Skip to main content

Showing 1–50 of 92 results for author: Sankar, L

.
  1. arXiv:2406.09561  [pdf, other

    cs.LG cs.AI

    Label Noise Robustness for Domain-Agnostic Fair Corrections via Nearest Neighbors Label Spreading

    Authors: Nathan Stromberg, Rohan Ayyagari, Sanmi Koyejo, Richard Nock, Lalitha Sankar

    Abstract: Last-layer retraining methods have emerged as an efficient framework for correcting existing base models. Within this framework, several methods have been proposed to deal with correcting models for subgroup fairness with and without group membership information. Importantly, prior work has demonstrated that many methods are susceptible to noisy labels. To this end, we propose a drop-in correction… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

  2. arXiv:2405.05934  [pdf, other

    cs.LG cs.CV cs.IT stat.ML

    Theoretical Guarantees of Data Augmented Last Layer Retraining Methods

    Authors: Monica Welfert, Nathan Stromberg, Lalitha Sankar

    Abstract: Ensuring fair predictions across many distinct subpopulations in the training data can be prohibitive for large models. Recently, simple linear last layer retraining strategies, in combination with data augmentation methods such as upweighting, downsampling and mixup, have been shown to achieve state-of-the-art performance for worst-group accuracy, which quantifies accuracy for the least prevalent… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

    Comments: Extended version of a paper accepted to ISIT 2024. arXiv admin note: text overlap with arXiv:2402.11039

  3. arXiv:2405.02813  [pdf, ps, other

    eess.SY math.OC

    Model Predictive Control for Joint Ram** and Regulation-Type Service from Distributed Energy Resource Aggregations

    Authors: Joel Mathias, Rajasekhar Anguluri, Oliver Kosut, Lalitha Sankar

    Abstract: Distributed energy resources (DERs) such as grid-responsive loads and batteries can be harnessed to provide ram** and regulation services across the grid. This paper concerns the problem of optimal allocation of different classes of DERs, where each class is an aggregation of similar DERs, to balance net-demand forecasts. The resulting resource allocation problem is solved using model-predictive… ▽ More

    Submitted 5 May, 2024; originally announced May 2024.

    Comments: 10 pages, 3 figures, to be presented at IEEE PES GM 2024

  4. arXiv:2402.12338  [pdf, other

    eess.SY cs.CR cs.LG

    An Adversarial Approach to Evaluating the Robustness of Event Identification Models

    Authors: Obai Bahwal, Oliver Kosut, Lalitha Sankar

    Abstract: Intelligent machine learning approaches are finding active use for event detection and identification that allow real-time situational awareness. Yet, such machine learning algorithms have been shown to be susceptible to adversarial attacks on the incoming telemetry data. This paper considers a physics-based modal decomposition method to extract features for event classification and focuses on int… ▽ More

    Submitted 22 April, 2024; v1 submitted 19 February, 2024; originally announced February 2024.

  5. arXiv:2402.11039  [pdf, other

    cs.LG stat.ML

    Robustness to Subpopulation Shift with Domain Label Noise via Regularized Annotation of Domains

    Authors: Nathan Stromberg, Rohan Ayyagari, Monica Welfert, Sanmi Koyejo, Richard Nock, Lalitha Sankar

    Abstract: Existing methods for last layer retraining that aim to optimize worst-group accuracy (WGA) rely heavily on well-annotated groups in the training data. We show, both in theory and practice, that annotation-based data augmentations using either downsampling or upweighting for WGA are susceptible to domain annotation noise, and in high-noise regimes approach the WGA of a model trained with vanilla em… ▽ More

    Submitted 26 June, 2024; v1 submitted 16 February, 2024; originally announced February 2024.

    Comments: Generalized Gaussian assumption

  6. arXiv:2402.05691  [pdf, other

    math.OC

    Adaptive Methods for Variational Inequalities under Relaxed Smoothness Assumption

    Authors: Daniil Vankov, Angelia Nedich, Lalitha Sankar

    Abstract: Variational Inequality (VI) problems have attracted great interest in the machine learning (ML) community due to their application in adversarial and multi-agent training. Despite its relevance in ML, the oft-used strong-monotonicity and Lipschitz continuity assumptions on VI problems are restrictive and do not hold in practice. To address this, we relax smoothness and monotonicity assumptions and… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

  7. arXiv:2312.17404  [pdf, other

    cs.LG stat.ML

    Parameter Optimization with Conscious Allocation (POCA)

    Authors: Joshua Inman, Tanmay Khandait, Giulia Pedrielli, Lalitha Sankar

    Abstract: The performance of modern machine learning algorithms depends upon the selection of a set of hyperparameters. Common examples of hyperparameters are learning rate and the number of layers in a dense neural network. Auto-ML is a branch of optimization that has produced important contributions in this area. Within Auto-ML, hyperband-based approaches, which eliminate poorly-performing configurations… ▽ More

    Submitted 28 December, 2023; originally announced December 2023.

