Skip to main content

Showing 1–19 of 19 results for author: Lecuyer, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.10427  [pdf, other

    cs.LG cs.CR

    Adaptive Randomized Smoothing: Certifying Multi-Step Defences against Adversarial Examples

    Authors: Saiyue Lyu, Shadab Shaikh, Frederick Shpilevskiy, Evan Shelhamer, Mathias Lécuyer

    Abstract: We propose Adaptive Randomized Smoothing (ARS) to certify the predictions of our test-time adaptive models against adversarial examples. ARS extends the analysis of randomized smoothing using f-Differential Privacy to certify the adaptive composition of multiple steps. For the first time, our theory covers the sound adaptive composition of general and high-dimensional functions of noisy input. We… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

  2. arXiv:2405.16719  [pdf, other

    cs.CR

    Alistair: Efficient On-device Budgeting for Differentially-Private Ad-Measurement Systems

    Authors: Pierre Tholoniat, Kelly Kostopoulou, Peter McNeely, Prabhpreet Singh Sodhi, Anirudh Varanasi, Benjamin Case, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer

    Abstract: With the impending removal of third-party cookies from major browsers and the introduction of new privacy-preserving advertising APIs, the research community has a timely opportunity to assist industry in qualitatively improving the Web's privacy. This paper discusses our efforts, within a W3C community group, to enhance existing privacy-preserving advertising measurement APIs. We analyze designs… ▽ More

    Submitted 12 July, 2024; v1 submitted 26 May, 2024; originally announced May 2024.

    Comments: added section 3.3 Algorithm

  3. arXiv:2405.01010  [pdf, other

    cs.LG stat.ML

    Efficient and Adaptive Posterior Sampling Algorithms for Bandits

    Authors: Bingshan Hu, Zhiming Huang, Tianyue H. Zhang, Mathias Lécuyer, Nidhi Hegde

    Abstract: We study Thompson Sampling-based algorithms for stochastic bandits with bounded rewards. As the existing problem-dependent regret bound for Thompson Sampling with Gaussian priors [Agrawal and Goyal, 2017] is vacuous when $T \le 288 e^{64}$, we derive a more practical bound that tightens the coefficient of the leading term %from $288 e^{64}$ to $1270$. Additionally, motivated by large-scale real-wo… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

  4. arXiv:2402.09477  [pdf, other

    cs.CR cs.LG

    PANORAMIA: Privacy Auditing of Machine Learning Models without Retraining

    Authors: Mishaal Kazmi, Hadrien Lautraite, Alireza Akbari, Mauricio Soroco, Qiaoyue Tang, Tao Wang, Sébastien Gambs, Mathias Lécuyer

    Abstract: We introduce a privacy auditing scheme for ML models that relies on membership inference attacks using generated data as "non-members". This scheme, which we call PANORAMIA, quantifies the privacy leakage for large-scale ML models without control of the training process or model re-training and only requires access to a subset of the training data. To demonstrate its applicability, we evaluate our… ▽ More

    Submitted 12 February, 2024; originally announced February 2024.

    Comments: 19 pages

  5. arXiv:2312.14334  [pdf, other

    cs.LG cs.CR

    DP-AdamBC: Your DP-Adam Is Actually DP-SGD (Unless You Apply Bias Correction)

    Authors: Qiaoyue Tang, Frederick Shpilevskiy, Mathias Lécuyer

    Abstract: The Adam optimizer is a popular choice in contemporary deep learning, due to its strong empirical performance. However we observe that in privacy sensitive scenarios, the traditional use of Differential Privacy (DP) with the Adam optimizer leads to sub-optimal performance on several tasks. We find that this performance degradation is due to a DP bias in Adam's second moment estimator, introduced b… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

    Comments: Published as a conference paper at the 38th Annual AAAI Conference on Artificial Intelligence, Vancouver, 2024

  6. arXiv:2310.06293  [pdf, other

    cs.CR

    NetShaper: A Differentially Private Network Side-Channel Mitigation System

    Authors: Amir Sabzi, Rut Vora, Swati Goswami, Margo Seltzer, Mathias Lécuyer, Aastha Mehta

    Abstract: The widespread adoption of encryption in network protocols has significantly improved the overall security of many Internet applications. However, these protocols cannot prevent network side-channel leaks -- leaks of sensitive information through the sizes and timing of network packets. We present NetShaper, a system that mitigates such leaks based on the principle of traffic sha**. NetShaper's… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

  7. Turbo: Effective Caching in Differentially-Private Databases

    Authors: Kelly Kostopoulou, Pierre Tholoniat, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer

    Abstract: Differentially-private (DP) databases allow for privacy-preserving analytics over sensitive datasets or data streams. In these systems, user privacy is a limited resource that must be conserved with each query. We propose Turbo, a novel, state-of-the-art caching layer for linear query workloads over DP databases. Turbo builds upon private multiplicative weights (PMW), a DP mechanism that is powerf… ▽ More

    Submitted 23 October, 2023; v1 submitted 28 June, 2023; originally announced June 2023.

