Skip to main content

Showing 1–50 of 100 results for author: Viswanath, P

.
  1. arXiv:2406.13794  [pdf, other

    eess.SY cs.CE q-fin.TR

    Adaptive Curves for Optimally Efficient Market Making

    Authors: Viraj Nadkarni, Sanjeev Kulkarni, Pramod Viswanath

    Abstract: Automated Market Makers (AMMs) are essential in Decentralized Finance (DeFi) as they match liquidity supply with demand. They function through liquidity providers (LPs) who deposit assets into liquidity pools. However, the asset trading prices in these pools often trail behind those in more dynamic, centralized exchanges, leading to potential arbitrage losses for LPs. This issue is tackled by adap… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

  2. arXiv:2405.01459  [pdf, other

    cs.CR

    Unconditionally Safe Light Client

    Authors: Niusha Moshrefi, Peiyao Sheng, Soubhik Deb, Sreeram Kannan, Pramod Viswanath

    Abstract: Blockchain applications often rely on lightweight clients to access and verify on-chain data efficiently without the need to run a resource-intensive full node. These light clients must maintain robust security to protect the blockchain's integrity for users of applications built upon it, achieving this with minimal resources and without significant latency. Moreover, different applications have v… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

  3. arXiv:2403.13230  [pdf, other

    cs.NI

    BFT-PoLoc: A Byzantine Fortified Trigonometric Proof of Location Protocol using Internet Delays

    Authors: Peiyao Sheng, Vishal Sevani, Ranvir Rana, Himanshu Tyagi, Pramod Viswanath

    Abstract: Internet platforms depend on accurately determining the geographical locations of online users to deliver targeted services (e.g., advertising). The advent of decentralized platforms (blockchains) emphasizes the importance of geographically distributed nodes, making the validation of locations more crucial. In these decentralized settings, mutually non-trusting participants need to {\em prove} the… ▽ More

    Submitted 28 March, 2024; v1 submitted 19 March, 2024; originally announced March 2024.

  4. arXiv:2402.08864  [pdf, other

    cs.IT cs.LG

    DeepPolar: Inventing Nonlinear Large-Kernel Polar Codes via Deep Learning

    Authors: S Ashwin Hebbar, Sravan Kumar Ankireddy, Hyeji Kim, Sewoong Oh, Pramod Viswanath

    Abstract: Progress in designing channel codes has been driven by human ingenuity and, fittingly, has been sporadic. Polar codes, developed on the foundation of Arikan's polarization kernel, represent the latest breakthrough in coding theory and have emerged as the state-of-the-art error-correction code for short-to-medium block length regimes. In an effort to automate the invention of good channel codes, es… ▽ More

    Submitted 4 June, 2024; v1 submitted 13 February, 2024; originally announced February 2024.

    Comments: 22 pages, 24 figures

  5. arXiv:2402.07241  [pdf, other

    cs.CR

    Proof of Diligence: Cryptoeconomic Security for Rollups

    Authors: Peiyao Sheng, Ranvir Rana, Himanshu Tyagi, Pramod Viswanath

    Abstract: Layer 1 (L1) blockchains such as Ethereum are secured under an "honest supermajority of stake" assumption for a large pool of validators who verify each and every transaction on it. This high security comes at a scalability cost which not only effects the throughput of the blockchain but also results in high gas fees for executing transactions on chain. The most successful solution for this proble… ▽ More

    Submitted 11 February, 2024; originally announced February 2024.

  6. arXiv:2310.09413  [pdf, other

    cs.LG cs.GT

    ZeroSwap: Data-driven Optimal Market Making in DeFi

    Authors: Viraj Nadkarni, Jiachen Hu, Ranvir Rana, Chi **, Sanjeev Kulkarni, Pramod Viswanath

    Abstract: Automated Market Makers (AMMs) are major centers of matching liquidity supply and demand in Decentralized Finance. Their functioning relies primarily on the presence of liquidity providers (LPs) incentivized to invest their assets into a liquidity pool. However, the prices at which a pooled asset is traded is often more stale than the prices on centralized and more liquid exchanges. This leads to… ▽ More

    Submitted 29 April, 2024; v1 submitted 13 October, 2023; originally announced October 2023.

  7. arXiv:2307.16562  [pdf, other

    cs.CR

    SAKSHI: Decentralized AI Platforms

    Authors: Suma Bhat, Canhui Chen, Zerui Cheng, Zhixuan Fang, Ashwin Hebbar, Sreeram Kannan, Ranvir Rana, Peiyao Sheng, Himanshu Tyagi, Pramod Viswanath, Xuechao Wang

    Abstract: Large AI models (e.g., Dall-E, GPT4) have electrified the scientific, technological and societal landscape through their superhuman capabilities. These services are offered largely in a traditional web2.0 format (e.g., OpenAI's GPT4 service). As more large AI models proliferate (personalizing and specializing to a variety of domains), there is a tremendous need to have a neutral trust-free platfor… ▽ More

    Submitted 31 July, 2023; originally announced July 2023.

