Skip to main content

Showing 1–31 of 31 results for author: Syed, U

.
  1. arXiv:2405.01387  [pdf, ps, other

    math.OC

    Lexicographic Optimization: Algorithms and Stability

    Authors: Jacob Abernethy, Robert E. Schapire, Umar Syed

    Abstract: A lexicographic maximum of a set $X \subseteq \mathbb{R}^n$ is a vector in $X$ whose smallest component is as large as possible, and subject to that requirement, whose second smallest component is as large as possible, and so on for the third smallest component, etc. Lexicographic maximization has numerous practical and theoretical applications, including fair resource allocation, analyzing the im… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

  2. arXiv:2404.03647  [pdf, other

    math.OC cs.AI cs.LG

    Capabilities of Large Language Models in Control Engineering: A Benchmark Study on GPT-4, Claude 3 Opus, and Gemini 1.0 Ultra

    Authors: Darioush Kevian, Usman Syed, Xingang Guo, Aaron Havens, Geir Dullerud, Peter Seiler, Lianhui Qin, Bin Hu

    Abstract: In this paper, we explore the capabilities of state-of-the-art large language models (LLMs) such as GPT-4, Claude 3 Opus, and Gemini 1.0 Ultra in solving undergraduate-level control problems. Controls provides an interesting case study for LLM reasoning due to its combination of mathematical theory and engineering design. We introduce ControlBench, a benchmark dataset tailored to reflect the bread… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

  3. arXiv:2403.15607  [pdf, other

    cs.CR cs.CY

    Assessing Web Fingerprinting Risk

    Authors: Enrico Bacis, Igor Bilogrevic, Robert Busa-Fekete, Asanka Herath, Antonio Sartori, Umar Syed

    Abstract: Modern Web APIs allow developers to provide extensively customized experiences for website visitors, but the richness of the device information they provide also make them vulnerable to being abused to construct browser fingerprints, device-specific identifiers that enable covert tracking of users even when cookies are disabled. Previous research has established entropy, a measure of information… ▽ More

    Submitted 22 March, 2024; originally announced March 2024.

    Comments: A version of this report to appear in the proceedings of The Web Conference (WWW) 2024. This version contains additional material in the appendix

  4. arXiv:2307.05608  [pdf, other

    cs.CR

    DP-Auditorium: a Large Scale Library for Auditing Differential Privacy

    Authors: William Kong, Andrés Muñoz Medina, Mónica Ribero, Umar Syed

    Abstract: New regulations and increased awareness of data privacy have led to the deployment of new and more efficient differentially private mechanisms across public institutions and industries. Ensuring the correctness of these mechanisms is therefore crucial to ensure the proper protection of data. However, since differential privacy is a property of the mechanism itself, and not of an individual output,… ▽ More

    Submitted 18 December, 2023; v1 submitted 10 July, 2023; originally announced July 2023.

  5. arXiv:2306.01684  [pdf, other

    cs.LG cs.CR

    Harnessing large-language models to generate private synthetic text

    Authors: Alexey Kurakin, Natalia Ponomareva, Umar Syed, Liam MacDermed, Andreas Terzis

    Abstract: Differentially private training algorithms like DP-SGD protect sensitive training data by ensuring that trained models do not reveal private information. An alternative approach, which this paper studies, is to use a sensitive dataset to generate synthetic data that is differentially private with respect to the original data, and then non-privately training a model on the synthetic data. Doing so… ▽ More

    Submitted 10 January, 2024; v1 submitted 2 June, 2023; originally announced June 2023.

    Comments: 31 pages; 7 figures; compared to previous version added result of LoRa-finetuning

  6. arXiv:2305.18585  [pdf, other

    cs.CL cs.AI

    Exploiting Explainability to Design Adversarial Attacks and Evaluate Attack Resilience in Hate-Speech Detection Models

    Authors: Pranath Reddy Kumbam, Sohaib Uddin Syed, Prashanth Thamminedi, Suhas Harish, Ian Perera, Bonnie J. Dorr

    Abstract: The advent of social media has given rise to numerous ethical challenges, with hate speech among the most significant concerns. Researchers are attempting to tackle this problem by leveraging hate-speech detection and employing language models to automatically moderate content and promote civil discourse. Unfortunately, recent studies have revealed that hate-speech detection systems can be misled… ▽ More

    Submitted 29 May, 2023; originally announced May 2023.

