Skip to main content

Showing 1–10 of 10 results for author: Suriyakumar, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.07266  [pdf, other

    cs.ET cs.AR

    Architecture-Level Modeling of Photonic Deep Neural Network Accelerators

    Authors: Tanner Andrulis, Gohar Irfan Chaudhry, Vinith M. Suriyakumar, Joel S. Emer, Vivienne Sze

    Abstract: Photonics is a promising technology to accelerate Deep Neural Networks as it can use optical interconnects to reduce data movement energy and it enables low-energy, high-throughput optical-analog computations. To realize these benefits in a full system (accelerator + DRAM), designers must ensure that the benefits of using the electrical, optical, analog, and digital domains exceed the costs of c… ▽ More

    Submitted 14 May, 2024; v1 submitted 12 May, 2024; originally announced May 2024.

    Comments: Published at ISPASS 2024

  2. Algorithmic Pluralism: A Structural Approach To Equal Opportunity

    Authors: Shomik Jain, Vinith Suriyakumar, Kathleen Creel, Ashia Wilson

    Abstract: We present a structural approach toward achieving equal opportunity in systems of algorithmic decision-making called algorithmic pluralism. Algorithmic pluralism describes a state of affairs in which no set of algorithms severely limits access to opportunity, allowing individuals the freedom to pursue a diverse range of life paths. To argue for algorithmic pluralism, we adopt Joseph Fishkin's theo… ▽ More

    Submitted 15 May, 2024; v1 submitted 14 May, 2023; originally announced May 2023.

    Comments: To appear in the proceedings of the ACM Conference on Fairness, Accountability, and Transparency (FAccT 2024)

    MSC Class: 68-06 ACM Class: K.4.0

  3. arXiv:2302.03098  [pdf, other

    cs.LG cs.CR

    One-shot Empirical Privacy Estimation for Federated Learning

    Authors: Galen Andrew, Peter Kairouz, Sewoong Oh, Alina Oprea, H. Brendan McMahan, Vinith M. Suriyakumar

    Abstract: Privacy estimation techniques for differentially private (DP) algorithms are useful for comparing against analytical bounds, or to empirically measure privacy loss in settings where known analytical bounds are not tight. However, existing privacy auditing techniques usually make strong assumptions on the adversary (e.g., knowledge of intermediate model iterates or the training data distribution),… ▽ More

    Submitted 18 April, 2024; v1 submitted 6 February, 2023; originally announced February 2023.

    Comments: Final revision, oral presentation at ICLR 2024

  4. arXiv:2211.15410  [pdf, other

    cs.LG cs.CR

    Private Multi-Winner Voting for Machine Learning

    Authors: Adam Dziedzic, Christopher A Choquette-Choo, Natalie Dullerud, Vinith Menon Suriyakumar, Ali Shahin Shamsabadi, Muhammad Ahmad Kaleem, Somesh Jha, Nicolas Papernot, Xiao Wang

    Abstract: Private multi-winner voting is the task of revealing $k$-hot binary vectors satisfying a bounded differential privacy (DP) guarantee. This task has been understudied in machine learning literature despite its prevalence in many domains such as healthcare. We propose three new DP multi-winner mechanisms: Binary, $τ$, and Powerset voting. Binary voting operates independently per label through compos… ▽ More

    Submitted 23 November, 2022; originally announced November 2022.

    Comments: Accepted at PoPETS 2023

  5. arXiv:2209.12269  [pdf, other

    stat.ML cs.LG

    Algorithms that Approximate Data Removal: New Results and Limitations

    Authors: Vinith M. Suriyakumar, Ashia C. Wilson

    Abstract: We study the problem of deleting user data from machine learning models trained using empirical risk minimization. Our focus is on learning algorithms which return the empirical risk minimizer and approximate unlearning algorithms that comply with deletion requests that come streaming minibatches. Leveraging the infintesimal jacknife, we develop an online unlearning algorithm that is both computat… ▽ More

    Submitted 25 September, 2022; originally announced September 2022.