    Comments: To be published in the Proceeding of the 2023 Winter Simulation Conference

  8. arXiv:2310.18291  [pdf, other

    cs.LG cs.IT stat.ML

    Addressing GAN Training Instabilities via Tunable Classification Losses

    Authors: Monica Welfert, Gowtham R. Kurri, Kyle Otstot, Lalitha Sankar

    Abstract: Generative adversarial networks (GANs), modeled as a zero-sum game between a generator (G) and a discriminator (D), allow generating synthetic data with formal guarantees. Noting that D is a classifier, we begin by reformulating the GAN value function using class probability estimation (CPE) losses. We prove a two-way correspondence between CPE loss GANs and $f$-GANs which minimize $f$-divergences… ▽ More

    Submitted 27 October, 2023; originally announced October 2023.

    Comments: arXiv admin note: text overlap with arXiv:2302.14320

  9. arXiv:2310.16910  [pdf, other

    math.OC

    Last Iterate Convergence of Popov Method for Non-monotone Stochastic Variational Inequalities

    Authors: Daniil Vankov, Angelia Nedich, Lalitha Sankar

    Abstract: This paper focuses on non-monotone stochastic variational inequalities (SVIs) that may not have a unique solution. A commonly used efficient algorithm to solve VIs is the Popov method, which is known to have the optimal convergence rate for VIs with Lipschitz continuous and strongly monotone operators. We introduce a broader class of structured non-monotone operators, namely $p$-quasi sharp operat… ▽ More

    Submitted 25 October, 2023; originally announced October 2023.

  10. arXiv:2309.10095  [pdf, other

    cs.LG eess.SY

    A Semi-Supervised Approach for Power System Event Identification

    Authors: Nima Taghipourbazargani, Lalitha Sankar, Oliver Kosut

    Abstract: Event identification is increasingly recognized as crucial for enhancing the reliability, security, and stability of the electric power system. With the growing deployment of Phasor Measurement Units (PMUs) and advancements in data science, there are promising opportunities to explore data-driven event identification via machine learning classification techniques. However, obtaining accurately-lab… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

  11. arXiv:2304.07456  [pdf, other

    cs.IT

    Unifying Privacy Measures via Maximal $(α,β)$-Leakage (M$α$beL)

    Authors: Atefeh Gilani, Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar

    Abstract: We introduce a family of information leakage measures called maximal $(α,β)$-leakage (M$α$beL), parameterized by real numbers $α$ and $β$ greater than or equal to 1. The measure is formalized via an operational definition involving an adversary guessing an unknown (randomized) function of the data given the released data. We obtain a simplified computable expression for the measure and show that i… ▽ More

    Submitted 4 April, 2024; v1 submitted 14 April, 2023; originally announced April 2023.

  12. arXiv:2302.14320  [pdf, other

    cs.LG cs.IT stat.ML

    $(α_D,α_G)$-GANs: Addressing GAN Training Instabilities via Dual Objectives

    Authors: Monica Welfert, Kyle Otstot, Gowtham R. Kurri, Lalitha Sankar

    Abstract: In an effort to address the training instabilities of GANs, we introduce a class of dual-objective GANs with different value functions (objectives) for the generator (G) and discriminator (D). In particular, we model each objective using $α$-loss, a tunable classification loss, to obtain $(α_D,α_G)$-GANs, parameterized by $(α_D,α_G)\in (0,\infty]^2$. For sufficiently large number of samples and ca… ▽ More

    Submitted 3 May, 2023; v1 submitted 28 February, 2023; originally announced February 2023.

    Comments: Extended version of a paper accepted to ISIT 2023

  13. arXiv:2302.09114  [pdf, other

    cs.LG cs.IT

    Smoothly Giving up: Robustness for Simple Models

    Authors: Tyler Sypherd, Nathan Stromberg, Richard Nock, Visar Berisha, Lalitha Sankar

    Abstract: There is a growing need for models that are interpretable and have reduced energy and computational cost (e.g., in health care analytics and federated learning). Examples of algorithms to train such models include logistic regression and boosting. However, one challenge facing these algorithms is that they provably suffer from label noise; this has been attributed to the joint interaction between… ▽ More

    Submitted 17 February, 2023; originally announced February 2023.