  7. arXiv:2305.07751  [pdf, other

    cs.LG cs.CR cs.IT math.ST

    Private and Communication-Efficient Algorithms for Entropy Estimation

    Authors: Gecia Bravo-Hermsdorff, Róbert Busa-Fekete, Mohammad Ghavamzadeh, Andres Muñoz Medina, Umar Syed

    Abstract: Modern statistical estimation is often performed in a distributed setting where each sample belongs to a single user who shares their data with a central server. Users are typically concerned with preserving the privacy of their samples, and also with minimizing the amount of data they must transmit to the server. We give improved private and communication-efficient algorithms for estimating sever… ▽ More

    Submitted 12 May, 2023; originally announced May 2023.

    Comments: Originally published at the 36th Conference on Neural Information Processing Systems (NeurIPS 2022). This version corrects some errors in the original version

  8. arXiv:2303.00937  [pdf, ps, other

    math.OC

    Bounds for the Tracking Error and Dynamic Regret of Inexact Online Optimization Methods: A General Analysis via Sequential Semidefinite Programs

    Authors: Usman Syed, Emiliano Dall'Anese, Bin Hu

    Abstract: In this paper, we develop a unified framework for analyzing the tracking error and dynamic regret of inexact online optimization methods under a variety of settings. Specifically, we leverage the quadratic constraint approach from control theory to formulate sequential semidefinite programs (SDPs) whose feasible points naturally correspond to tracking error bounds of various inexact online optimiz… ▽ More

    Submitted 1 March, 2023; originally announced March 2023.

  9. arXiv:2201.12306  [pdf, other

    cs.DS cs.CR cs.CY cs.DB stat.CO

    Statistical anonymity: Quantifying reidentification risks without reidentifying users

    Authors: Gecia Bravo-Hermsdorff, Robert Busa-Fekete, Lee M. Gunderson, Andrés Munõz Medina, Umar Syed

    Abstract: Data anonymization is an approach to privacy-preserving data release aimed at preventing participants reidentification, and it is an important alternative to differential privacy in applications that cannot tolerate noisy data. Existing algorithms for enforcing $k$-anonymity in the released data assume that the curator performing the anonymization has complete access to the original data. Reasons… ▽ More

    Submitted 28 January, 2022; originally announced January 2022.

  10. arXiv:2110.02159  [pdf, other

    cs.LG cs.CR cs.DS cs.IT

    Label differential privacy via clustering

    Authors: Hossein Esfandiari, Vahab Mirrokni, Umar Syed, Sergei Vassilvitskii

    Abstract: We present new mechanisms for \emph{label differential privacy}, a relaxation of differentially private machine learning that only protects the privacy of the labels in the training set. Our mechanisms cluster the examples in the training set using their (non-private) feature vectors, randomly re-sample each label from examples in the same cluster, and output a training set with noisy labels as we… ▽ More

    Submitted 5 October, 2021; originally announced October 2021.

  11. arXiv:2007.01181  [pdf, other

    cs.LG cs.CR stat.ML

    Private Optimization Without Constraint Violations

    Authors: Andrés Muñoz Medina, Umar Syed, Sergei Vassilvitskii, Ellen Vitercik

    Abstract: We study the problem of differentially private optimization with linear constraints when the right-hand-side of the constraints depends on private data. This type of problem appears in many applications, especially resource allocation. Previous research provided solutions that retained privacy but sometimes violated the constraints. In many settings, however, the constraints cannot be violated und… ▽ More

    Submitted 3 November, 2020; v1 submitted 2 July, 2020; originally announced July 2020.

