Skip to main content

Showing 1–28 of 28 results for author: Kasiviswanathan, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.04806  [pdf, other

    cs.DC cs.LG

    The PetShop Dataset -- Finding Causes of Performance Issues across Microservices

    Authors: Michaela Hardt, William R. Orchard, Patrick Blöbaum, Shiva Kasiviswanathan, Elke Kirschbaum

    Abstract: Identifying root causes for unexpected or undesirable behavior in complex systems is a prevalent challenge. This issue becomes especially crucial in modern cloud applications that employ numerous microservices. Although the machine learning and systems research communities have proposed various techniques to tackle this problem, there is currently a lack of standardized datasets for quantitative b… ▽ More

    Submitted 8 April, 2024; v1 submitted 8 November, 2023; originally announced November 2023.

    Comments: 22 pages, 6 figures, 10 tables, for associated git repo see https://github.com/amazon-science/petshop-root-cause-analysis/, to be published in Proceedings of Machine Learning Research vol 236, 2024, 3rd Conference on Causal Learning and Reasoning

    ACM Class: E.0

  2. arXiv:2306.06721  [pdf, other

    stat.ML cs.CR cs.LG

    Differentially Private Conditional Independence Testing

    Authors: Iden Kalemaj, Shiva Prasad Kasiviswanathan, Aaditya Ramdas

    Abstract: Conditional independence (CI) tests are widely used in statistical data analysis, e.g., they are the building block of many algorithms for causal graph discovery. The goal of a CI test is to accept or reject the null hypothesis that $X \perp \!\!\! \perp Y \mid Z$, where $X \in \mathbb{R}, Y \in \mathbb{R}, Z \in \mathbb{R}^d$. In this work, we investigate conditional independence testing under th… ▽ More

    Submitted 22 March, 2024; v1 submitted 11 June, 2023; originally announced June 2023.

  3. arXiv:2304.10613  [pdf, other

    cs.LG stat.ML

    Debiasing Conditional Stochastic Optimization

    Authors: Lie He, Shiva Prasad Kasiviswanathan

    Abstract: In this paper, we study the conditional stochastic optimization (CSO) problem which covers a variety of applications including portfolio selection, reinforcement learning, robust learning, causal inference, etc. The sample-averaged gradient of the CSO objective is biased due to its nested structure, and therefore requires a high sample complexity for convergence. We introduce a general stochastic… ▽ More

    Submitted 3 December, 2023; v1 submitted 20 April, 2023; originally announced April 2023.

  4. arXiv:2302.00860  [pdf, other

    stat.ML cs.LG stat.ME

    Interventional and Counterfactual Inference with Diffusion Models

    Authors: Patrick Chao, Patrick Blöbaum, Shiva Prasad Kasiviswanathan

    Abstract: We consider the problem of answering observational, interventional, and counterfactual queries in a causally sufficient setting where only observational data and the causal graph are available. Utilizing the recent developments in diffusion models, we introduce diffusion-based causal models (DCM) to learn causal mechanisms, that generate unique latent encodings. These encodings enable us to direct… ▽ More

    Submitted 6 June, 2023; v1 submitted 1 February, 2023; originally announced February 2023.

  5. arXiv:2301.05182  [pdf, other

    cs.LG cs.AI stat.ML

    Thompson Sampling with Diffusion Generative Prior

    Authors: Yu-Guan Hsieh, Shiva Prasad Kasiviswanathan, Branislav Kveton, Patrick Blöbaum

    Abstract: In this work, we initiate the idea of using denoising diffusion models to learn priors for online decision making problems. Our special focus is on the meta-learning for bandit framework, with the goal of learning a strategy that performs well across bandit tasks of a same class. To this end, we train a diffusion model that learns the underlying task distribution and combine Thompson sampling with… ▽ More

    Submitted 30 January, 2023; v1 submitted 12 January, 2023; originally announced January 2023.

  6. arXiv:2212.07383  [pdf, other

    stat.ML cs.LG math.ST stat.ME

    Sequential Kernelized Independence Testing

    Authors: Aleksandr Podkopaev, Patrick Blöbaum, Shiva Prasad Kasiviswanathan, Aaditya Ramdas

    Abstract: Independence testing is a classical statistical problem that has been extensively studied in the batch setting when one fixes the sample size before collecting data. However, practitioners often prefer procedures that adapt to the complexity of a problem at hand instead of setting sample size in advance. Ideally, such procedures should (a) stop earlier on easy tasks (and later on harder tasks), he… ▽ More

    Submitted 19 July, 2023; v1 submitted 14 December, 2022; originally announced December 2022.

    Comments: To appear at ICML 2023

  7. arXiv:2206.04091  [pdf, other

    stat.ML cs.LG

    Uplifting Bandits

    Authors: Yu-Guan Hsieh, Shiva Prasad Kasiviswanathan, Branislav Kveton

    Abstract: We introduce a multi-armed bandit model where the reward is a sum of multiple random variables, and each action only alters the distributions of some of them. After each action, the agent observes the realizations of all the variables. This model is motivated by marketing campaigns and recommender systems, where the variables represent outcomes on individual customers, such as clicks. We propose U… ▽ More

    Submitted 8 June, 2022; originally announced June 2022.