    Comments: Accepted to NeurIPS 2022

  6. arXiv:2206.02058  [pdf, other

    stat.ML cs.CY cs.LG

    When Personalization Harms: Reconsidering the Use of Group Attributes in Prediction

    Authors: Vinith M. Suriyakumar, Marzyeh Ghassemi, Berk Ustun

    Abstract: Machine learning models are often personalized with categorical attributes that are protected, sensitive, self-reported, or costly to acquire. In this work, we show models that are personalized with group attributes can reduce performance at a group level. We propose formal conditions to ensure the "fair use" of group attributes in prediction tasks by training one additional model -- i.e., collect… ▽ More

    Submitted 23 July, 2023; v1 submitted 4 June, 2022; originally announced June 2022.

    Comments: ICML 2023 Oral

  7. arXiv:2112.00193  [pdf, other

    cs.LG cs.CR

    Public Data-Assisted Mirror Descent for Private Model Training

    Authors: Ehsan Amid, Arun Ganesh, Rajiv Mathews, Swaroop Ramaswamy, Shuang Song, Thomas Steinke, Vinith M. Suriyakumar, Om Thakkar, Abhradeep Thakurta

    Abstract: In this paper, we revisit the problem of using in-distribution public data to improve the privacy/utility trade-offs for differentially private (DP) model training. (Here, public data refers to auxiliary data sets that have no privacy concerns.) We design a natural variant of DP mirror descent, where the DP gradients of the private/sensitive data act as the linear term, and the loss generated by t… ▽ More

    Submitted 27 March, 2022; v1 submitted 30 November, 2021; originally announced December 2021.

    Comments: 20 pages, 8 figures, 3 tables

  8. arXiv:2103.13497  [pdf, other

    eess.IV cs.CV

    3D Reasoning for Unsupervised Anomaly Detection in Pediatric WbMRI

    Authors: Alex Chang, Vinith Suriyakumar, Abhishek Moturu, James Tu, Nipaporn Tewattanarat, Sayali Joshi, Andrea Doria, Anna Goldenberg

    Abstract: Modern deep unsupervised learning methods have shown great promise for detecting diseases across a variety of medical imaging modalities. While previous generative modeling approaches successfully perform anomaly detection by learning the distribution of healthy 2D image slices, they process such slices independently and ignore the fact that they are correlated, all being sampled from a 3D volume.… ▽ More

    Submitted 24 March, 2021; originally announced March 2021.

    Comments: 10 pages, 2 tables, 3 figures, in submission

  9. arXiv:2010.06667  [pdf, other

    cs.LG cs.CR cs.CY stat.ML

    Chasing Your Long Tails: Differentially Private Prediction in Health Care Settings

    Authors: Vinith M. Suriyakumar, Nicolas Papernot, Anna Goldenberg, Marzyeh Ghassemi

    Abstract: Machine learning models in health care are often deployed in settings where it is important to protect patient privacy. In such settings, methods for differentially private (DP) learning provide a general-purpose approach to learn models with privacy guarantees. Modern methods for DP learning ensure privacy through mechanisms that censor information judged as too unique. The resulting privacy-pres… ▽ More

    Submitted 13 October, 2020; originally announced October 2020.

  10. arXiv:2006.00727  [pdf, other

    eess.IV cs.CV cs.LG

    Using Generative Models for Pediatric wbMRI

    Authors: Alex Chang, Vinith M. Suriyakumar, Abhishek Moturu, Nipaporn Tewattanarat, Andrea Doria, Anna Goldenberg

    Abstract: Early detection of cancer is key to a good prognosis and requires frequent testing, especially in pediatrics. Whole-body magnetic resonance imaging (wbMRI) is an essential part of several well-established screening protocols, with screening starting in early childhood. To date, machine learning (ML) has been used on wbMRI images to stage adult cancer patients. It is not possible to use such tools… ▽ More

    Submitted 1 June, 2020; originally announced June 2020.

    Report number: MIDL/2020/ExtendedAbstract/BXC_fpbLe