    Comments: To appear in AISTATS 2023

  14. arXiv:2211.15453  [pdf, other

    cs.IT

    An Alphabet of Leakage Measures

    Authors: Atefeh Gilani, Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar

    Abstract: We introduce a family of information leakage measures called maximal $α,β$-leakage, parameterized by real numbers $α$ and $β$. The measure is formalized via an operational definition involving an adversary guessing an unknown function of the data given the released data. We obtain a simple, computable expression for the measure and show that it satisfies several basic properties such as monotonici… ▽ More

    Submitted 28 November, 2022; originally announced November 2022.

  15. arXiv:2211.05690  [pdf, other

    stat.ML cs.LG math.ST

    Robust Model Selection of Gaussian Graphical Models

    Authors: Abrar Zahin, Rajasekhar Anguluri, Lalitha Sankar, Oliver Kosut, Gautam Dasarathy

    Abstract: In Gaussian graphical model selection, noise-corrupted samples present significant challenges. It is known that even minimal amounts of noise can obscure the underlying structure, leading to fundamental identifiability issues. A recent line of work addressing this "robust model selection" problem narrows its focus to tree-structured graphical models. Even within this specific class of models, exac… ▽ More

    Submitted 7 May, 2024; v1 submitted 10 November, 2022; originally announced November 2022.

  16. arXiv:2209.13862  [pdf, other

    cs.IT

    An Operational Approach to Information Leakage via Generalized Gain Functions

    Authors: Gowtham R. Kurri, Lalitha Sankar, Oliver Kosut

    Abstract: We introduce a \emph{gain function} viewpoint of information leakage by proposing \emph{maximal $g$-leakage}, a rich class of operationally meaningful leakage measures that subsumes recently introduced leakage measures -- {maximal leakage} and {maximal $α$-leakage}. In maximal $g$-leakage, the gain of an adversary in guessing an unknown random variable is measured using a {gain function} applied t… ▽ More

    Submitted 7 December, 2023; v1 submitted 28 September, 2022; originally announced September 2022.

    Comments: 27 pages, 1 Figure. New results are added. Some results of this paper were presented at ISIT 2021 and ISIT 2022

  17. arXiv:2209.03514  [pdf, other

    cs.HC eess.SY

    PMU Tracker: A Visualization Platform for Epicentric Event Propagation Analysis in the Power Grid

    Authors: Anjana Arunkumar, Andrea Pinceti, Lalitha Sankar, Chris Bryan

    Abstract: The electrical power grid is a critical infrastructure, with disruptions in transmission having severe repercussions on daily activities, across multiple sectors. To identify, prevent, and mitigate such events, power grids are being refurbished as 'smart' systems that include the widespread deployment of GPS-enabled phasor measurement units (PMUs). PMUs provide fast, precise, and time-synchronized… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

    Comments: 10 pages, 5 figures, IEEE VIS 2022 Paper to appear in IEEE TVCG; conference encourages arXiv submission for accessibility

  18. arXiv:2208.09595  [pdf, ps, other

    cs.CR cs.IT cs.LG math.ST

    The Saddle-Point Accountant for Differential Privacy

    Authors: Wael Alghamdi, Shahab Asoodeh, Flavio P. Calmon, Juan Felipe Gomez, Oliver Kosut, Lalitha Sankar, Fei Wei

    Abstract: We introduce a new differential privacy (DP) accountant called the saddle-point accountant (SPA). SPA approximates privacy guarantees for the composition of DP mechanisms in an accurate and fast manner. Our approach is inspired by the saddle-point method -- a ubiquitous numerical technique in statistics. We prove rigorous performance guarantees by deriving upper and lower bounds for the approximat… ▽ More

    Submitted 19 August, 2022; originally announced August 2022.

    Comments: 31 pages, 4 figures

  19. arXiv:2208.04471  [pdf, other

    eess.SY math.OC stat.AP

    Parameter Estimation in Ill-conditioned Low-inertia Power Systems

    Authors: Rajasekhar Anguluri, Lalitha Sankar, Oliver Kosut

    Abstract: This paper examines model parameter estimation in dynamic power systems whose governing electro-mechanical equations are ill-conditioned or singular. This ill-conditioning is because of converter-interfaced power systems generators' zero or small inertia contribution. Consequently, the overall system inertia decreases, resulting in low-inertia power systems. We show that the standard state-space m… ▽ More

    Submitted 8 August, 2022; originally announced August 2022.

