Skip to main content

Showing 1–22 of 22 results for author: Sheffet, O

Searching in archive cs. Search in all archives.
.
  1. arXiv:2206.03319  [pdf, other

    cs.DS

    A Differentially Private Linear-Time fPTAS for the Minimum Enclosing Ball Problem

    Authors: Bar Mahpud, Or Sheffet

    Abstract: The Minimum Enclosing Ball (MEB) problem is one of the most fundamental problems in clustering, with applications in operations research, statistics and computational geometry. In this works, we give the first differentially private (DP) fPTAS for the Minimum Enclosing Ball problem, improving both on the runtime and the utility bound of the best known DP-PTAS for the problem, of Ghazi et al. (2020… ▽ More

    Submitted 23 December, 2022; v1 submitted 7 June, 2022; originally announced June 2022.

  2. arXiv:2201.12018  [pdf, other

    cs.LG cs.CR cs.DS

    Transfer Learning In Differential Privacy's Hybrid-Model

    Authors: Refael Kohen, Or Sheffet

    Abstract: The hybrid-model (Avent et al 2017) in Differential Privacy is a an augmentation of the local-model where in addition to N local-agents we are assisted by one special agent who is in fact a curator holding the sensitive details of n additional individuals. Here we study the problem of machine learning in the hybrid-model where the n individuals in the curators dataset are drawn from a different di… ▽ More

    Submitted 16 June, 2022; v1 submitted 28 January, 2022; originally announced January 2022.

  3. arXiv:2007.08110  [pdf, other

    cs.DS cs.CG cs.CR

    Private Approximations of a Convex Hull in Low Dimensions

    Authors: Yue Gao, Or Sheffet

    Abstract: We give the first differentially private algorithms that estimate a variety of geometric features of points in the Euclidean space, such as diameter, width, volume of convex hull, min-bounding box, min-enclosing ball etc. Our work relies heavily on the notion of \emph{Tukey-depth}. Instead of (non-privately) approximating the convex-hull of the given set of points $P$, our algorithms approximate t… ▽ More

    Submitted 17 July, 2020; v1 submitted 16 July, 2020; originally announced July 2020.

  4. arXiv:2006.06792  [pdf, other

    stat.ML cs.LG

    Quantile Multi-Armed Bandits: Optimal Best-Arm Identification and a Differentially Private Scheme

    Authors: Kontantinos E. Nikolakakis, Dionysios S. Kalogerias, Or Sheffet, Anand D. Sarwate

    Abstract: We study the best-arm identification problem in multi-armed bandits with stochastic, potentially private rewards, when the goal is to identify the arm with the highest quantile at a fixed, prescribed level. First, we propose a (non-private) successive elimination algorithm for strictly optimal best-arm identification, we show that our algorithm is $δ$-PAC and we characterize its sample complexity.… ▽ More

    Submitted 4 December, 2022; v1 submitted 11 June, 2020; originally announced June 2020.

    Comments: 18 pages, 4 figures

  5. arXiv:1912.08951  [pdf, other

    cs.DS cs.CR cs.LG

    The power of synergy in differential privacy: Combining a small curator with local randomizers

    Authors: Amos Beimel, Aleksandra Korolova, Kobbi Nissim, Or Sheffet, Uri Stemmer

    Abstract: Motivated by the desire to bridge the utility gap between local and trusted curator models of differential privacy for practical applications, we initiate the theoretical study of a hybrid model introduced by "Blender" [Avent et al.,\ USENIX Security '17], in which differentially private protocols of n agents that work in the local-model are assisted by a differentially private curator that has ac… ▽ More

    Submitted 20 December, 2019; v1 submitted 18 December, 2019; originally announced December 2019.

  6. arXiv:1909.03951  [pdf, other

    cs.DS cs.CR cs.IT cs.LG stat.ML

    Differentially Private Algorithms for Learning Mixtures of Separated Gaussians

    Authors: Gautam Kamath, Or Sheffet, Vikrant Singhal, Jonathan Ullman

    Abstract: Learning the parameters of Gaussian mixture models is a fundamental and widely studied problem with numerous applications. In this work, we give new algorithms for learning the parameters of a high-dimensional, well separated, Gaussian mixture model subject to the strong constraint of differential privacy. In particular, we give a differentially private analogue of the algorithm of Achlioptas and… ▽ More

    Submitted 15 October, 2019; v1 submitted 9 September, 2019; originally announced September 2019.

    Comments: To appear in NeurIPS 2019

  7. arXiv:1905.09383  [pdf, other

    stat.ML cs.LG

    An Optimal Private Stochastic-MAB Algorithm Based on an Optimal Private Stop** Rule

    Authors: Touqir Sajed, Or Sheffet

    Abstract: We present a provably optimal differentially private algorithm for the stochastic multi-arm bandit problem, as opposed to the private analogue of the UCB-algorithm [Mishra and Thakurta, 2015; Tossou and Dimitrakakis, 2016] which doesn't meet the recently discovered lower-bound of $Ω\left(\frac{K\log(T)}ε \right)$ [Shariff and Sheffet, 2018]. Our construction is based on a different algorithm, Succ… ▽ More

    Submitted 22 May, 2019; originally announced May 2019.

