Skip to main content

Showing 1–16 of 16 results for author: Zamir, O

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.16589  [pdf, ps, other

    math.CO cs.DM

    Sumsets in the Hypercube

    Authors: Noga Alon, Or Zamir

    Abstract: A subset $S$ of the Boolean hypercube $\mathbb{F}_2^n$ is a sumset if $S = A+A = \{a + b \ | \ a, b\in A\}$ for some $A \subseteq \mathbb{F}_2^n$. We prove that the number of sumsets in $\mathbb{F}_2^n$ is asymptotically $(2^n-1)2^{2^{n-1}}$. Furthermore, we show that the family of sumsets in $\mathbb{F}_2^n$ is almost identical to the family of all subsets of $\mathbb{F}_2^n$ that contain a compl… ▽ More

    Submitted 16 April, 2024; v1 submitted 25 March, 2024; originally announced March 2024.

  2. arXiv:2401.10360  [pdf, ps, other

    cs.CR cs.LG

    Excuse me, sir? Your language model is leaking (information)

    Authors: Or Zamir

    Abstract: We introduce a cryptographic method to hide an arbitrary secret payload in the response of a Large Language Model (LLM). A secret key is required to extract the payload from the model's response, and without the key it is provably impossible to distinguish between the responses of the original LLM and the LLM that hides a payload. In particular, the quality of generated text is not affected by the… ▽ More

    Submitted 18 January, 2024; originally announced January 2024.

  3. arXiv:2401.07242  [pdf, ps, other

    cs.DS cs.CC math.CO

    Testing Sumsets is Hard

    Authors: Xi Chen, Shivam Nadimpalli, Tim Randolph, Rocco A. Servedio, Or Zamir

    Abstract: A subset $S$ of the Boolean hypercube $\mathbb{F}_2^n$ is a sumset if $S = \{a + b : a, b\in A\}$ for some $A \subseteq \mathbb{F}_2^n$. Sumsets are central objects of study in additive combinatorics, featuring in several influential results. We prove a lower bound of $Ω(2^{n/2})$ for the number of queries needed to test whether a Boolean function $f:\mathbb{F}_2^n \to \{0,1\}$ is the indicator fu… ▽ More

    Submitted 4 February, 2024; v1 submitted 14 January, 2024; originally announced January 2024.

    Comments: 18 pages

  4. arXiv:2308.16042  [pdf, ps, other

    cs.DS

    Optimal Non-Adaptive Cell Probe Dictionaries and Hashing

    Authors: Kasper Green Larsen, Rasmus Pagh, Giuseppe Persiano, Toniann Pitassi, Kevin Yeo, Or Zamir

    Abstract: We present a simple and provably optimal non-adaptive cell probe data structure for the static dictionary problem. Our data structure supports storing a set of n key-value pairs from [u]x[u] using s words of space and answering key lookup queries in t = O(lg(u/n)/ lg(s/n)) nonadaptive probes. This generalizes a solution to the membership problem (i.e., where no values are associated with keys) due… ▽ More

    Submitted 19 April, 2024; v1 submitted 30 August, 2023; originally announced August 2023.

    Comments: Appears at ICALP 2024. This paper is a merge and revision of two previous reports [PY20] and [LPPZ23]

  5. arXiv:2306.09194  [pdf, ps, other

    cs.CR cs.CL cs.LG

    Undetectable Watermarks for Language Models

    Authors: Miranda Christ, Sam Gunn, Or Zamir

    Abstract: Recent advances in the capabilities of large language models such as GPT-4 have spurred increasing concern about our ability to detect AI-generated text. Prior works have suggested methods of embedding watermarks in model outputs, by noticeably altering the output distribution. We ask: Is it possible to introduce a watermark without incurring any detectable change to the output distribution? To… ▽ More

    Submitted 24 May, 2023; originally announced June 2023.