    Comments: Submitted to 2022 IEEE North American Power Symposium (NAPS)

  20. arXiv:2207.00420  [pdf, ps, other

    cs.CR cs.IT cs.LG

    Cactus Mechanisms: Optimal Differential Privacy Mechanisms in the Large-Composition Regime

    Authors: Wael Alghamdi, Shahab Asoodeh, Flavio P. Calmon, Oliver Kosut, Lalitha Sankar, Fei Wei

    Abstract: Most differential privacy mechanisms are applied (i.e., composed) numerous times on sensitive data. We study the design of optimal differential privacy mechanisms in the limit of a large number of compositions. As a consequence of the law of large numbers, in this regime the best privacy mechanism is the one that minimizes the Kullback-Leibler divergence between the conditional output distribution… ▽ More

    Submitted 25 June, 2022; originally announced July 2022.

    Comments: 41 pages, 5 figures

  21. arXiv:2206.02286  [pdf, other

    cs.LG cs.CV stat.ML

    AugLoss: A Robust Augmentation-based Fine Tuning Methodology

    Authors: Kyle Otstot, Andrew Yang, John Kevin Cava, Lalitha Sankar

    Abstract: Deep Learning (DL) models achieve great successes in many domains. However, DL models increasingly face safety and robustness concerns, including noisy labeling in the training stage and feature distribution shifts in the testing stage. Previous works made significant progress in addressing these problems, but the focus has largely been on develo** solutions for only one problem at a time. For e… ▽ More

    Submitted 28 January, 2024; v1 submitted 5 June, 2022; originally announced June 2022.

    Comments: 10 pages, 6 figures, 6 tables

  22. arXiv:2205.06393  [pdf, other

    cs.LG cs.IT stat.ML

    $α$-GAN: Convergence and Estimation Guarantees

    Authors: Gowtham R. Kurri, Monica Welfert, Tyler Sypherd, Lalitha Sankar

    Abstract: We prove a two-way correspondence between the min-max optimization of general CPE loss function GANs and the minimization of associated $f$-divergences. We then focus on $α$-GAN, defined via the $α$-loss, which interpolates several GANs (Hellinger, vanilla, Total Variation) and corresponds to the minimization of the Arimoto divergence. We show that the Arimoto divergences induced by $α$-GAN equiva… ▽ More

    Submitted 12 May, 2022; originally announced May 2022.

    Comments: Extended version of a paper accepted to ISIT 2022. 12 pages, 7 figures

  23. A Machine Learning Framework for Event Identification via Modal Analysis of PMU Data

    Authors: Nima T. Bazargani, Gautam Dasarathy, Lalitha Sankar, Oliver Kosut

    Abstract: Power systems are prone to a variety of events (e.g. line trips and generation loss) and real-time identification of such events is crucial in terms of situational awareness, reliability, and security. Using measurements from multiple synchrophasors, i.e., phasor measurement units (PMUs), we propose to identify events by extracting features based on modal dynamics. We combine such traditional phys… ▽ More

    Submitted 3 October, 2022; v1 submitted 14 February, 2022; originally announced February 2022.

    Comments: 12 pages, Accepted for the publication in the IEEE Transactions on Power Systems

    Journal ref: IEEE Transactions on Power Systems, 2022

  24. arXiv:2202.06040  [pdf, ps, other

    cs.IT

    A Variational Formula for Infinity-Rényi Divergence with Applications to Information Leakage

    Authors: Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar

    Abstract: We present a variational characterization for the Rényi divergence of order infinity. Our characterization is related to guessing: the objective functional is a ratio of maximal expected values of a gain function applied to the probability of correctly guessing an unknown random variable. An important aspect of our variational characterization is that it remains agnostic to the particular gain fun… ▽ More

    Submitted 2 May, 2022; v1 submitted 12 February, 2022; originally announced February 2022.

    Comments: Accepted to ISIT 2022, 6 pages

  25. arXiv:2201.07910  [pdf, other

    stat.AP

    A Complex-LASSO Approach for Localizing Forced Oscillations in Power Systems

    Authors: Rajasekhar Anguluri, Nima Taghipourbazargani, Oliver Kosut, Lalitha Sankar

    Abstract: We study the problem of localizing multiple sources of forced oscillations (FOs) and estimating their characteristics, such as frequency, phase, and amplitude, using noisy PMU measurements. For each source location, we model the input oscillation as a sum of unknown sinusoidal terms. This allows us to obtain a linear relationship between measurements and the inputs at the unknown sinusoids' freque… ▽ More

    Submitted 19 January, 2022; originally announced January 2022.

    Comments: 5 pages, submitted to IEEE PESGM 2022

  26. arXiv:2201.07907  [pdf, other

    math.OC stat.ME

    Localization and Estimation of Unknown Forced Inputs: A Group LASSO Approach

    Authors: Rajasekhar Anguluri, Lalitha Sankar, Oliver Kosut

    Abstract: We model and study the problem of localizing a set of sparse forcing inputs for linear dynamical systems from noisy measurements when the initial state is unknown. This problem is of particular relevance to detecting forced oscillations in electric power networks. We express measurements as an additive model comprising the initial state and inputs grouped over time, both expanded in terms of the b… ▽ More

    Submitted 19 January, 2022; originally announced January 2022.

