Skip to main content

Showing 1–11 of 11 results for author: Manoj, S

.
  1. arXiv:2311.11185  [pdf, ps, other

    cs.DS cs.LG stat.ML

    Dueling Optimization with a Monotone Adversary

    Authors: Avrim Blum, Meghal Gupta, Gene Li, Naren Sarayu Manoj, Aadirupa Saha, Yuanyuan Yang

    Abstract: We introduce and study the problem of dueling optimization with a monotone adversary, which is a generalization of (noiseless) dueling convex optimization. The goal is to design an online algorithm to find a minimizer $\mathbf{x}^{*}$ for a function $f\colon X \to \mathbb{R}$, where $X \subseteq \mathbb{R}^d$. In each round, the algorithm submits a pair of guesses, i.e., $\mathbf{x}^{(1)}$ and… ▽ More

    Submitted 18 November, 2023; originally announced November 2023.

    Comments: 21 pages. comments welcome

  2. arXiv:2311.10013  [pdf, ps, other

    math.FA cs.DS math.PR

    The Change-of-Measure Method, Block Lewis Weights, and Approximating Matrix Block Norms

    Authors: Naren Sarayu Manoj, Max Ovsiankin

    Abstract: Given a matrix $\mathbf{A} \in \mathbb{R}^{k \times n}$, a partitioning of $[k]$ into groups $S_1,\dots,S_m$, an outer norm $p$, and a collection of inner norms such that either $p \ge 1$ and $p_1,\dots,p_m \ge 2$ or $p_1=\dots=p_m=p \ge 1/\log n$, we prove that there is a sparse weight vector $\mathbfβ \in \mathbb{R}^{m}$ such that… ▽ More

    Submitted 16 November, 2023; originally announced November 2023.

    Comments: 53 pages. comments welcome

  3. arXiv:2311.09460  [pdf, other

    cs.DS cs.CG

    Near-Optimal Streaming Ellipsoidal Rounding for General Convex Polytopes

    Authors: Yury Makarychev, Naren Sarayu Manoj, Max Ovsiankin

    Abstract: We give near-optimal algorithms for computing an ellipsoidal rounding of a convex polytope whose vertices are given in a stream. The approximation factor is linear in the dimension (as in John's theorem) and only loses an excess logarithmic factor in the aspect ratio of the polytope. Our algorithms are nearly optimal in two senses: first, their runtimes nearly match those of the most efficient kno… ▽ More

    Submitted 15 November, 2023; originally announced November 2023.

  4. arXiv:2302.07263  [pdf, other

    cs.LG cs.DS cs.IT stat.ML

    Interpolation Learning With Minimum Description Length

    Authors: Naren Sarayu Manoj, Nathan Srebro

    Abstract: We prove that the Minimum Description Length learning rule exhibits tempered overfitting. We obtain tempered agnostic finite sample learning guarantees and characterize the asymptotic behavior in the presence of random label noise.

    Submitted 14 February, 2023; originally announced February 2023.

  5. arXiv:2206.07250  [pdf, ps, other

    cs.DS cs.CG

    Streaming Algorithms for Ellipsoidal Approximation of Convex Polytopes

    Authors: Yury Makarychev, Naren Sarayu Manoj, Max Ovsiankin

    Abstract: We give efficient deterministic one-pass streaming algorithms for finding an ellipsoidal approximation of a symmetric convex polytope. The algorithms are near-optimal in that their approximation factors differ from that of the optimal offline solution only by a factor sub-logarithmic in the aspect ratio of the polytope.

    Submitted 14 June, 2022; originally announced June 2022.

    Comments: Accepted to COLT 2022

  6. arXiv:2204.01224  [pdf, ps, other

    cs.DS cs.CC

    An Optimal Algorithm for Certifying Monotone Functions

    Authors: Meghal Gupta, Naren Sarayu Manoj

    Abstract: Given query access to a monotone function $f\colon\{0,1\}^n\to\{0,1\}$ with certificate complexity $C(f)$ and an input $x^{\star}$, we design an algorithm that outputs a size-$C(f)$ subset of $x^{\star}$ certifying the value of $f(x^{\star})$. Our algorithm makes $O(C(f) \cdot \log n)$ queries to $f$, which matches the information-theoretic lower bound for this problem and resolves the concrete op… ▽ More

    Submitted 3 April, 2022; originally announced April 2022.