    Comments: Extended version of a paper presented at the 29th ACM Symposium on Operating Systems Principles (SOSP '23)

  8. arXiv:2304.11208  [pdf, other

    cs.LG cs.CR

    DP-Adam: Correcting DP Bias in Adam's Second Moment Estimation

    Authors: Qiaoyue Tang, Mathias Lécuyer

    Abstract: We observe that the traditional use of DP with the Adam optimizer introduces a bias in the second moment estimation, due to the addition of independent noise in the gradient computation. This bias leads to a different scaling for low variance parameter updates, that is inconsistent with the behavior of non-private Adam, and Adam's sign descent interpretation. Empirically, correcting the bias intro… ▽ More

    Submitted 21 April, 2023; originally announced April 2023.

    Comments: Published at ICLR 2023 Workshop on Trustworthy and Reliable Large-Scale Machine Learning Models

  9. arXiv:2212.13228  [pdf, other

    cs.CR cs.LG

    Packing Privacy Budget Efficiently

    Authors: Pierre Tholoniat, Kelly Kostopoulou, Mosharaf Chowdhury, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer, Junfeng Yang

    Abstract: Machine learning (ML) models can leak information about users, and differential privacy (DP) provides a rigorous way to bound that leakage under a given budget. This DP budget can be regarded as a new type of compute resource in workloads of multiple ML models training on user data. Once it is used, the DP budget is forever consumed. Therefore, it is crucial to allocate it most efficiently to trai… ▽ More

    Submitted 26 December, 2022; originally announced December 2022.

  10. arXiv:2212.01523  [pdf, other

    cs.LG cs.DC

    GlueFL: Reconciling Client Sampling and Model Masking for Bandwidth Efficient Federated Learning

    Authors: Shiqi He, Qifan Yan, Feijie Wu, Lanjun Wang, Mathias Lécuyer, Ivan Beschastnikh

    Abstract: Federated learning (FL) is an effective technique to directly involve edge devices in machine learning training while preserving client privacy. However, the substantial communication overhead of FL makes training challenging when edge devices have limited network bandwidth. Existing work to optimize FL bandwidth overlooks downstream transmission and does not account for FL client sampling. In t… ▽ More

    Submitted 2 December, 2022; originally announced December 2022.

  11. arXiv:2210.06825  [pdf, other

    cs.LG cs.AI

    Fast Optimization of Weighted Sparse Decision Trees for use in Optimal Treatment Regimes and Optimal Policy Design

    Authors: Ali Behrouz, Mathias Lecuyer, Cynthia Rudin, Margo Seltzer

    Abstract: Sparse decision trees are one of the most common forms of interpretable models. While recent advances have produced algorithms that fully optimize sparse decision trees for prediction, that work does not address policy design, because the algorithms cannot handle weighted data samples. Specifically, they rely on the discreteness of the loss function, which means that real-valued weights cannot be… ▽ More

    Submitted 25 October, 2022; v1 submitted 13 October, 2022; originally announced October 2022.

    Comments: Advances in Interpretable Machine Learning, AIMLAI 2022. arXiv admin note: text overlap with arXiv:2112.00798

  12. arXiv:2206.10013  [pdf, other

    cs.LG

    Measuring the Effect of Training Data on Deep Learning Predictions via Randomized Experiments

    Authors: **kun Lin, Anqi Zhang, Mathias Lecuyer, **yang Li, Aurojit Panda, Siddhartha Sen

    Abstract: We develop a new, principled algorithm for estimating the contribution of training data points to the behavior of a deep learning model, such as a specific prediction it makes. Our algorithm estimates the AME, a quantity that measures the expected (average) marginal effect of adding a data point to a subset of the training data, sampled from a given distribution. When subsets are sampled from the… ▽ More

    Submitted 20 June, 2022; originally announced June 2022.

    Comments: ICML 2022

  13. arXiv:2110.14874  [pdf, other

    cs.LG stat.ML

    Sayer: Using Implicit Feedback to Optimize System Policies

    Authors: Mathias Lécuyer, Sang Hoon Kim, Mihir Nanavati, Junchen Jiang, Siddhartha Sen, Amit Sharma, Aleksandrs Slivkins

    Abstract: We observe that many system policies that make threshold decisions involving a resource (e.g., time, memory, cores) naturally reveal additional, or implicit feedback. For example, if a system waits X min for an event to occur, then it automatically learns what would have happened if it waited <X min, because time has a cumulative property. This feedback tells us about alternative decisions, and ca… ▽ More

    Submitted 28 October, 2021; originally announced October 2021.