  12. arXiv:1911.03727  [pdf

    cond-mat.mtrl-sci physics.app-ph physics.chem-ph

    Pulsed laser deposition of single phase n- and p-type Cu2O thin films with low resistivity

    Authors: Syed Farid Uddin Farhad, David Cherns, James Smith, Neil Fox, David Fermín

    Abstract: Low resistivity (~3-24 mOhm.cm) with tunable n- and p-type phase pure Cu2O thin films have been grown by pulsed laser deposition at 25-200 0C by varying the background oxygen partial pressure (O2pp). Capacitance data obtained by electrochemical impedance spectroscopy was used to determine the conductivity (n- or p-type), carrier density, and flat band potentials for samples grown on indium tin oxi… ▽ More

    Submitted 29 May, 2020; v1 submitted 9 November, 2019; originally announced November 2019.

    Comments: 41 pages(including suppl. material), 7 figures (14 suppl. figures)

  13. arXiv:1906.06781  [pdf, ps, other

    cs.LG math.OC stat.ML

    Characterizing the Exact Behaviors of Temporal Difference Learning Algorithms Using Markov Jump Linear System Theory

    Authors: Bin Hu, Usman Ahmed Syed

    Abstract: In this paper, we provide a unified analysis of temporal difference learning algorithms with linear function approximators by exploiting their connections to Markov jump linear systems (MJLS). We tailor the MJLS theory developed in the control community to characterize the exact behaviors of the first and second order moments of a large family of temporal difference learning algorithms. For both t… ▽ More

    Submitted 4 November, 2019; v1 submitted 16 June, 2019; originally announced June 2019.

    Comments: To appear in NeurIPS 2019

  14. Quasicontinuum $γ$-decay of $^{91,92}$Zr: benchmarking indirect ($n,γ$) cross section measurements for the $s$-process

    Authors: M. Guttormsen, S. Goriely, A. C. Larsen, A. Görgen, T. W. Hagen, T. Renstrøm, S. Siem, N. U. H. Syed, G. Tagliente, H. K. Toft, H. Utsunomiya, A. V. Voinov, K. Wikan

    Abstract: Nuclear level densities (NLDs) and $γ$-ray strength functions ($γ$SFs) have been extracted from particle-$γ$ coincidences of the $^{92}$Zr($p,p' γ$)$^{92}$Zr and $^{92}$Zr($p,d γ$)$^{91}$Zr reactions using the Oslo method. The new $^{91,92}$Zr $γ$SF data, combined with photonuclear cross sections, cover the whole energy range from $E_γ \approx 1.5$~MeV up to the giant dipole resonance at… ▽ More

    Submitted 16 June, 2017; originally announced June 2017.

    Comments: 10 pages and 9 figures

    Journal ref: Phys. Rev. C 96, 024313 (2017)

  15. arXiv:1703.03111  [pdf, other

    cs.GT cs.LG

    Statistical Cost Sharing

    Authors: Eric Balkanski, Umar Syed, Sergei Vassilvitskii

    Abstract: We study the cost sharing problem for cooperative games in situations where the cost function $C$ is not available via oracle queries, but must instead be derived from data, represented as tuples $(S, C(S))$, for different subsets $S$ of players. We formalize this approach, which we call statistical cost sharing, and consider the computation of the core and the Shapley value, when the tuples are d… ▽ More

    Submitted 8 March, 2017; originally announced March 2017.

  16. arXiv:1504.01117  [pdf, ps, other

    cs.DB

    An $\tilde{O}(\frac{1}{\sqrt{T}})$-error online algorithm for retrieving heavily perturbated statistical databases in the low-dimensional querying mode

    Authors: Krzysztof Choromanski, Afshin Rostamizadeh, Umar Syed

    Abstract: We give the first $\tilde{O}(\frac{1}{\sqrt{T}})$-error online algorithm for reconstructing noisy statistical databases, where $T$ is the number of (online) sample queries received. The algorithm, which requires only $O(\log T)$ memory, aims to learn a hidden database-vector $w^{*} \in \mathbb{R}^{D}$ in order to accurately answer a stream of queries regarding the hidden database, which arrive in… ▽ More

    Submitted 5 April, 2015; originally announced April 2015.

  17. arXiv:1407.8320  [pdf

    cs.SE

    An Implementation of Web Services for Inter-Connectivity of Information Systems

    Authors: Aftab Ahmed Chandio, Dingju Zhu, Ali Hassan Sodhro, Muhammad Umer Syed

    Abstract: As educational institutions and their departments rapidly increase, a communication between their end-users becomes more and more difficult in traditional online management systems (OMS). However, the end-users, i.e., employees, teaching staff, and students are associated to different sub-domains and using different subsystems that are executed on different platforms following different administra… ▽ More

    Submitted 31 July, 2014; originally announced July 2014.