    Comments: 23 pages, 9 figures

  8. arXiv:2305.09123  [pdf, other

    cs.DC cs.CR

    CFT-Forensics: High-Performance Byzantine Accountability for Crash Fault Tolerant Protocols

    Authors: Weizhao Tang, Peiyao Sheng, Ronghao Ni, Pronoy Roy, Xuechao Wang, Giulia Fanti, Pramod Viswanath

    Abstract: Crash fault tolerant (CFT) consensus algorithms are commonly used in scenarios where system components are trusted -- e.g., enterprise settings and government infrastructure. However, CFT consensus can be broken by even a single corrupt node. A desirable property in the face of such potential Byzantine faults is \emph{accountability}: if a corrupt node breaks protocol and affects consensus safety,… ▽ More

    Submitted 3 June, 2024; v1 submitted 15 May, 2023; originally announced May 2023.

  9. arXiv:2302.10170  [pdf, other

    cs.IT

    Compressed Error HARQ: Feedback Communication on Noise-Asymmetric Channels

    Authors: Sravan Kumar Ankireddy, S. Ashwin Hebbar, Yihan Jiang, Hyeji Kim, Pramod Viswanath

    Abstract: In modern communication systems with feedback, there are increasingly more scenarios where the transmitter has much less power than the receiver (e.g., medical implant devices), which we refer to as noise-asymmetric channels. For such channels, the feedback link is of higher quality than the forward link. However, feedback schemes for cellular communications, such as hybrid ARQ, do not fully utili… ▽ More

    Submitted 20 February, 2023; originally announced February 2023.

  10. arXiv:2301.06251  [pdf, other

    cs.IT cs.AI cs.LG

    Machine Learning-Aided Efficient Decoding of Reed-Muller Subcodes

    Authors: Mohammad Vahid Jamali, Xiyang Liu, Ashok Vardhan Makkuva, Hessam Mahdavifar, Sewoong Oh, Pramod Viswanath

    Abstract: Reed-Muller (RM) codes achieve the capacity of general binary-input memoryless symmetric channels and are conjectured to have a comparable performance to that of random codes in terms of scaling laws. However, such results are established assuming maximum-likelihood decoders for general code parameters. Also, RM codes only admit limited sets of rates. Efficient decoders such as successive cancella… ▽ More

    Submitted 31 July, 2023; v1 submitted 15 January, 2023; originally announced January 2023.

    Comments: Accepted for publication in the Journal on Selected Areas in Information Theory. arXiv admin note: substantial text overlap with arXiv:2102.01671

  11. arXiv:2210.11571  [pdf, other

    cs.CR

    TrustBoost: Boosting Trust among Interoperable Blockchains

    Authors: Peiyao Sheng, Xuechao Wang, Sreeram Kannan, Kartik Nayak, Pramod Viswanath

    Abstract: Currently there exist many blockchains with weak trust guarantees, limiting applications and participation. Existing solutions to boost the trust using a stronger blockchain, e.g., via checkpointing, requires the weaker blockchain to give up sovereignty. In this paper, we propose a family of protocols in which multiple blockchains interact to create a combined ledger with boosted trust. We show th… ▽ More

    Submitted 20 September, 2023; v1 submitted 20 October, 2022; originally announced October 2022.

    Comments: Forthcoming in ACM Conference on Computer and Communications Security (CCS) 2023

  12. arXiv:2210.11546  [pdf, other

    cs.CR cs.NI

    Proof of Backhaul: Trustfree Measurement of Broadband Bandwidth

    Authors: Peiyao Sheng, Nikita Yadav, Vishal Sevani, Arun Babu, SVR Anand, Himanshu Tyagi, Pramod Viswanath

    Abstract: Recent years have seen the emergence of decentralized wireless networks consisting of nodes hosted by many individuals and small enterprises, reawakening the decades-old dream of open networking. These networks have been deployed in an organic, distributed manner and are driven by new economic models resting on tokenized incentives. A critical requirement for the incentives to scale is the ability… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

  13. arXiv:2210.00313  [pdf, other

    cs.IT cs.AI cs.LG

    CRISP: Curriculum based Sequential Neural Decoders for Polar Code Family

    Authors: S Ashwin Hebbar, Viraj Nadkarni, Ashok Vardhan Makkuva, Suma Bhat, Sewoong Oh, Pramod Viswanath

    Abstract: Polar codes are widely used state-of-the-art codes for reliable communication that have recently been included in the 5th generation wireless standards (5G). However, there remains room for the design of polar decoders that are both efficient and reliable in the short blocklength regime. Motivated by recent successes of data-driven channel decoders, we introduce a novel $\textbf{C}$ur… ▽ More

    Submitted 29 May, 2023; v1 submitted 1 October, 2022; originally announced October 2022.

