Skip to main content

Showing 1–18 of 18 results for author: Asi, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.10201  [pdf, other

    cs.DS cs.CR cs.IT cs.LG

    Private Vector Mean Estimation in the Shuffle Model: Optimal Rates Require Many Messages

    Authors: Hilal Asi, Vitaly Feldman, Jelani Nelson, Huy L. Nguyen, Kunal Talwar, Samson Zhou

    Abstract: We study the problem of private vector mean estimation in the shuffle model of privacy where $n$ users each have a unit vector $v^{(i)} \in\mathbb{R}^d$. We propose a new multi-message protocol that achieves the optimal error using $\tilde{\mathcal{O}}\left(\min(n\varepsilon^2,d)\right)$ messages per user. Moreover, we show that any (unbiased) protocol that achieves optimal error requires each use… ▽ More

    Submitted 25 April, 2024; v1 submitted 15 April, 2024; originally announced April 2024.

    Comments: Fixed author ordering

  2. arXiv:2403.15045  [pdf, ps, other

    cs.LG cs.CR

    DP-Dueling: Learning from Preference Feedback without Compromising User Privacy

    Authors: Aadirupa Saha, Hilal Asi

    Abstract: We consider the well-studied dueling bandit problem, where a learner aims to identify near-optimal actions using pairwise comparisons, under the constraint of differential privacy. We consider a general class of utility-based preference matrices for large (potentially unbounded) decision spaces and give the first differentially private dueling bandit algorithm for active learning with user prefere… ▽ More

    Submitted 22 March, 2024; originally announced March 2024.

  3. arXiv:2311.03797  [pdf, ps, other

    cs.LG cs.CR cs.DS math.OC

    User-level Differentially Private Stochastic Convex Optimization: Efficient Algorithms with Optimal Rates

    Authors: Hilal Asi, Daogao Liu

    Abstract: We study differentially private stochastic convex optimization (DP-SCO) under user-level privacy, where each user may hold multiple data items. Existing work for user-level DP-SCO either requires super-polynomial runtime [Ghazi et al. (2023)] or requires the number of users to grow polynomially with the dimensionality of the problem with additional strict assumptions [Bassily et al. (2023)]. We de… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

  4. arXiv:2306.04444  [pdf, other

    cs.LG cs.CR stat.ML

    Fast Optimal Locally Private Mean Estimation via Random Projections

    Authors: Hilal Asi, Vitaly Feldman, Jelani Nelson, Huy L. Nguyen, Kunal Talwar

    Abstract: We study the problem of locally private mean estimation of high-dimensional vectors in the Euclidean ball. Existing algorithms for this problem either incur sub-optimal error or have high communication and/or run-time complexity. We propose a new algorithmic framework, ProjUnit, for private mean estimation that yields algorithms that are computationally efficient, have low communication complexity… ▽ More

    Submitted 26 June, 2023; v1 submitted 7 June, 2023; originally announced June 2023.

    Comments: Added the correct github link

  5. arXiv:2302.14154  [pdf, ps, other

    cs.LG cs.CR math.OC stat.ML

    Near-Optimal Algorithms for Private Online Optimization in the Realizable Regime

    Authors: Hilal Asi, Vitaly Feldman, Tomer Koren, Kunal Talwar

    Abstract: We consider online learning problems in the realizable setting, where there is a zero-loss solution, and propose new Differentially Private (DP) algorithms that obtain near-optimal regret bounds. For the problem of online prediction from experts, we design new algorithms that obtain near-optimal regret ${O} \big( \varepsilon^{-1} \log^{1.5}{d} \big)$ where $d$ is the number of experts. This signif… ▽ More

    Submitted 27 February, 2023; originally announced February 2023.

  6. arXiv:2302.01855  [pdf, ps, other

    cs.LG stat.ML

    From Robustness to Privacy and Back

    Authors: Hilal Asi, Jonathan Ullman, Lydia Zakynthinou

    Abstract: We study the relationship between two desiderata of algorithms in statistical inference and machine learning: differential privacy and robustness to adversarial data corruptions. Their conceptual similarity was first observed by Dwork and Lei (STOC 2009), who observed that private algorithms satisfy robustness, and gave a general method for converting robust algorithms to private ones. However, al… ▽ More

    Submitted 3 February, 2023; originally announced February 2023.