  6. arXiv:2211.11737  [pdf, ps, other

    cs.DS cs.CC math.CO

    Algorithmic Applications of Hypergraph and Partition Containers

    Authors: Or Zamir

    Abstract: We present a general method to convert algorithms into faster algorithms for almost-regular input instances. Informally, an almost-regular input is an input in which the maximum degree is larger than the average degree by at most a constant factor. This family of inputs vastly generalizes several families of inputs for which we commonly have improved algorithms, including bounded-degree inputs and… ▽ More

    Submitted 21 November, 2022; originally announced November 2022.

  7. arXiv:2211.08563  [pdf, ps, other

    cs.CC

    The wrong direction of Jensen's inequality is algorithmically right

    Authors: Or Zamir

    Abstract: Let $\mathcal{A}$ be an algorithm with expected running time $e^X$, conditioned on the value of some random variable $X$. We construct an algorithm $\mathcal{A'}$ with expected running time $O(e^{E[X]})$, that fully executes $\mathcal{A}$. In particular, an algorithm whose running time is a random variable $T$ can be converted to one with expected running time $O(e^{E[\ln T]})$, which is never wor… ▽ More

    Submitted 15 November, 2022; originally announced November 2022.

  8. arXiv:2204.10465  [pdf, other

    cs.DS

    Hardness of Approximation in P via Short Cycle Removal: Cycle Detection, Distance Oracles, and Beyond

    Authors: Amir Abboud, Karl Bringmann, Seri Khoury, Or Zamir

    Abstract: We present a new technique for efficiently removing almost all short cycles in a graph without unintentionally removing its triangles. Consequently, triangle finding problems do not become easy even in almost $k$-cycle free graphs, for any constant $k\geq 4$. Triangle finding is at the base of many conditional lower bounds in P, mainly for distance computation problems, and the existence of many… ▽ More

    Submitted 15 October, 2022; v1 submitted 21 April, 2022; originally announced April 2022.

    Comments: The abstract was slightly shortened to meet arXiv requirements. Appears in STOC 2022

  9. arXiv:2204.06974  [pdf, other

    cs.LG cs.CR

    Planting Undetectable Backdoors in Machine Learning Models

    Authors: Shafi Goldwasser, Michael P. Kim, Vinod Vaikuntanathan, Or Zamir

    Abstract: Given the computational cost and technical expertise required to train machine learning models, users may delegate the task of learning to a service provider. We show how a malicious learner can plant an undetectable backdoor into a classifier. On the surface, such a backdoored classifier behaves normally, but in reality, the learner maintains a mechanism for changing the classification of any inp… ▽ More

    Submitted 14 April, 2022; originally announced April 2022.

  10. arXiv:2110.03122  [pdf, ps, other

    cs.DS

    Faster algorithm for Unique $(k,2)$-CSP

    Authors: Or Zamir

    Abstract: In a $(k,2)$-Constraint Satisfaction Problem we are given a set of arbitrary constraints on pairs of $k$-ary variables, and are asked to find an assignment of values to these variables such that all constraints are satisfied. The $(k,2)$-CSP problem generalizes problems like $k$-coloring and $k$-list-coloring. In the Unique $(k,2)$-CSP problem, we add the assumption that the input set of constrain… ▽ More

    Submitted 29 June, 2022; v1 submitted 6 October, 2021; originally announced October 2021.

  11. arXiv:2107.01804  [pdf, other

    cs.DS cs.LG math.PR

    Randomized Dimensionality Reduction for Facility Location and Single-Linkage Clustering

    Authors: Shyam Narayanan, Sandeep Silwal, Piotr Indyk, Or Zamir

    Abstract: Random dimensionality reduction is a versatile tool for speeding up algorithms for high-dimensional problems. We study its application to two clustering problems: the facility location problem, and the single-linkage hierarchical clustering problem, which is equivalent to computing the minimum spanning tree. We show that if we project the input pointset $X$ onto a random $d = O(d_X)$-dimensional s… ▽ More

    Submitted 5 July, 2021; originally announced July 2021.