    Comments: 23 pages, 23 figures. ICML 2023

  14. TinyTurbo: Efficient Turbo Decoders on Edge

    Authors: S Ashwin Hebbar, Rajesh K Mishra, Sravan Kumar Ankireddy, Ashok V Makkuva, Hyeji Kim, Pramod Viswanath

    Abstract: In this paper, we introduce a neural-augmented decoder for Turbo codes called TINYTURBO . TINYTURBO has complexity comparable to the classical max-log-MAP algorithm but has much better reliability than the max-log-MAP baseline and performs close to the MAP algorithm. We show that TINYTURBO exhibits strong robustness on a variety of practical channels of interest, such as EPA and EVA channels, whic… ▽ More

    Submitted 30 September, 2022; originally announced September 2022.

    Comments: 10 pages, 6 figures. Published at the 2022 IEEE International Symposium on Information Theory (ISIT)

    Journal ref: "TinyTurbo: Efficient Turbo Decoders on Edge," 2022 IEEE International Symposium on Information Theory (ISIT), 2022, pp. 2797-2802

  15. Optimal Bootstrap** of PoW Blockchains

    Authors: Ranvir Rana, Dimitris Karakostas, Sreeram Kannan, Aggelos Kiayias, Pramod Viswanath

    Abstract: Proof of Work (PoW) blockchains are susceptible to adversarial majority mining attacks in the early stages due to incipient participation and corresponding low net hash power. Bootstrap** ensures safety and liveness during the transient stage by protecting against a majority mining attack, allowing a PoW chain to grow the participation base and corresponding mining hash power. Liveness is especi… ▽ More

    Submitted 22 August, 2022; originally announced August 2022.

  16. Minotaur: Multi-Resource Blockchain Consensus

    Authors: Matthias Fitzi, Xuechao Wang, Sreeram Kannan, Aggelos Kiayias, Nikos Leonardos, Pramod Viswanath, Gerui Wang

    Abstract: Resource-based consensus is the backbone of permissionless distributed ledger systems. The security of such protocols relies fundamentally on the level of resources actively engaged in the system. The variety of different resources (and related proof protocols, some times referred to as PoX in the literature) raises the fundamental question whether it is possible to utilize many of them in tandem… ▽ More

    Submitted 7 September, 2022; v1 submitted 27 January, 2022; originally announced January 2022.

    Comments: To appear in ACM CCS 2022

  17. arXiv:2108.12920  [pdf, other

    cs.IT cs.AI

    KO codes: Inventing Nonlinear Encoding and Decoding for Reliable Wireless Communication via Deep-learning

    Authors: Ashok Vardhan Makkuva, Xiyang Liu, Mohammad Vahid Jamali, Hessam Mahdavifar, Sewoong Oh, Pramod Viswanath

    Abstract: Landmark codes underpin reliable physical layer communication, e.g., Reed-Muller, BCH, Convolution, Turbo, LDPC and Polar codes: each is a linear code and represents a mathematical breakthrough. The impact on humanity is huge: each of these codes has been used in global wireless communication standards (satellite, WiFi, cellular). Reliability of communication over the classical additive white Gaus… ▽ More

    Submitted 29 August, 2021; originally announced August 2021.

  18. arXiv:2105.02927  [pdf, other

    cs.CR

    Securing Parallel-chain Protocols under Variable Mining Power

    Authors: Xuechao Wang, Viswa Virinchi Muppirala, Lei Yang, Sreeram Kannan, Pramod Viswanath

    Abstract: Several emerging PoW blockchain protocols rely on a "parallel-chain" architecture for scaling, where instead of a single chain, multiple chains are run in parallel and aggregated. A key requirement of practical PoW blockchains is to adapt to mining power variations over time. In this paper, we consider the design of provably secure parallel-chain protocols which can adapt to such mining power vari… ▽ More

    Submitted 9 May, 2021; v1 submitted 6 May, 2021; originally announced May 2021.