    Comments: 7 pages, 5 figures, (Accepted for the Int. J. Com. Dig. Sys. Vol. 3, No. 3, ISSN. 2210-142X)

    Journal ref: International Journal of Computing and Digital Systems (IJCDS), Vol. 3, No. 3, pp. (2014)

  18. arXiv:1407.1466  [pdf

    cs.CY

    The Smart Shower

    Authors: Umair Atique Syed, Uma Kandan Muniandy

    Abstract: The smart shower is an intelligent device that saves the water during the shower. It uses the indicator lamps that inform the user of the amount of the water. Like the traffic signal it has three sets of lamps, green, yellow and red, each indicating the amount of time spent. This device brain is the Siemens Logo PLC.

    Submitted 6 July, 2014; originally announced July 2014.

    Comments: 2 Pages, 3 Figures

  19. arXiv:1311.6838  [pdf, ps, other

    cs.LG cs.GT

    Learning Prices for Repeated Auctions with Strategic Buyers

    Authors: Kareem Amin, Afshin Rostamizadeh, Umar Syed

    Abstract: Inspired by real-time ad exchanges for online display advertising, we consider the problem of inferring a buyer's value distribution for a good when the buyer is repeatedly interacting with a seller through a posted-price mechanism. We model the buyer as a strategic agent, whose goal is to maximize her long-term surplus, and we are interested in mechanisms that maximize the seller's long-term reve… ▽ More

    Submitted 26 November, 2013; originally announced November 2013.

    Comments: Neural Information Processing Systems (NIPS 2013)

  20. Nuclear Level Density and Gamma-Ray Strength Function of 43Sc

    Authors: A. Bürger, A. C. Larsen, S. Hilaire, M. Guttormsen, S. Harissopulos, M. Kmiecik, T. Konstantinopoulos, M. Krticka, A. Lagoyannis, T. Lönnroth, K. Mazurek, M. Norrby, H. T. Nyhus, G. Perdikakis, S. Siem, A. Spyrou, N. U. H. Syed

    Abstract: The nuclear level density and the gamma-ray strength function have been determined for 43Sc in the energy range up to 2 MeV below the neutron separation energy using the Oslo method with the 46Ti(p,alpha)43Sc reaction. A comparison to 45Sc shows that the level density of 43Sc is smaller by an approximately constant factor of two. This behaviour is well reproduced in a microscopical/combinatorial m… ▽ More

    Submitted 5 October, 2012; originally announced October 2012.

    Comments: 5 pages, 4 figures

    Journal ref: Physical Review C 85, 064328 (2012)

  21. Primary gamma-ray spectra in 44Ti of astrophysical interest

    Authors: A. C. Larsen, S. Goriely, A. Bürger, M. Guttormsen, A. Görgen, S. Harrisopulos, M. Kmiecik, T. Konstantinopoulos, A. Lagoyannis, T. Lönnroth, K. Mazurek, M. Norrby, H. T. Nyhus, G. Perdikakis, A. Schiller, S. Siem, A. Spyrou, N. U. H. Syed, H. K. Toft, G. M. Tveten, A. Voinov

    Abstract: Primary gamma-ray spectra for a wide excitation-energy range have been extracted for 44Ti from particle-gamma coincidence data of the 46Ti(p,t gamma)44Ti reaction. These spectra reveal information on the gamma-decay pattern of the nucleus, and may be used to extract the level density and radiative strength function applying the Oslo method. Models of the level density and radiative strength func… ▽ More

    Submitted 5 October, 2012; originally announced October 2012.