    Comments: 25 pages. Published as a conference paper in ICML 2021

  12. arXiv:2007.10790  [pdf, other

    cs.DS

    Breaking the $2^n$ barrier for 5-coloring and 6-coloring

    Authors: Or Zamir

    Abstract: The coloring problem (i.e., computing the chromatic number of a graph) can be solved in $O^*(2^n)$ time, as shown by Björklund, Husfeldt and Koivisto in 2009. For $k=3,4$, better algorithms are known for the $k$-coloring problem. $3$-coloring can be solved in $O(1.33^n)$ time (Beigel and Eppstein, 2005) and $4$-coloring can be solved in $O(1.73^n)$ time (Fomin, Gaspers and Saurabh, 2007). Surprisi… ▽ More

    Submitted 11 February, 2021; v1 submitted 21 July, 2020; originally announced July 2020.

  13. arXiv:1909.11147  [pdf, other

    cs.DM cs.DC cs.DS

    Random $k$-out subgraph leaves only $O(n/k)$ inter-component edges

    Authors: Jacob Holm, Valerie King, Mikkel Thorup, Or Zamir, Uri Zwick

    Abstract: Each vertex of an arbitrary simple graph on $n$ vertices chooses $k$ random incident edges. What is the expected number of edges in the original graph that connect different connected components of the sampled subgraph? We prove that the answer is $O(n/k)$, when $k\ge c\log n$, for some large enough $c$. We conjecture that the same holds for smaller values of $k$, possibly for any $k\ge 2$. Such a… ▽ More

    Submitted 24 September, 2019; originally announced September 2019.

    Comments: 22 pages, 1 figure, to appear at FOCS 2019

  14. arXiv:1802.07041  [pdf, other

    cs.DS

    Selection from heaps, row-sorted matrices and $X+Y$ using soft heaps

    Authors: Haim Kaplan, László Kozma, Or Zamir, Uri Zwick

    Abstract: We use soft heaps to obtain simpler optimal algorithms for selecting the $k$-th smallest item, and the set of~$k$ smallest items, from a heap-ordered tree, from a collection of sorted lists, and from $X+Y$, where $X$ and $Y$ are two unsorted sets. Our results match, and in some ways extend and improve, classical results of Frederickson (1993) and Frederickson and Johnson (1982). In particular, for… ▽ More

    Submitted 20 February, 2018; originally announced February 2018.

    Comments: 20 pages, 4 figures

    MSC Class: 68W05 ACM Class: F.2.2; E.1

  15. arXiv:1510.04622  [pdf, other

    cs.CC cs.DS

    Subtree Isomorphism Revisited

    Authors: Amir Abboud, Arturs Backurs, Thomas Dueholm Hansen, Virginia Vassilevska Williams, Or Zamir

    Abstract: The Subtree Isomorphism problem asks whether a given tree is contained in another given tree. The problem is of fundamental importance and has been studied since the 1960s. For some variants, e.g., ordered trees, near-linear time algorithms are known, but for the general case truly subquadratic algorithms remain elusive. Our first result is a reduction from the Orthogonal Vectors problem to Subt… ▽ More

    Submitted 15 October, 2015; originally announced October 2015.

  16. arXiv:1504.05218  [pdf, other

    cs.CG cs.RO

    Motion Planning for Unlabeled Discs with Optimality Guarantees

    Authors: Kiril Solovey, **g** Yu, Or Zamir, Dan Halperin

    Abstract: We study the problem of path planning for unlabeled (indistinguishable) unit-disc robots in a planar environment cluttered with polygonal obstacles. We introduce an algorithm which minimizes the total path length, i.e., the sum of lengths of the individual paths. Our algorithm is guaranteed to find a solution if one exists, or report that none exists otherwise. It runs in time… ▽ More

    Submitted 20 April, 2015; originally announced April 2015.