    Comments: 26 pages, 18 figures. A shorter version of this paper will appear in the 2021 ACM Conference on Computer and Communications Security (CCS)

  19. arXiv:2102.01671  [pdf, ps, other

    cs.IT

    Reed-Muller Subcodes: Machine Learning-Aided Design of Efficient Soft Recursive Decoding

    Authors: Mohammad Vahid Jamali, Xiyang Liu, Ashok Vardhan Makkuva, Hessam Mahdavifar, Sewoong Oh, Pramod Viswanath

    Abstract: Reed-Muller (RM) codes are conjectured to achieve the capacity of any binary-input memoryless symmetric (BMS) channel, and are observed to have a comparable performance to that of random codes in terms of scaling laws. On the negative side, RM codes lack efficient decoders with performance close to that of a maximum likelihood decoder for general parameters. Also, they only admit certain discrete… ▽ More

    Submitted 2 February, 2021; originally announced February 2021.

  20. arXiv:2011.00102  [pdf, other

    cs.CR

    ACeD: Scalable Data Availability Oracle

    Authors: Peiyao Sheng, Bowen Xue, Sreeram Kannan, Pramod Viswanath

    Abstract: A popular method in practice offloads computation and storage in blockchains by relying on committing only hashes of off-chain data into the blockchain. This mechanism is acknowledged to be vulnerable to a stalling attack: the blocks corresponding to the committed hashes may be unavailable at any honest node. The straightforward solution of broadcasting all blocks to the entire network sidesteps t… ▽ More

    Submitted 3 March, 2021; v1 submitted 30 October, 2020; originally announced November 2020.

  21. arXiv:2010.13711  [pdf, other

    cs.CR

    Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality

    Authors: Suryanarayana Sankagiri, Xuechao Wang, Sreeram Kannan, Pramod Viswanath

    Abstract: Longest-chain blockchain protocols, such as Bitcoin, guarantee liveness even when the number of actively participating users is variable, i.e., they are adaptive. However, they are not safe under network partitions, i.e., they do not guarantee finality. On the other hand, classical blockchain protocols, like PBFT, achieve finality but not adaptivity. Indeed, the CAP theorem in the context of block… ▽ More

    Submitted 2 April, 2021; v1 submitted 26 October, 2020; originally announced October 2020.

    Comments: 40 pages, 9 figures. This is the full version of the paper with the same title, which appeared in Financial Cryptography, 2021

  22. BFT Protocol Forensics

    Authors: Peiyao Sheng, Gerui Wang, Kartik Nayak, Sreeram Kannan, Pramod Viswanath

    Abstract: Byzantine fault-tolerant (BFT) protocols allow a group of replicas to come to a consensus even when some of the replicas are Byzantine faulty. There exist multiple BFT protocols to securely tolerate an optimal number of faults $t$ under different network settings. However, if the number of faults $f$ exceeds $t$ then security could be violated. In this paper we mathematically formalize the study o… ▽ More

    Submitted 8 November, 2021; v1 submitted 13 October, 2020; originally announced October 2020.

  23. arXiv:2010.00761  [pdf, other

    cs.CL

    Enriching Word Embeddings with Temporal and Spatial Information

    Authors: Hongyu Gong, Suma Bhat, Pramod Viswanath

    Abstract: The meaning of a word is closely linked to sociocultural factors that can change over time and location, resulting in corresponding meaning changes. Taking a global view of words and their meanings in a widely used language, such as English, may require us to capture more refined semantics for use in time-specific or location-aware situations, such as the study of cultural trends or language use.… ▽ More

    Submitted 1 October, 2020; originally announced October 2020.

  24. arXiv:2008.07997  [pdf, other

    cs.IT stat.ML

    Deepcode and Modulo-SK are Designed for Different Settings

    Authors: Hyeji Kim, Yihan Jiang, Sreeram Kannan, Sewoong Oh, Pramod Viswanath

    Abstract: We respond to [1] which claimed that "Modulo-SK scheme outperforms Deepcode [2]". We demonstrate that this statement is not true: the two schemes are designed and evaluated for entirely different settings. DeepCode is designed and evaluated for the AWGN channel with (potentially delayed) uncoded output feedback. Modulo-SK is evaluated on the AWGN channel with coded feedback and unit delay. [1] als… ▽ More

    Submitted 18 August, 2020; originally announced August 2020.

  25. arXiv:2005.10484  [pdf, other

    cs.CR

    Everything is a Race and Nakamoto Always Wins

    Authors: Amir Dembo, Sreeram Kannan, Ertem Nusret Tas, David Tse, Pramod Viswanath, Xuechao Wang, Ofer Zeitouni

    Abstract: Nakamoto invented the longest chain protocol, and claimed its security by analyzing the private double-spend attack, a race between the adversary and the honest nodes to grow a longer chain. But is it the worst attack? We answer the question in the affirmative for three classes of longest chain protocols, designed for different consensus models: 1) Nakamoto's original Proof-of-Work protocol; 2) Ou… ▽ More

    Submitted 30 August, 2020; v1 submitted 21 May, 2020; originally announced May 2020.