    Comments: 14 pages, 13 figures

    Journal ref: Physical Review C 85, 014320 (2012)

  22. arXiv:1206.5290  [pdf

    cs.LG cs.AI stat.ML

    Imitation Learning with a Value-Based Prior

    Authors: Umar Syed, Robert E. Schapire

    Abstract: The goal of imitation learning is for an apprentice to learn how to behave in a stochastic environment by observing a mentor demonstrating the correct behavior. Accurate prior knowledge about the correct behavior can reduce the need for demonstrations from the mentor. We present a novel approach to encoding prior knowledge about the correct behavior, where we assume that this prior knowledge takes… ▽ More

    Submitted 20 June, 2012; originally announced June 2012.

    Comments: Appears in Proceedings of the Twenty-Third Conference on Uncertainty in Artificial Intelligence (UAI2007)

    Report number: UAI-P-2007-PG-384-391

  23. arXiv:1202.3782  [pdf

    cs.LG cs.AI stat.ML

    Graphical Models for Bandit Problems

    Authors: Kareem Amin, Michael Kearns, Umar Syed

    Abstract: We introduce a rich class of graphical models for multi-armed bandit problems that permit both the state or context space and the action space to be very large, yet succinctly specify the payoffs for any context-action pair. Our main result is an algorithm for such models whose regret is bounded by the number of parameters and whose running time depends only on the treewidth of the graph substruct… ▽ More

    Submitted 14 February, 2012; originally announced February 2012.

    Report number: UAI-P-2011-PG-1-10

  24. Fermi's golden rule applied to the gamma decay in the quasicontinuum of 46Ti

    Authors: M. Guttormsen, A. C. Larsen, A. Buerger, A. Goergen, S. Harissopulos, M. Kmiecik, T. Konstantinopoulos, M. Krticka, A. Lagoyannis, T. Loennroth, K. Mazurek, M. Norrby, H. T. Nyhus, G. Perdikakis A. Schiller, S. Siem, A. Spyrou, N. U. H. Syed, H. K. Toft, G. M. Tveten, A. Voinov

    Abstract: Particle-gamma coincidences from the 46Ti(p,p' gamma)46Ti inelastic scattering reaction with 15-MeV protons are utilized to obtain gamma-ray spectra as a function of excitation energy. The rich data set allows analyzing the coincidence data with various gates on excitation energy. This enables, for many independent data sets, a simultaneous extraction of level density and radiative strength functi… ▽ More

    Submitted 20 January, 2011; v1 submitted 17 September, 2010; originally announced September 2010.

    Comments: 11 pages and 12 figures

    Journal ref: Phys.Rev.C83:014312,2011

  25. arXiv:1007.3799  [pdf, ps, other

    cs.LG

    Adapting to the Shifting Intent of Search Queries

    Authors: Umar Syed, Aleksandrs Slivkins, Nina Mishra

    Abstract: Search engines today present results that are often oblivious to abrupt shifts in intent. For example, the query `independence day' usually refers to a US holiday, but the intent of this query abruptly changed during the release of a major film by that name. While no studies exactly quantify the magnitude of intent-shifting traffic, studies suggest that news events, seasonal topics, pop culture, e… ▽ More

    Submitted 22 July, 2010; originally announced July 2010.

    Comments: This is the full version of the paper in NIPS'09

  26. Level densities and $γ$-ray strength functions in Sn isotopes

    Authors: H. K. Toft, A. C. Larsen, U. Agvaanluvsan, A. Bürger, M. Guttormsen, G. E. Mitchell, H. T. Nyhus, A. Schiller, S. Siem, N. U. H. Syed, A. Voinov

    Abstract: The nuclear level densities of $^{118,119}$Sn and the $γ$-ray strength functions of $^{116,118,119}$Sn below the neutron separation energy are extracted with the Oslo method using the ($^3$He, \,$αγ$) and ($^3$He,$^3$He$^\primeγ$) reactions. The level density function of $^{119}$Sn displays step-like structures. The microcanonical entropies are deduced from the level densities, and the single neut… ▽ More

    Submitted 24 June, 2010; originally announced June 2010.