  8. arXiv:1810.08054  [pdf, other

    cs.DS

    Locally Private Mean Estimation: Z-test and Tight Confidence Intervals

    Authors: Marco Gaboardi, Ryan Rogers, Or Sheffet

    Abstract: This work provides tight upper- and lower-bounds for the problem of mean estimation under $ε$-differential privacy in the local model, when the input is composed of $n$ i.i.d. drawn samples from a normal distribution with variance $σ$. Our algorithms result in a $(1-β)$-confidence interval for the underlying distribution's mean $μ$ of length… ▽ More

    Submitted 10 April, 2019; v1 submitted 18 October, 2018; originally announced October 2018.

  9. arXiv:1810.00068  [pdf, other

    cs.LG stat.ML

    Differentially Private Contextual Linear Bandits

    Authors: Roshan Shariff, Or Sheffet

    Abstract: We study the contextual linear bandit problem, a version of the standard stochastic multi-armed bandit (MAB) problem where a learner sequentially selects actions to maximize a reward which depends also on a user provided per-round context. Though the context is chosen arbitrarily or adversarially, the reward is assumed to be a stochastic function of a feature vector that encodes the context and se… ▽ More

    Submitted 28 September, 2018; originally announced October 2018.

    Comments: 21 pages, 5 figures; to appear in NIPS 2018

  10. arXiv:1802.03441  [pdf, other

    cs.CR

    Locally Private Hypothesis Testing

    Authors: Or Sheffet

    Abstract: We initiate the study of differentially private hypothesis testing in the local-model, under both the standard (symmetric) randomized-response mechanism (Warner, 1965, Kasiviswanathan et al, 2008) and the newer (non-symmetric) mechanisms (Bassily and Smith, 2015, Bassily et al, 2017). First, we study the general framework of map** each user's type into a signal and show that the problem of findi… ▽ More

    Submitted 9 February, 2018; originally announced February 2018.

  11. arXiv:1507.02482  [pdf, other

    cs.DS cs.CR cs.LG

    Differentially Private Ordinary Least Squares

    Authors: Or Sheffet

    Abstract: Linear regression is one of the most prevalent techniques in machine learning, however, it is also common to use linear regression for its \emph{explanatory} capabilities rather than label prediction. Ordinary Least Squares (OLS) is often used in statistics to establish a correlation between an attribute (e.g. gender) and a label (e.g. income) in the presence of other (potentially correlated) feat… ▽ More

    Submitted 21 August, 2017; v1 submitted 9 July, 2015; originally announced July 2015.

  12. arXiv:1507.00056  [pdf, other

    cs.DS

    Private Approximations of the 2nd-Moment Matrix Using Existing Techniques in Linear Regression

    Authors: Or Sheffet

    Abstract: We introduce three differentially-private algorithms that approximates the 2nd-moment matrix of the data. These algorithm, which in contrast to existing algorithms output positive-definite matrices, correspond to existing techniques in linear regression literature. Specifically, we discuss the following three techniques. (i) For Ridge Regression, we propose setting the regularization coefficient s… ▽ More

    Submitted 24 November, 2015; v1 submitted 30 June, 2015; originally announced July 2015.

  13. arXiv:1410.8750  [pdf, ps, other

    cs.LG

    Learning Mixtures of Ranking Models

    Authors: Pranjal Awasthi, Avrim Blum, Or Sheffet, Aravindan Vijayaraghavan

    Abstract: This work concerns learning probabilistic models for ranking data in a heterogeneous population. The specific problem we study is learning the parameters of a Mallows Mixture Model. Despite being widely studied, current heuristics for this problem do not have theoretical guarantees and can get stuck in bad local optima. We present the first polynomial time algorithm which provably learns the param… ▽ More

    Submitted 31 October, 2014; originally announced October 2014.

  14. arXiv:1410.1920  [pdf, other

    cs.GT

    Privacy Games

    Authors: Yiling Chen, Or Sheffet, Salil Vadhan

    Abstract: The problem of analyzing the effect of privacy concerns on the behavior of selfish utility-maximizing agents has received much attention lately. Privacy concerns are often modeled by altering the utility functions of agents to consider also their privacy loss. Such privacy aware agents prefer to take a randomized strategy even in very simple games in which non-privacy aware agents play pure strate… ▽ More

    Submitted 7 October, 2014; originally announced October 2014.

  15. arXiv:1302.5101  [pdf, ps, other

    cs.CR

    Optimizing Password Composition Policies

    Authors: Jeremiah Blocki, Saranga Komanduri, Ariel Procaccia, Or Sheffet

    Abstract: A password composition policy restricts the space of allowable passwords to eliminate weak passwords that are vulnerable to statistical guessing attacks. Usability studies have demonstrated that existing password composition policies can sometimes result in weaker password distributions; hence a more principled approach is needed. We introduce the first theoretical model for optimizing password co… ▽ More

    Submitted 25 February, 2013; v1 submitted 20 February, 2013; originally announced February 2013.