    Comments: 27 pages, 12 figures. A shorter version of this paper will appear in the 2020 ACM Conference on Computer and Communications Security (CCS)

  26. arXiv:2005.09610  [pdf, other

    cs.CR cs.DC cs.GT cs.IT

    Free2Shard: Adaptive-adversary-resistant sharding via Dynamic Self Allocation

    Authors: Ranvir Rana, Sreeram Kannan, David Tse, Pramod Viswanath

    Abstract: Propelled by the growth of large-scale blockchain deployments, much recent progress has been made in designing sharding protocols that achieve throughput scaling linearly in the number of nodes. However, existing protocols are not robust to an adversary adaptively corrupting a fixed fraction of nodes. In this paper, we propose Free2Shard -- a new architecture that achieves near-linear scaling whil… ▽ More

    Submitted 19 May, 2020; originally announced May 2020.

  27. arXiv:2004.08776  [pdf, other

    cs.DC

    Prism Removes Consensus Bottleneck for Smart Contracts

    Authors: Gerui Wang, Shuo Wang, Vivek Bagaria, David Tse, Pramod Viswanath

    Abstract: The performance of existing permissionless smart contract platforms such as Ethereum is limited by the consensus layer. Prism is a new proof-of-work consensus protocol that provably achieves throughput and latency up to physical limits while retaining the strong guarantees of the longest chain protocol. This paper reports experimental results from implementations of two smart contract virtual mach… ▽ More

    Submitted 12 June, 2020; v1 submitted 19 April, 2020; originally announced April 2020.

  28. arXiv:1911.03038  [pdf, other

    cs.IT cs.LG eess.SP

    Turbo Autoencoder: Deep learning based channel codes for point-to-point communication channels

    Authors: Yihan Jiang, Hyeji Kim, Himanshu Asnani, Sreeram Kannan, Sewoong Oh, Pramod Viswanath

    Abstract: Designing codes that combat the noise in a communication medium has remained a significant area of research in information theory as well as wireless communications. Asymptotically optimal channel codes have been developed by mathematicians for communicating under canonical models after over 60 years of research. On the other hand, in many non-canonical channel settings, optimal codes do not exist… ▽ More

    Submitted 7 November, 2019; originally announced November 2019.

  29. arXiv:1910.02218  [pdf, other

    cs.CR

    Proof-of-Stake Longest Chain Protocols: Security vs Predictability

    Authors: Vivek Bagaria, Amir Dembo, Sreeram Kannan, Sewoong Oh, David Tse, Pramod Viswanath, Xuechao Wang, Ofer Zeitouni

    Abstract: The Nakamoto longest chain protocol is remarkably simple and has been proven to provide security against any adversary with less than 50% of the total hashing power. Proof-of-stake (PoS) protocols are an energy efficient alternative; however existing protocols adopting Nakamoto's longest chain design achieve provable security only by allowing long-term predictability (which have serious security i… ▽ More

    Submitted 22 February, 2020; v1 submitted 5 October, 2019; originally announced October 2019.

    Comments: 65 pages, 16 figures

  30. arXiv:1910.01247  [pdf, ps, other

    cs.CR cs.IT

    Coded Merkle Tree: Solving Data Availability Attacks in Blockchains

    Authors: Mingchao Yu, Saeid Sahraei, Songze Li, Salman Avestimehr, Sreeram Kannan, Pramod Viswanath

    Abstract: In this paper, we propose coded Merkle tree (CMT), a novel hash accumulator that offers a constant-cost protection against data availability attacks in blockchains, even if the majority of the network nodes are malicious. A CMT is constructed using a family of sparse erasure codes on each layer, and is recovered by iteratively applying a peeling-decoding technique that enables a compact proof for… ▽ More

    Submitted 20 December, 2019; v1 submitted 2 October, 2019; originally announced October 2019.

    Comments: To appear in Financial Cryptography and Data Security (FC) 2020

  31. arXiv:1909.11261  [pdf, other

    cs.DC cs.CR cs.NI

    Practical Low Latency Proof of Work Consensus

    Authors: Lei Yang, Xuechao Wang, Vivek Bagaria, Gerui Wang, Mohammad Alizadeh, David Tse, Giulia Fanti, Pramod Viswanath

    Abstract: Bitcoin is the first fully-decentralized permissionless blockchain protocol to achieve a high level of security, but at the expense of poor throughput and latency. Scaling the performance of Bitcoin has a been a major recent direction of research. One successful direction of work has involved replacing proof of work (PoW) by proof of stake (PoS). Proposals to scale the performance in the PoW setti… ▽ More

    Submitted 17 February, 2023; v1 submitted 24 September, 2019; originally announced September 2019.