    Journal ref: Phys.Rev.C81:064311,2010

  27. Radiative strength functions in 163,164Dy

    Authors: H. T. Nyhus, S. Siem, M. Guttormsen, A. C. Larsen, A. Bürger, N. U. H. Syed, G. M. Tveten, A. Voinov

    Abstract: The nuclei 163,164Dy have been investigated using the Oslo method on data from the pick-up reaction 164Dy(3He,alpha gamma)163Dy and the inelastic scattering 164Dy(3He,3He' gamma)164Dy, respectively. The radiative strength functions for both nuclei have been extracted, and a small resonance centered around Eg ?3 MeV is observed in both cases. The parameters of this so-called pygmy M1 resonance (the… ▽ More

    Submitted 25 June, 2010; v1 submitted 24 June, 2010; originally announced June 2010.

    Journal ref: Phys.Rev.C81:024325,2010; Erratum-ibid.C82:029909,2010

  28. Extraction of thermal and electromagnetic properties in 45Ti

    Authors: N. U. H. Syed, A. C. Larsen, A. B. Bürger, M. Guttormsen, S. Harissopulos, M. Kmiecik, T. Konstantinopoulos, M. Krtička, A. Lagovannis, T. Lönnroth, K. Mazurek, M. Norby, H. T. Nyhus, G. Perdikakis, S. Siem, A. Spyrou

    Abstract: The level density and gamma-ray strength function of 45Ti have been determined by use of the Oslo method. The particle-gamma coincidences from the 46Ti(p,d gamma)45Ti pick-up reaction with 32 MeV protons are utilized to obtain gamma-ray spectra as function of excitation energy. The extracted level density and strength function are compared with models, which are found to describe these quantitie… ▽ More

    Submitted 8 September, 2009; originally announced September 2009.

    Journal ref: Phys.Rev.C80:044309,2009

  29. Statistical structure and $γ$-decay properties of closed shell Pb nuclei

    Authors: N. U. H. Syed, M. Guttormsen, F. Ingebretsen, A. C. Larsen, T. Lönnroth, J. Rekstad, A. Schiller, S. Siem, A. Voinov

    Abstract: The level densities and gamma-ray strength functions of 205-208Pb have been measured with the Oslo method, utilizing the (3He, 3He' gamma) and (3He,alpha gamma) reactions on the target nuclei 206Pb and 208Pb. The extracted level densities are consistent with known discrete levels at low excitation energies. The entropies and temperatures in the micro-canonical ensemble have been deduced from the… ▽ More

    Submitted 6 September, 2009; v1 submitted 17 September, 2008; originally announced September 2008.

    Journal ref: Phys. Rev. C 79, 024316 (2009)

  30. Nuclear level densities and gamma-ray strength functions in 44,45Sc

    Authors: A. C. Larsen, M. Guttormsen, R. Chankova, T. Loennroth, S. Messelt, F. Ingebretsen, J. Rekstad, A. Schiller, S. Siem, N. U. H. Syed, A. Voinov

    Abstract: The scandium isotopes 44,45Sc have been studied with the 45Sc(3He,alpha gamma)44Sc and 45Sc(3He,3He' gamma)45Sc reactions, respectively. The nuclear level densities and gamma-ray strength functions have been extracted using the Oslo method. The experimental level densities are compared to calculated level densities obtained from a microscopic model based on BCS quasiparticles within the Nilsson… ▽ More

    Submitted 22 January, 2008; v1 submitted 4 June, 2007; originally announced June 2007.

    Comments: 21 pages, 13 figures. Published version

    Journal ref: Phys.Rev.C76:044303,2007

  31. Microcanonical entropies and radiative strength functions of $^{50,51}$V

    Authors: A. C. Larsen, R. Chankova, M. Guttormsen, F. Ingebretsen, T. Lönnroth, S. Messelt, J. Rekstad, A. Schiller, S. Siem, N. U. H. Syed, A. Voinov, S. W. Ødegård

    Abstract: The level densities and radiative strength functions (RSFs) of $^{50,51}$V have been extracted using the ($^3$He,$αγ$) and ($^3$He,$^3$He$^{\prime} γ$) reactions, respectively. From the level densities, microcanonical entropies are deduced. The high $γ$-energy part of the RSF is described by the giant electric dipole resonance. A significant enhancement over the predicted strength in the region… ▽ More

    Submitted 19 June, 2006; v1 submitted 30 November, 2005; originally announced November 2005.

    Comments: 16 pages including 9 figures

    Journal ref: Phys. Rev. C 73, 064301 (2006)