    Comments: 12 pages, 5 figures, submitted to IEEE Transactions on Control of Network Systems

  27. arXiv:2112.01472  [pdf, other

    cs.CR

    Unity is Strength: A Formalization of Cross-Domain Maximal Extractable Value

    Authors: Alexandre Obadia, Alejo Salles, Lakshman Sankar, Tarun Chitra, Vaibhav Chellani, Philip Daian

    Abstract: The multi-chain future is upon us. Modular architectures are coming to maturity across the ecosystem to scale bandwidth and throughput of cryptocurrency. One example of such is the Ethereum modular architecture, with its beacon chain, its execution chain, its Layer 2s, and soon its shards. These can all be thought as separate blockchains, heavily inter-connected with one another, and together form… ▽ More

    Submitted 5 December, 2021; v1 submitted 2 December, 2021; originally announced December 2021.

  28. arXiv:2108.12851  [pdf, other

    cs.IT

    Lower Bounds for the MMSE via Neural Network Estimation and Their Applications to Privacy

    Authors: Mario Diaz, Peter Kairouz, Lalitha Sankar

    Abstract: The minimum mean-square error (MMSE) achievable by optimal estimation of a random variable $Y\in\mathbb{R}$ given another random variable $X\in\mathbb{R}^{d}$ is of much interest in a variety of statistical settings. In the context of estimation-theoretic privacy, the MMSE has been proposed as an information leakage measure that captures the ability of an adversary in estimating $Y$ upon observing… ▽ More

    Submitted 10 July, 2022; v1 submitted 29 August, 2021; originally announced August 2021.

    Comments: 42 pages

  29. arXiv:2108.08774  [pdf, ps, other

    cs.IT

    Evaluating Multiple Guesses by an Adversary via a Tunable Loss Function

    Authors: Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar

    Abstract: We consider a problem of guessing, wherein an adversary is interested in knowing the value of the realization of a discrete random variable $X$ on observing another correlated random variable $Y$. The adversary can make multiple (say, $k$) guesses. The adversary's guessing strategy is assumed to minimize $α$-loss, a class of tunable loss functions parameterized by $α$. It has been shown before tha… ▽ More

    Submitted 19 August, 2021; originally announced August 2021.

    Comments: 6 pages

  30. arXiv:2107.03547  [pdf, other

    eess.SY

    Generation of Synthetic Multi-Resolution Time Series Load Data

    Authors: Andrea Pinceti, Lalitha Sankar, Oliver Kosut

    Abstract: The availability of large datasets is crucial for the development of new power system applications and tools; unfortunately, very few are publicly and freely available. We designed an end-to-end generative framework for the creation of synthetic bus-level time-series load data for transmission networks. The model is trained on a real dataset of over 70 Terabytes of synchrophasor measurements spann… ▽ More

    Submitted 24 July, 2022; v1 submitted 7 July, 2021; originally announced July 2021.

  31. arXiv:2107.03545  [pdf, other

    eess.SY

    Synthetic Time-Series Load Data via Conditional Generative Adversarial Networks

    Authors: Andrea Pinceti, Lalitha Sankar, Oliver Kosut

    Abstract: A framework for the generation of synthetic time-series transmission-level load data is presented. Conditional generative adversarial networks are used to learn the patterns of a real dataset of hourly-sampled week-long load profiles and generate unique synthetic profiles on demand, based on the season and type of load required. Extensive testing of the generative model is performed to verify that… ▽ More

    Submitted 7 July, 2021; originally announced July 2021.

  32. arXiv:2106.09920  [pdf, other

    cs.LG cs.AI math.OC

    Being Properly Improper

    Authors: Tyler Sypherd, Richard Nock, Lalitha Sankar

    Abstract: Properness for supervised losses stipulates that the loss function shapes the learning algorithm towards the true posterior of the data generating distribution. Unfortunately, data in modern machine learning can be corrupted or twisted in many ways. Hence, optimizing a proper loss function on twisted data could perilously lead the learning algorithm towards the twisted posterior, rather than to th… ▽ More

    Submitted 31 January, 2022; v1 submitted 18 June, 2021; originally announced June 2021.