  32. arXiv:1909.08719  [pdf, other

    cs.CR cs.DC cs.IT

    Barracuda: The Power of $\ell$-polling in Proof-of-Stake Blockchains

    Authors: Giulia Fanti, Jiantao Jiao, Ashok Makkuva, Sewoong Oh, Ranvir Rana, Pramod Viswanath

    Abstract: A blockchain is a database of sequential events that is maintained by a distributed group of nodes. A key consensus problem in blockchains is that of determining the next block (data element) in the sequence. Many blockchains address this by electing a new node to propose each new block. The new block is (typically) appended to the tip of the proposer's local blockchain, and subsequently broadcast… ▽ More

    Submitted 18 September, 2019; originally announced September 2019.

    Comments: ACM Mobihoc 2019, Best paper award

  33. arXiv:1906.10817  [pdf, ps, other

    cs.IT cs.CR cs.DC

    Coded State Machine -- Scaling State Machine Execution under Byzantine Faults

    Authors: Songze Li, Saeid Sahraei, Mingchao Yu, Salman Avestimehr, Sreeram Kannan, Pramod Viswanath

    Abstract: We introduce an information-theoretic framework, named Coded State Machine (CSM), to securely and efficiently execute multiple state machines on untrusted network nodes, some of which are Byzantine. The standard method of solving this problem is using State Machine Replication, which achieves high security at the cost of low efficiency. We propose CSM, which achieves the optimal linear scaling in… ▽ More

    Submitted 25 June, 2019; originally announced June 2019.

  34. arXiv:1906.02777  [pdf, other

    cs.LG stat.ML

    Learning in Gated Neural Networks

    Authors: Ashok Vardhan Makkuva, Sewoong Oh, Sreeram Kannan, Pramod Viswanath

    Abstract: Gating is a key feature in modern neural networks including LSTMs, GRUs and sparsely-gated deep neural networks. The backbone of such gated networks is a mixture-of-experts layer, where several experts make regression decisions and gating controls how to weigh the decisions in an input-dependent manner. Despite having such a prominent role in both modern and classical machine learning, very little… ▽ More

    Submitted 17 June, 2020; v1 submitted 6 June, 2019; originally announced June 2019.

  35. arXiv:1903.02295  [pdf, other

    eess.SP cs.IT

    DeepTurbo: Deep Turbo Decoder

    Authors: Yihan Jiang, Hyeji Kim, Himanshu Asnani, Sreeram Kannan, Sewoong Oh, Pramod Viswanath

    Abstract: Present-day communication systems routinely use codes that approach the channel capacity when coupled with a computationally efficient decoder. However, the decoder is typically designed for the Gaussian noise channel and is known to be sub-optimal for non-Gaussian noise distribution. Deep learning methods offer a new approach for designing decoders that can be trained and tailored for arbitrary c… ▽ More

    Submitted 24 April, 2019; v1 submitted 6 March, 2019; originally announced March 2019.

  36. arXiv:1901.07688  [pdf, other

    cs.CL

    Context-Sensitive Malicious Spelling Error Correction

    Authors: Hongyu Gong, Yuchen Li, Suma Bhat, Pramod Viswanath

    Abstract: Misspelled words of the malicious kind work by changing specific keywords and are intended to thwart existing automated applications for cyber-environment control such as harassing content detection on the Internet and email spam detection. In this paper, we focus on malicious spelling correction, which requires an approach that relies on the context and the surface forms of targeted keywords. In… ▽ More

    Submitted 22 January, 2019; originally announced January 2019.

  37. arXiv:1811.12707  [pdf, other

    eess.SP cs.AI

    LEARN Codes: Inventing Low-latency Codes via Recurrent Neural Networks

    Authors: Yihan Jiang, Hyeji Kim, Himanshu Asnani, Sreeram Kannan, Sewoong Oh, Pramod Viswanath

    Abstract: Designing channel codes under low-latency constraints is one of the most demanding requirements in 5G standards. However, a sharp characterization of the performance of traditional codes is available only in the large block-length limit. Guided by such asymptotic analysis, code designs require large block lengths as well as latency to achieve the desired error rate. Tail-biting convolutional codes… ▽ More

    Submitted 24 July, 2020; v1 submitted 30 November, 2018; originally announced November 2018.