  14. arXiv:2106.15335  [pdf, other

    cs.CR cs.DC cs.LG

    Privacy Budget Scheduling

    Authors: Tao Luo, Mingen Pan, Pierre Tholoniat, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer

    Abstract: Machine learning (ML) models trained on personal data have been shown to leak information about users. Differential privacy (DP) enables model training with a guaranteed bound on this leakage. Each new model trained with DP increases the bound on data leakage and can be seen as consuming part of a global privacy budget that should not be exceeded. This budget is a scarce resource that must be care… ▽ More

    Submitted 29 June, 2021; originally announced June 2021.

    Comments: Extended version of a paper presented at the 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI '21)

  15. arXiv:2103.01379  [pdf, other

    stat.ML cs.LG

    Practical Privacy Filters and Odometers with Rényi Differential Privacy and Applications to Differentially Private Deep Learning

    Authors: Mathias Lécuyer

    Abstract: Differential Privacy (DP) is the leading approach to privacy preserving deep learning. As such, there are multiple efforts to provide drop-in integration of DP into popular frameworks. These efforts, which add noise to each gradient computation to make it DP, rely on composition theorems to bound the total privacy loss incurred over this sequence of DP computations. However, existing composition… ▽ More

    Submitted 4 June, 2021; v1 submitted 1 March, 2021; originally announced March 2021.

  16. arXiv:1909.01502  [pdf, other

    stat.ML cs.CR cs.LG

    Privacy Accounting and Quality Control in the Sage Differentially Private ML Platform

    Authors: Mathias Lecuyer, Riley Spahn, Kiran Vodrahalli, Roxana Geambasu, Daniel Hsu

    Abstract: Companies increasingly expose machine learning (ML) models trained over sensitive user data to untrusted domains, such as end-user devices and wide-access model stores. We present Sage, a differentially private (DP) ML platform that bounds the cumulative leakage of training data through models. Sage builds upon the rich literature on DP ML algorithms and contributes pragmatic solutions to two of t… ▽ More

    Submitted 6 September, 2019; v1 submitted 3 September, 2019; originally announced September 2019.

    Comments: Extended version of a paper presented at the 27th ACM Symposium on Operating Systems Principles (SOSP '19)

  17. arXiv:1802.03471  [pdf, other

    stat.ML cs.AI cs.CR cs.LG

    Certified Robustness to Adversarial Examples with Differential Privacy

    Authors: Mathias Lecuyer, Vaggelis Atlidakis, Roxana Geambasu, Daniel Hsu, Suman Jana

    Abstract: Adversarial examples that fool machine learning models, particularly deep neural networks, have been a topic of intense research interest, with attacks and defenses being developed in a tight back-and-forth. Most past defenses are best effort and have been shown to be vulnerable to sophisticated attacks. Recently a set of certified defenses have been introduced, which provide guarantees of robustn… ▽ More

    Submitted 29 May, 2019; v1 submitted 9 February, 2018; originally announced February 2018.

  18. arXiv:1705.07512  [pdf, other

    cs.CR

    Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization

    Authors: Mathias Lecuyer, Riley Spahn, Roxana Geambasu, Tzu-Kuo Huang, Siddhartha Sen

    Abstract: Protecting vast quantities of data poses a daunting challenge for the growing number of organizations that collect, stockpile, and monetize it. The ability to distinguish data that is actually needed from data collected "just in case" would help these organizations to limit the latter's exposure to attack. A natural approach might be to monitor data use and retain only the working-set of in-use da… ▽ More

    Submitted 21 May, 2017; originally announced May 2017.

  19. arXiv:1407.2323  [pdf, other

    cs.NI cs.CY

    XRay: Enhancing the Web's Transparency with Differential Correlation

    Authors: Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Chaintreau, Roxana Geambasu

    Abstract: Today's Web services - such as Google, Amazon, and Facebook - leverage user data for varied purposes, including personalizing recommendations, targeting advertisements, and adjusting prices. At present, users have little insight into how their data is being used. Hence, they cannot make informed choices about the services they choose. To increase transparency, we developed XRay, the first fine-gra… ▽ More

    Submitted 7 October, 2014; v1 submitted 8 July, 2014; originally announced July 2014.

    Comments: Extended version of a paper presented at the 23rd USENIX Security Symposium (USENIX Security 14)