    Comments: New theoretical and experimental results and new treatment

    ACM Class: I.2.6

  33. arXiv:2106.05232  [pdf, ps, other

    cs.LG cs.IT stat.ML

    Realizing GANs via a Tunable Loss Function

    Authors: Gowtham R. Kurri, Tyler Sypherd, Lalitha Sankar

    Abstract: We introduce a tunable GAN, called $α$-GAN, parameterized by $α\in (0,\infty]$, which interpolates between various $f$-GANs and Integral Probability Metric based GANs (under constrained discriminator set). We construct $α$-GAN using a supervised loss function, namely, $α$-loss, which is a tunable loss function capturing several canonical losses. We show that $α$-GAN is intimately related to the Ar… ▽ More

    Submitted 18 October, 2021; v1 submitted 9 June, 2021; originally announced June 2021.

    Comments: Extended version of a paper accepted to ITW 2021. 8 pages, 2 figures

  34. arXiv:2104.13908  [pdf, other

    eess.SY

    A Verifiable Framework for Cyber-Physical Attacks and Countermeasures in a Resilient Electric Power Grid

    Authors: Zhigang Chu, Andrea Pinceti, Ramin Kaviani, Roozbeh Khodadadeh, Xingpeng Li, Jiazi Zhang, Karthik Saikumar, Mostafa Sahraei-Ardakani, Christopher Mosier, Robin Podmore, Kory Hedman, Oliver Kosut, Lalitha Sankar

    Abstract: In this paper, we investigate the feasibility and physical consequences of cyber attacks against energy management systems (EMS). Within this framework, we have designed a complete simulation platform to emulate realistic EMS operations: it includes state estimation (SE), real-time contingency analysis (RTCA), and security constrained economic dispatch (SCED). This software platform allowed us to… ▽ More

    Submitted 28 April, 2021; originally announced April 2021.

  35. arXiv:2008.06529  [pdf, other

    cs.IT cs.AI cs.CR stat.ML

    Three Variants of Differential Privacy: Lossless Conversion and Applications

    Authors: Shahab Asoodeh, Jiachun Liao, Flavio P. Calmon, Oliver Kosut, Lalitha Sankar

    Abstract: We consider three different variants of differential privacy (DP), namely approximate DP, Rényi DP (RDP), and hypothesis test DP. In the first part, we develop a machinery for optimally relating approximate DP to RDP based on the joint range of two $f$-divergences that underlie the approximate DP and RDP. In particular, this enables us to derive the optimal approximate DP parameters of a mechanism… ▽ More

    Submitted 23 January, 2021; v1 submitted 14 August, 2020; originally announced August 2020.

    Comments: To appear in IEEE Journal on Selected Areas in Information Theory, Special Issue on Privacy and Security of Information Systems. arXiv admin note: text overlap with arXiv:2001.05990

  36. arXiv:2006.12406  [pdf, ps, other

    cs.LG cs.IT stat.ML

    On the alpha-loss Landscape in the Logistic Model

    Authors: Tyler Sypherd, Mario Diaz, Lalitha Sankar, Gautam Dasarathy

    Abstract: We analyze the optimization landscape of a recently introduced tunable class of loss functions called $α$-loss, $α\in (0,\infty]$, in the logistic model. This family encapsulates the exponential loss ($α= 1/2$), the log-loss ($α= 1$), and the 0-1 loss ($α= \infty$) and contains compelling properties that enable the practitioner to discern among a host of operating conditions relevant to emerging l… ▽ More

    Submitted 22 June, 2020; originally announced June 2020.

    Comments: 5 pages, appeared in ISIT 2020. arXiv admin note: text overlap with arXiv:1906.02314

  37. arXiv:2003.07699  [pdf, other

    eess.SY

    $N-1$ Reliability Makes It Difficult for False Data Injection Attacks to Cause Physical Consequences

    Authors: Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar

    Abstract: This paper demonstrates that false data injection (FDI) attacks are extremely limited in their ability to cause physical consequences on $N-1$ reliable power systems operating with real-time contingency analysis (RTCA) and security constrained economic dispatch (SCED). Prior work has shown that FDI attacks can be designed via an attacker-defender bi-level linear program (ADBLP) to cause physical o… ▽ More

    Submitted 13 March, 2020; originally announced March 2020.

    Comments: 8 pages, 6 figures. arXiv admin note: substantial text overlap with arXiv:1903.07781

  38. arXiv:2003.06543  [pdf, other

    eess.SY

    Detecting Load Redistribution Attacks via Support Vector Models

    Authors: Zhigang Chu, Oliver Kosut, Lalitha Sankar

    Abstract: A machine learning-based detection framework is proposed to detect a class of cyber-attacks that redistribute loads by modifying measurements. The detection framework consists of a multi-output support vector regression (SVR) load predictor that predicts loads by exploiting both spatial and temporal correlations, and a subsequent support vector machine (SVM) attack detector to determine the existe… ▽ More

    Submitted 13 March, 2020; originally announced March 2020.