  38. arXiv:1810.11551  [pdf, other

    cs.IT

    Estimators for Multivariate Information Measures in General Probability Spaces

    Authors: Arman Rahimzamani, Himanshu Asnani, Pramod Viswanath, Sreeram Kannan

    Abstract: Information theoretic quantities play an important role in various settings in machine learning, including causality testing, structure inference in graphical models, time-series problems, feature selection as well as in providing privacy guarantees. A key quantity of interest is the mutual information and generalizations thereof, including conditional mutual information, multivariate mutual infor… ▽ More

    Submitted 26 October, 2018; originally announced October 2018.

    Comments: 34 pages, 4 figures; To appear in the thirty-second Conference on Neural Information Processing Systems 2018

  39. arXiv:1810.08092  [pdf, other

    cs.CR cs.DC cs.IT

    Deconstructing the Blockchain to Approach Physical Limits

    Authors: Vivek Bagaria, Sreeram Kannan, David Tse, Giulia Fanti, Pramod Viswanath

    Abstract: Transaction throughput, confirmation latency and confirmation reliability are fundamental performance measures of any blockchain system in addition to its security. In a decentralized setting, these measures are limited by two underlying physical network attributes: communication capacity and speed-of-light propagation delay. Existing systems operate far away from these physical limits. In this wo… ▽ More

    Submitted 1 October, 2019; v1 submitted 18 October, 2018; originally announced October 2018.

    Comments: Computer and Communications Security, 2019

    Journal ref: Computer and Communications Security, 2019

  40. arXiv:1810.04133  [pdf, other

    cs.LG stat.ML

    Learning One-hidden-layer Neural Networks under General Input Distributions

    Authors: Weihao Gao, Ashok Vardhan Makkuva, Sewoong Oh, Pramod Viswanath

    Abstract: Significant advances have been made recently on training neural networks, where the main challenge is in solving an optimization problem with abundant critical points. However, existing approaches to address this issue crucially rely on a restrictive assumption: the training data is drawn from a Gaussian distribution. In this paper, we provide a novel unified framework to design loss functions wit… ▽ More

    Submitted 26 February, 2019; v1 submitted 9 October, 2018; originally announced October 2018.

    Comments: 19 pages, 4 figures

  41. arXiv:1809.10361  [pdf, other

    cs.CR cs.DC cs.IT

    PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously

    Authors: Songze Li, Mingchao Yu, Chien-Sheng Yang, A. Salman Avestimehr, Sreeram Kannan, Pramod Viswanath

    Abstract: Today's blockchain designs suffer from a trilemma claiming that no blockchain system can simultaneously achieve decentralization, security, and performance scalability. For current blockchain systems, as more nodes join the network, the efficiency of the system (computation, communication, and storage) stays constant at best. A leading idea for enabling blockchains to scale efficiency is the notio… ▽ More

    Submitted 24 January, 2020; v1 submitted 27 September, 2018; originally announced September 2018.

  42. arXiv:1809.07468  [pdf, other

    cs.CR

    Compounding of Wealth in Proof-of-Stake Cryptocurrencies

    Authors: Giulia Fanti, Leonid Kogan, Sewoong Oh, Kathleen Ruan, Pramod Viswanath, Gerui Wang

    Abstract: Proof-of-stake (PoS) is a promising approach for designing efficient blockchains, where block proposers are randomly chosen with probability proportional to their stake. A primary concern with PoS systems is the "rich getting richer" phenomenon, whereby wealthier nodes are more likely to get elected, and hence reap the block reward, making them even wealthier. In this paper, we introduce the notio… ▽ More

    Submitted 15 October, 2018; v1 submitted 20 September, 2018; originally announced September 2018.

    Comments: 26 pages

  43. arXiv:1807.00801  [pdf, other

    cs.LG cs.IT stat.ML

    Deepcode: Feedback Codes via Deep Learning

    Authors: Hyeji Kim, Yihan Jiang, Sreeram Kannan, Sewoong Oh, Pramod Viswanath

    Abstract: The design of codes for communicating reliably over a statistically well defined channel is an important endeavor involving deep mathematical research and wide-ranging practical applications. In this work, we present the first family of codes obtained via deep learning, which significantly beats state-of-the-art codes designed over several decades of research. The communication channel under consi… ▽ More

    Submitted 2 July, 2018; originally announced July 2018.

    Comments: 24 pages, 20 figures

  44. arXiv:1805.11060  [pdf, other

    cs.CR

    Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees

    Authors: Giulia Fanti, Shaileshh Bojja Venkatakrishnan, Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew Miller, Pramod Viswanath

    Abstract: Recent work has demonstrated significant anonymity vulnerabilities in Bitcoin's networking stack. In particular, the current mechanism for broadcasting Bitcoin transactions allows third-party observers to link transactions to the IP addresses that originated them. This lays the groundwork for low-cost, large-scale deanonymization attacks. In this work, we present Dandelion++, a first-principles de… ▽ More

    Submitted 28 May, 2018; originally announced May 2018.