  7. arXiv:2210.17070  [pdf, ps, other

    cs.LG cs.CR math.OC stat.ML

    Private optimization in the interpolation regime: faster rates and hardness results

    Authors: Hilal Asi, Karan Chadha, Gary Cheng, John Duchi

    Abstract: In non-private stochastic convex optimization, stochastic gradient methods converge much faster on interpolation problems -- problems where there exists a solution that simultaneously minimizes all of the sample losses -- than on non-interpolating ones; we show that generally similar improvements are impossible in the private setting. However, when the functions exhibit quadratic growth around the… ▽ More

    Submitted 31 October, 2022; originally announced October 2022.

    Comments: published at ICML 2022; 25 pages

  8. arXiv:2210.13537  [pdf, ps, other

    cs.LG cs.CR math.OC stat.ML

    Private Online Prediction from Experts: Separations and Faster Rates

    Authors: Hilal Asi, Vitaly Feldman, Tomer Koren, Kunal Talwar

    Abstract: Online prediction from experts is a fundamental problem in machine learning and several works have studied this problem under privacy constraints. We propose and analyze new algorithms for this problem that improve over the regret bounds of the best existing algorithms for non-adaptive adversaries. For approximate differential privacy, our algorithms achieve regret bounds of… ▽ More

    Submitted 29 June, 2023; v1 submitted 24 October, 2022; originally announced October 2022.

    Comments: Removed the results for the realizable setting which we uploaded with additional results for that setting in a separate paper. Added a proof sketch for the lower bound

  9. arXiv:2206.12041  [pdf, other

    math.ST cs.HC cs.LG

    How many labelers do you have? A closer look at gold-standard labels

    Authors: Chen Cheng, Hilal Asi, John Duchi

    Abstract: The construction of most supervised learning datasets revolves around collecting multiple labels for each instance, then aggregating the labels to form a type of ``gold-standard.''. We question the wisdom of this pipeline by developing a (stylized) theoretical model of this process and analyzing its statistical consequences, showing how access to non-aggregated label information can make training… ▽ More

    Submitted 23 June, 2022; originally announced June 2022.

    Comments: 51 pages, 4 figures

  10. arXiv:2205.02466  [pdf, other

    cs.LG cs.CR

    Optimal Algorithms for Mean Estimation under Local Differential Privacy

    Authors: Hilal Asi, Vitaly Feldman, Kunal Talwar

    Abstract: We study the problem of mean estimation of $\ell_2$-bounded vectors under the constraint of local differential privacy. While the literature has a variety of algorithms that achieve the asymptotically optimal rates for this problem, the performance of these algorithms in practice can vary significantly due to varying (and often large) hidden constants. In this work, we investigate the question of… ▽ More

    Submitted 5 May, 2022; originally announced May 2022.

  11. arXiv:2108.02391  [pdf, other

    cs.LG cs.CR math.OC stat.ML

    Adapting to Function Difficulty and Growth Conditions in Private Optimization

    Authors: Hilal Asi, Daniel Levy, John Duchi

    Abstract: We develop algorithms for private stochastic convex optimization that adapt to the hardness of the specific function we wish to optimize. While previous work provide worst-case bounds for arbitrary convex functions, it is often the case that the function at hand belongs to a smaller class that enjoys faster rates. Concretely, we show that for functions exhibiting $κ$-growth around the optimum, i.e… ▽ More

    Submitted 5 August, 2021; originally announced August 2021.

    Comments: 28 pages

  12. arXiv:2106.13756  [pdf, other

    cs.LG cs.CR math.OC stat.ML

    Private Adaptive Gradient Methods for Convex Optimization

    Authors: Hilal Asi, John Duchi, Alireza Fallah, Omid Javidbakht, Kunal Talwar

    Abstract: We study adaptive methods for differentially private convex optimization, proposing and analyzing differentially private variants of a Stochastic Gradient Descent (SGD) algorithm with adaptive stepsizes, as well as the AdaGrad algorithm. We provide upper bounds on the regret of both algorithms and show that the bounds are (worst-case) optimal. As a consequence of our development, we show that our… ▽ More

    Submitted 25 June, 2021; originally announced June 2021.