    Comments: 9 pages, 6 figures

  39. arXiv:2001.05990  [pdf, other

    cs.IT cs.CR cs.LG stat.ML

    A Better Bound Gives a Hundred Rounds: Enhanced Privacy Guarantees via $f$-Divergences

    Authors: Shahab Asoodeh, Jiachun Liao, Flavio P. Calmon, Oliver Kosut, Lalitha Sankar

    Abstract: We derive the optimal differential privacy (DP) parameters of a mechanism that satisfies a given level of Rényi differential privacy (RDP). Our result is based on the joint range of two $f$-divergences that underlie the approximate and the Rényi variations of differential privacy. We apply our result to the moments accountant framework for characterizing privacy guarantees of stochastic gradient d… ▽ More

    Submitted 16 January, 2020; originally announced January 2020.

    Comments: Submitted for Publication

  40. arXiv:1912.09453  [pdf, other

    eess.SY

    Detection and Localization of Load Redistribution Attacks on Large Scale Systems

    Authors: Andrea Pinceti, Lalitha Sankar, Oliver Kosut

    Abstract: A nearest neighbor-based detection scheme against load redistribution attacks is presented. The detector is designed to scale from small to very large systems while guaranteeing consistent detection performance. Extensive testing is performed on a realistic, large scale system to evaluate the performance of the proposed detector against a wide range of attacks, from simple random noise attacks to… ▽ More

    Submitted 15 June, 2020; v1 submitted 19 December, 2019; originally announced December 2019.

    Comments: 9 pages, 10 figures

  41. arXiv:1911.03405  [pdf, other

    stat.ML cs.LG

    Theoretical Guarantees for Model Auditing with Finite Adversaries

    Authors: Mario Diaz, Peter Kairouz, Jiachun Liao, Lalitha Sankar

    Abstract: Privacy concerns have led to the development of privacy-preserving approaches for learning models from sensitive data. Yet, in practice, even models learned with privacy guarantees can inadvertently memorize unique training examples or leak sensitive features. To identify such privacy violations, existing model auditing techniques use finite adversaries defined as machine learning models with (a)… ▽ More

    Submitted 8 November, 2019; originally announced November 2019.

    Comments: 18 pages, 1 figure

  42. arXiv:1910.00411  [pdf, other

    cs.LG stat.ML

    Generating Fair Universal Representations using Adversarial Models

    Authors: Peter Kairouz, Jiachun Liao, Chong Huang, Maunil Vyas, Monica Welfert, Lalitha Sankar

    Abstract: We present a data-driven framework for learning fair universal representations (FUR) that guarantee statistical fairness for any learning task that may not be known a priori. Our framework leverages recent advances in adversarial learning to allow a data holder to learn representations in which a set of sensitive attributes are decoupled from the rest of the dataset. We formulate this as a constra… ▽ More

    Submitted 11 May, 2022; v1 submitted 27 September, 2019; originally announced October 2019.

    Comments: Extended version of a paper accepted to TIFS

  43. arXiv:1906.02314  [pdf, other

    cs.LG stat.ML

    A Tunable Loss Function for Robust Classification: Calibration, Landscape, and Generalization

    Authors: Tyler Sypherd, Mario Diaz, John Kevin Cava, Gautam Dasarathy, Peter Kairouz, Lalitha Sankar

    Abstract: We introduce a tunable loss function called $α$-loss, parameterized by $α\in (0,\infty]$, which interpolates between the exponential loss ($α= 1/2$), the log-loss ($α= 1$), and the 0-1 loss ($α= \infty$), for the machine learning setting of classification. Theoretically, we illustrate a fundamental connection between $α$-loss and Arimoto conditional entropy, verify the classification-calibration o… ▽ More

    Submitted 21 December, 2022; v1 submitted 5 June, 2019; originally announced June 2019.

    Comments: Published at the Transactions on Information Theory

  44. arXiv:1905.02271  [pdf, other

    eess.SY

    Can Predictive Filters Detect Gradually Ram** False Data Injection Attacks Against PMUs?

    Authors: Zhigang Chu, Andrea Pinceti, Reetam Sen Biswas, Oliver Kosut, Anamitra Pal, Lalitha Sankar

    Abstract: Intelligently designed false data injection (FDI) attacks have been shown to be able to bypass the $χ^2$-test based bad data detector (BDD), resulting in physical consequences (such as line overloads) in the power system. In this paper, it is shown that if an attack is suddenly injected into the system, a predictive filter with sufficient accuracy is able to detect it. However, an attacker can gra… ▽ More

    Submitted 6 May, 2019; originally announced May 2019.