  45. arXiv:1805.09389  [pdf, other

    cs.CL

    Embedding Syntax and Semantics of Prepositions via Tensor Decomposition

    Authors: Hongyu Gong, Suma Bhat, Pramod Viswanath

    Abstract: Prepositions are among the most frequent words in English and play complex roles in the syntax and semantics of sentences. Not surprisingly, they pose well-known difficulties in automatic processing of sentences (prepositional attachment ambiguities and idiosyncratic uses in phrases). Existing methods on preposition representation treat prepositions no different from content words (e.g., word2vec… ▽ More

    Submitted 23 May, 2018; originally announced May 2018.

  46. arXiv:1805.09317  [pdf, other

    stat.ML cs.LG

    Communication Algorithms via Deep Learning

    Authors: Hyeji Kim, Yihan Jiang, Ranvir Rana, Sreeram Kannan, Sewoong Oh, Pramod Viswanath

    Abstract: Coding theory is a central discipline underpinning wireline and wireless modems that are the workhorses of the information age. Progress in coding theory is largely driven by individual human ingenuity with sporadic breakthroughs over the past century. In this paper we study whether it is possible to automate the discovery of decoding algorithms via deep learning. We study a family of sequential c… ▽ More

    Submitted 23 May, 2018; originally announced May 2018.

    Comments: 19 pages, published as a conference paper at ICLR 2018

  47. arXiv:1802.07417  [pdf, other

    cs.LG

    Breaking the gridlock in Mixture-of-Experts: Consistent and Efficient Algorithms

    Authors: Ashok Vardhan Makkuva, Sewoong Oh, Sreeram Kannan, Pramod Viswanath

    Abstract: Mixture-of-Experts (MoE) is a widely popular model for ensemble learning and is a basic building block of highly successful modern neural networks as well as a component in Gated Recurrent Units (GRU) and Attention networks. However, present algorithms for learning MoE including the EM algorithm, and gradient descent are known to get stuck in local optima. From a theoretical viewpoint, finding an… ▽ More

    Submitted 6 June, 2019; v1 submitted 20 February, 2018; originally announced February 2018.

  48. arXiv:1802.04948  [pdf, other

    cs.LG

    Graph2Seq: Scalable Learning Dynamics for Graphs

    Authors: Shaileshh Bojja Venkatakrishnan, Mohammad Alizadeh, Pramod Viswanath

    Abstract: Neural networks have been shown to be an effective tool for learning algorithms over graph-structured data. However, graph representation techniques---that convert graphs to real-valued vectors for use with neural networks---are still in their infancy. Recent works have proposed several approaches (e.g., graph convolutional networks), but these methods have difficulty scaling and generalizing to g… ▽ More

    Submitted 9 October, 2018; v1 submitted 13 February, 2018; originally announced February 2018.

  49. arXiv:1709.06212  [pdf, other

    cs.IT cs.LG

    Estimating Mutual Information for Discrete-Continuous Mixtures

    Authors: Weihao Gao, Sreeram Kannan, Sewoong Oh, Pramod Viswanath

    Abstract: Estimating mutual information from observed samples is a basic primitive, useful in several machine learning tasks including correlation mining, information bottleneck clustering, learning a Chow-Liu tree, and conditional independence testing in (causal) graphical models. While mutual information is a well-defined quantity in general probability spaces, existing estimators can only handle two spec… ▽ More

    Submitted 9 October, 2018; v1 submitted 18 September, 2017; originally announced September 2017.

    Comments: 25 pages, 3 figures. Part of this paper appears in the Conference on Neural Information Processing Systems (NIPS), 2017

  50. Discovering Potential Correlations via Hypercontractivity

    Authors: Hyeji Kim, Weihao Gao, Sreeram Kannan, Sewoong Oh, Pramod Viswanath

    Abstract: Discovering a correlation from one variable to another variable is of fundamental scientific and practical interest. While existing correlation measures are suitable for discovering average correlation, they fail to discover hidden or potential correlations. To bridge this gap, (i) we postulate a set of natural axioms that we expect a measure of potential correlation to satisfy; (ii) we show that… ▽ More

    Submitted 13 November, 2017; v1 submitted 12 September, 2017; originally announced September 2017.

    Comments: 30 pages, 19 figures, accepted for publication in the 31st Conference on Neural Information Processing Systems (NIPS 2017)