    Comments: To appear in 38th International Conference on Machine Learning (ICML 2021)

  13. arXiv:2106.09481  [pdf, other

    math.OC cs.DS cs.LG

    Stochastic Bias-Reduced Gradient Methods

    Authors: Hilal Asi, Yair Carmon, Arun Jambulapati, Yujia Jin, Aaron Sidford

    Abstract: We develop a new primitive for stochastic optimization: a low-bias, low-cost estimator of the minimizer $x_\star$ of any Lipschitz strongly-convex function. In particular, we use a multilevel Monte-Carlo approach due to Blanchet and Glynn to turn any optimal stochastic gradient method into an estimator of $x_\star$ with bias $δ$, variance $O(\log(1/δ))$, and an expected sampling cost of… ▽ More

    Submitted 28 October, 2021; v1 submitted 17 June, 2021; originally announced June 2021.

  14. arXiv:2103.01516  [pdf, ps, other

    cs.LG cs.CR math.OC stat.ML

    Private Stochastic Convex Optimization: Optimal Rates in $\ell_1$ Geometry

    Authors: Hilal Asi, Vitaly Feldman, Tomer Koren, Kunal Talwar

    Abstract: Stochastic convex optimization over an $\ell_1$-bounded domain is ubiquitous in machine learning applications such as LASSO but remains poorly understood when learning with differential privacy. We show that, up to logarithmic factors the optimal excess population loss of any $(\varepsilon,δ)$-differentially private optimizer is $\sqrt{\log(d)/n} + \sqrt{d}/\varepsilon n.$ The upper bound is based… ▽ More

    Submitted 2 March, 2021; originally announced March 2021.

  15. arXiv:2005.10630  [pdf, other

    cs.CR cs.LG stat.ML

    Near Instance-Optimality in Differential Privacy

    Authors: Hilal Asi, John C. Duchi

    Abstract: We develop two notions of instance optimality in differential privacy, inspired by classical statistical theory: one by defining a local minimax risk and the other by considering unbiased mechanisms and analogizing the Cramer-Rao bound, and we show that the local modulus of continuity of the estimand of interest completely determines these quantities. We also develop a complementary collection mec… ▽ More

    Submitted 16 May, 2020; originally announced May 2020.

  16. arXiv:2004.12002  [pdf, other

    cs.CC cs.DS cs.IT

    Finding Planted Cliques in Sublinear Time

    Authors: Jay Mardia, Hilal Asi, Kabir Aladin Chandrasekher

    Abstract: We study the planted clique problem in which a clique of size k is planted in an Erdos-Renyi graph G(n,1/2) and one is interested in recovering this planted clique. It is widely believed that it exhibits a statistical-computational gap when computational efficiency is equated with the existence of polynomial time algorithms. We study this problem under a more fine-grained computational lens and co… ▽ More

    Submitted 17 October, 2022; v1 submitted 24 April, 2020; originally announced April 2020.

  17. arXiv:1912.04042  [pdf, other

    cs.LG cs.CR stat.ML

    Element Level Differential Privacy: The Right Granularity of Privacy

    Authors: Hilal Asi, John Duchi, Omid Javidbakht

    Abstract: Differential Privacy (DP) provides strong guarantees on the risk of compromising a user's data in statistical learning applications, though these strong protections make learning challenging and may be too stringent for some use cases. To address this, we propose element level differential privacy, which extends differential privacy to provide protection against leaking information about any parti… ▽ More

    Submitted 5 December, 2019; originally announced December 2019.

    Comments: 34 pages, 5 figures

  18. arXiv:1701.07206  [pdf, ps, other

    cs.IT

    Nearly Optimal Constructions of PIR and Batch Codes

    Authors: Hilal Asi, Eitan Yaakobi

    Abstract: In this work we study two families of codes with availability, namely private information retrieval (PIR) codes and batch codes. While the former requires that every information symbol has $k$ mutually disjoint recovering sets, the latter asks this property for every multiset request of $k$ information symbols. The main problem under this paradigm is to minimize the number of redundancy symbols. W… ▽ More

    Submitted 5 June, 2017; v1 submitted 25 January, 2017; originally announced January 2017.

    Comments: To be presented at the IEEE Int'l Symp. on Information Theory, 2017