  7. arXiv:2109.00685  [pdf, ps, other

    cs.LG cs.CR stat.ML

    Excess Capacity and Backdoor Poisoning

    Authors: Naren Sarayu Manoj, Avrim Blum

    Abstract: A backdoor data poisoning attack is an adversarial attack wherein the attacker injects several watermarked, mislabeled training examples into a training set. The watermark does not impact the test-time performance of the model on typical data; however, the model reliably errs on watermarked examples. To gain a better foundational understanding of backdoor data poisoning attacks, we present a for… ▽ More

    Submitted 3 November, 2021; v1 submitted 1 September, 2021; originally announced September 2021.

    Comments: Accepted to NeurIPS 2021

  8. arXiv:2006.15799  [pdf, other

    cs.LG stat.ML

    Conditional Classification: A Solution for Computational Energy Reduction

    Authors: Ali Mirzaeian, Sai Manoj, Ashkan Vakil, Houman Homayoun, Avesta Sasan

    Abstract: Deep convolutional neural networks have shown high efficiency in computer visions and other applications. However, with the increase in the depth of the networks, the computational complexity is growing exponentially. In this paper, we propose a novel solution to reduce the computational complexity of convolutional neural network models used for many class image classification. Our proposed techni… ▽ More

    Submitted 7 January, 2021; v1 submitted 28 June, 2020; originally announced June 2020.

    Comments: paper need to be majorly revised

  9. arXiv:2001.06099  [pdf, other

    cs.LG cs.CV stat.ML

    Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial Attacks

    Authors: Farnaz Behnia, Ali Mirzaeian, Mohammad Sabokrou, Sai Manoj, Tinoosh Mohsenin, Khaled N. Khasawneh, Liang Zhao, Houman Homayoun, Avesta Sasan

    Abstract: In this paper, we propose Code-Bridged Classifier (CBC), a framework for making a Convolutional Neural Network (CNNs) robust against adversarial attacks without increasing or even by decreasing the overall models' computational complexity. More specifically, we propose a stacked encoder-convolutional model, in which the input image is first encoded by the encoder module of a denoising auto-encoder… ▽ More

    Submitted 16 January, 2020; originally announced January 2020.

    Comments: 6 pages, Accepted and to appear in ISQED 2020

  10. arXiv:1709.05645  [pdf, other

    cs.NI

    Urban Delay Tolerant Network Simulator (UDTNSim v0.1)

    Authors: Sarath Babu, Gaurav Jain, B. S. Manoj

    Abstract: Delay Tolerant Networking (DTN) is an approach to networking which handles network disruptions and high delays that may occur in many kinds of communication networks. The major reasons for high delay include partial connectivity of networks as can be seen in many types of ad hoc wireless networks with frequent network partitions, long propagation time as experienced in inter-planetary and deep spa… ▽ More

    Submitted 17 September, 2017; originally announced September 2017.

    Comments: 40 pages and 4 figures

  11. arXiv:1601.03204  [pdf, other

    cs.IT

    Graph Fourier Transform based on Directed Laplacian

    Authors: Rahul Singh, Abhishek Chakraborty, B. S. Manoj

    Abstract: In this paper, we redefine the Graph Fourier Transform (GFT) under the DSP$_\mathrm{G}$ framework. We consider the Jordan eigenvectors of the directed Laplacian as graph harmonics and the corresponding eigenvalues as the graph frequencies. For this purpose, we propose a shift operator based on the directed Laplacian of a graph. Based on our shift operator, we then define total variation of graph s… ▽ More

    Submitted 13 January, 2016; originally announced January 2016.

    Comments: 5 pages