  16. arXiv:1208.4586  [pdf, ps, other

    cs.CR cs.SI physics.soc-ph

    Differentially Private Data Analysis of Social Networks via Restricted Sensitivity

    Authors: Jeremiah Blocki, Avrim Blum, Anupam Datta, Or Sheffet

    Abstract: We introduce the notion of restricted sensitivity as an alternative to global and smooth sensitivity to improve accuracy in differentially private data analysis. The definition of restricted sensitivity is similar to that of global sensitivity except that instead of quantifying over all possible datasets, we take advantage of any beliefs about the dataset that a querier may have, to quantify over… ▽ More

    Submitted 1 February, 2013; v1 submitted 22 August, 2012; originally announced August 2012.

  17. arXiv:1206.6440  [pdf

    cs.LG stat.ML

    Predicting Preference Flips in Commerce Search

    Authors: Or Sheffet, Nina Mishra, Samuel Ieong

    Abstract: Traditional approaches to ranking in web search follow the paradigm of rank-by-score: a learned function gives each query-URL combination an absolute score and URLs are ranked according to this score. This paradigm ensures that if the score of one URL is better than another then one will always be ranked higher than the other. Scoring contradicts prior work in behavioral economics that showed that… ▽ More

    Submitted 27 June, 2012; originally announced June 2012.

    Comments: Appears in Proceedings of the 29th International Conference on Machine Learning (ICML 2012)

  18. arXiv:1206.3334  [pdf, ps, other

    cs.DS cs.CE q-bio.PE

    Additive Approximation for Near-Perfect Phylogeny Construction

    Authors: Pranjal Awasthi, Avrim Blum, Jamie Morgenstern, Or Sheffet

    Abstract: We study the problem of constructing phylogenetic trees for a given set of species. The problem is formulated as that of finding a minimum Steiner tree on $n$ points over the Boolean hypercube of dimension $d$. It is known that an optimal tree can be found in linear time if the given dataset has a perfect phylogeny, i.e. cost of the optimal phylogeny is exactly $d$. Moreover, if the data has a nea… ▽ More

    Submitted 14 June, 2012; originally announced June 2012.

  19. arXiv:1206.3204  [pdf, ps, other

    cs.LG cs.DS

    Improved Spectral-Norm Bounds for Clustering

    Authors: Pranjal Awasthi, Or Sheffet

    Abstract: Aiming to unify known results about clustering mixtures of distributions under separation conditions, Kumar and Kannan[2010] introduced a deterministic condition for clustering datasets. They showed that this single deterministic condition encompasses many previously studied clustering assumptions. More specifically, their proximity condition requires that in the target $k$-clustering, the project… ▽ More

    Submitted 15 June, 2012; v1 submitted 14 June, 2012; originally announced June 2012.

  20. arXiv:1204.2136  [pdf, ps, other

    cs.DS

    The Johnson-Lindenstrauss Transform Itself Preserves Differential Privacy

    Authors: Jeremiah Blocki, Avrim Blum, Anupam Datta, Or Sheffet

    Abstract: This paper proves that an "old dog", namely -- the classical Johnson-Lindenstrauss transform, "performs new tricks" -- it gives a novel way of preserving differential privacy. We show that if we take two databases, $D$ and $D'$, such that (i) $D'-D$ is a rank-1 matrix of bounded norm and (ii) all singular values of $D$ and $D'$ are sufficiently large, then multiplying either $D$ or $D'$ with a vec… ▽ More

    Submitted 18 August, 2012; v1 submitted 10 April, 2012; originally announced April 2012.

  21. arXiv:1202.1483  [pdf, ps, other

    cs.GT

    Send Mixed Signals -- Earn More, Work Less

    Authors: Peter Bro Miltersen, Or Sheffet

    Abstract: Emek et al. presented a model of probabilistic single-item second price auctions where an auctioneer who is informed about the type of an item for sale, broadcasts a signal about this type to uninformed bidders. They proved that finding the optimal (for the purpose of generating revenue) {\em pure} signaling scheme is strongly NP-hard. In contrast, we prove that finding the optimal {\em mixed} sig… ▽ More

    Submitted 7 February, 2012; originally announced February 2012.

  22. arXiv:1009.3594  [pdf, other

    cs.DS

    Center-based Clustering under Perturbation Stability

    Authors: Pranjal Awasthi, Avrim Blum, Or Sheffet

    Abstract: Clustering under most popular objective functions is NP-hard, even to approximate well, and so unlikely to be efficiently solvable in the worst case. Recently, Bilu and Linial \cite{Bilu09} suggested an approach aimed at bypassing this computational barrier by using properties of instances one might hope to hold in practice. In particular, they argue that instances in practice should be stable to… ▽ More

    Submitted 11 August, 2011; v1 submitted 18 September, 2010; originally announced September 2010.