    Comments: 6 pages, 5 figures, submitted to SmartGridComm 2019

  45. arXiv:1903.07781  [pdf, other

    eess.SY

    Vulnerability Assessment of N-1 Reliable Power Systems to False Data Injection Attacks

    Authors: Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar

    Abstract: This paper studies the vulnerability of large-scale power systems to false data injection (FDI) attacks through their physical consequences. Prior work has shown that an attacker-defender bi-level linear program (ADBLP) can be used to determine the worst-case consequences of FDI attacks aiming to maximize the physical power flow on a target line. Understanding the consequences of these attacks req… ▽ More

    Submitted 18 March, 2019; originally announced March 2019.

    Comments: 8 pages, 5 figures, 1 table. arXiv admin note: text overlap with arXiv:1705.04218

  46. arXiv:1902.04639  [pdf, other

    cs.LG cs.IT stat.ML

    A Tunable Loss Function for Binary Classification

    Authors: Tyler Sypherd, Mario Diaz, Lalitha Sankar, Peter Kairouz

    Abstract: We present $α$-loss, $α\in [1,\infty]$, a tunable loss function for binary classification that bridges log-loss ($α=1$) and $0$-$1$ loss ($α= \infty$). We prove that $α$-loss has an equivalent margin-based form and is classification-calibrated, two desirable properties for a good surrogate loss function for the ideal yet intractable $0$-$1$ loss. For logistic regression-based classification, we pr… ▽ More

    Submitted 19 March, 2019; v1 submitted 12 February, 2019; originally announced February 2019.

    Comments: 9 pages, 1 figure, ISIT 2019

  47. arXiv:1901.07105  [pdf, ps, other

    cs.IT

    Robustness of Maximal $α$-Leakage to Side Information

    Authors: Jiachun Liao, Lalitha Sankar, Oliver Kosut, Flavio P. Calmon

    Abstract: Maximal $α$-leakage is a tunable measure of information leakage based on the accuracy of guessing an arbitrary function of private data based on public data. The parameter $α$ determines the loss function used to measure the accuracy of a belief, ranging from log-loss at $α=1$ to the probability of error at $α=\infty$. To study the effect of side information on this measure, we introduce and defin… ▽ More

    Submitted 4 April, 2019; v1 submitted 21 January, 2019; originally announced January 2019.

    Comments: This paper has been accepted by ISIT 2019

  48. arXiv:1811.06057  [pdf, other

    cs.IT

    On the Robustness of Information-Theoretic Privacy Measures and Mechanisms

    Authors: Mario Diaz, Hao Wang, Flavio P. Calmon, Lalitha Sankar

    Abstract: Consider a data publishing setting for a dataset composed by both private and non-private features. The publisher uses an empirical distribution, estimated from $n$ i.i.d. samples, to design a privacy mechanism which is applied to new fresh samples afterward. In this paper, we study the discrepancy between the privacy-utility guarantees for the empirical distribution, used to design the privacy me… ▽ More

    Submitted 19 March, 2020; v1 submitted 14 November, 2018; originally announced November 2018.

  49. arXiv:1809.09231  [pdf, other

    cs.IT

    Tunable Measures for Information Leakage and Applications to Privacy-Utility Tradeoffs

    Authors: Jiachun Liao, Oliver Kosut, Lalitha Sankar, Flavio du Pin Calmon

    Abstract: We introduce a tunable measure for information leakage called maximal alpha-leakage. This measure quantifies the maximal gain of an adversary in inferring any (potentially random) function of a dataset from a release of the data. The inferential capability of the adversary is, in turn, quantified by a class of adversarial loss functions that we introduce as $α$-loss, $α\in[1,\infty]$. The choice o… ▽ More

    Submitted 19 August, 2019; v1 submitted 24 September, 2018; originally announced September 2018.

    Comments: This paper has been accepted by IEEE Transaction of Information Theory

  50. arXiv:1807.05306  [pdf, other

    cs.LG cs.CR cs.GT cs.IT stat.ML

    Generative Adversarial Privacy

    Authors: Chong Huang, Peter Kairouz, Xiao Chen, Lalitha Sankar, Ram Rajagopal

    Abstract: We present a data-driven framework called generative adversarial privacy (GAP). Inspired by recent advancements in generative adversarial networks (GANs), GAP allows the data holder to learn the privatization mechanism directly from the data. Under GAP, finding the optimal privacy mechanism is formulated as a constrained minimax game between a privatizer and an adversary. We show that for appropri… ▽ More

    Submitted 26 June, 2019; v1 submitted 13 July, 2018; originally announced July 2018.

    Comments: Talk presentation at Privacy in Machine Learning and Artificial Intelligence (PiMLAI) Workshop, ICML 2018