdot \log n)$ queries to $f$, which matches the information-theoretic lower bound for this problem and resolves the concrete op… ▽ More

    Submitted 3 April, 2022; originally announced April 2022.

  7. arXiv:2109.00685  [pdf, ps, other

    cs.LG cs.CR stat.ML

    Excess Capacity and Backdoor Poisoning

    Authors: Naren Sarayu Manoj, Avrim Blum

    Abstract: A backdoor data poisoning attack is an adversarial attack wherein the attacker injects several watermarked, mislabeled training examples into a training set. The watermark does not impact the test-time performance of the model on typical data; however, the model reliably errs on watermarked examples. To gain a better foundational understanding of backdoor data poisoning attacks, we present a for… ▽ More

    Submitted 3 November, 2021; v1 submitted 1 September, 2021; originally announced September 2021.

    Comments: Accepted to NeurIPS 2021