  8. arXiv:2107.03022  [pdf, other

    cs.LG

    Reconstructing Test Labels from Noisy Loss Functions

    Authors: Abhinav Aggarwal, Shiva Prasad Kasiviswanathan, Zekun Xu, Oluwaseyi Feyisetan, Nathanael Teissier

    Abstract: Machine learning classifiers rely on loss functions for performance evaluation, often on a private (hidden) dataset. In a recent line of research, label inference was introduced as the problem of reconstructing the ground truth labels of this private dataset from just the (possibly perturbed) cross-entropy loss function values evaluated at chosen prediction vectors (without any other access to the… ▽ More

    Submitted 30 October, 2021; v1 submitted 7 July, 2021; originally announced July 2021.

    Comments: Accepted at NeurIPS 2021 Workshop on Privacy in Machine Learning (PriML)

  9. arXiv:2106.03028  [pdf, other

    cs.LG cs.AI

    Collaborative Causal Discovery with Atomic Interventions

    Authors: Raghavendra Addanki, Shiva Prasad Kasiviswanathan

    Abstract: We introduce a new Collaborative Causal Discovery problem, through which we model a common scenario in which we have multiple independent entities each with their own causal graph, and the goal is to simultaneously learn all these causal graphs. We study this problem without the causal sufficiency assumption, using Maximal Ancestral Graphs (MAG) to model the causal graphs, and assuming that we hav… ▽ More

    Submitted 6 June, 2021; originally announced June 2021.

  10. arXiv:2105.08266  [pdf, other

    cs.LG

    Label Inference Attacks from Log-loss Scores

    Authors: Abhinav Aggarwal, Shiva Prasad Kasiviswanathan, Zekun Xu, Oluwaseyi Feyisetan, Nathanael Teissier

    Abstract: Log-loss (also known as cross-entropy loss) metric is ubiquitously used across machine learning applications to assess the performance of classification algorithms. In this paper, we investigate the problem of inferring the labels of a dataset from single (or multiple) log-loss score(s), without any other access to the dataset. Surprisingly, we show that for any finite number of label classes, it… ▽ More

    Submitted 11 June, 2021; v1 submitted 18 May, 2021; originally announced May 2021.

    Comments: Accepted at ICML 2021

  11. arXiv:2005.11736  [pdf, other

    cs.LG cs.DS stat.ML

    Efficient Intervention Design for Causal Discovery with Latents

    Authors: Raghavendra Addanki, Shiva Prasad Kasiviswanathan, Andrew McGregor, Cameron Musco

    Abstract: We consider recovering a causal graph in presence of latent variables, where we seek to minimize the cost of interventions used in the recovery process. We consider two intervention cost models: (1) a linear cost model where the cost of an intervention on a subset of variables has a linear form, and (2) an identity cost model where the cost of an intervention is the same, regardless of what variab… ▽ More

    Submitted 12 July, 2020; v1 submitted 24 May, 2020; originally announced May 2020.

    Comments: International Conference on Machine Learning 2020

  12. arXiv:1904.05510  [pdf, ps, other

    cs.LG cs.DS stat.ML

    Restricted Isometry Property under High Correlations

    Authors: Shiva Prasad Kasiviswanathan, Mark Rudelson

    Abstract: Matrices satisfying the Restricted Isometry Property (RIP) play an important role in the areas of compressed sensing and statistical learning. RIP matrices with optimal parameters are mainly obtained via probabilistic arguments, as explicit constructions seem hard. It is therefore interesting to ask whether a fixed matrix can be incorporated into a construction of restricted isometries. In this pa… ▽ More

    Submitted 31 October, 2019; v1 submitted 10 April, 2019; originally announced April 2019.

    Comments: 30 pages, fixed minor typos

  13. arXiv:1808.00087  [pdf, other

    cs.LG cs.CR stat.ML

    Subsampled Rényi Differential Privacy and Analytical Moments Accountant

    Authors: Yu-Xiang Wang, Borja Balle, Shiva Kasiviswanathan

    Abstract: We study the problem of subsampling in differential privacy (DP), a question that is the centerpiece behind many successful differentially private machine learning algorithms. Specifically, we provide a tight upper bound on the Rényi Differential Privacy (RDP) (Mironov, 2017) parameters for algorithms that: (1) subsample the dataset, and then (2) applies a randomized mechanism M to the subsample,… ▽ More

    Submitted 4 December, 2018; v1 submitted 31 July, 2018; originally announced August 2018.

  14. arXiv:1710.07850  [pdf, other

    stat.ML cs.AI cs.LG

    Deep Neural Network Approximation using Tensor Sketching

    Authors: Shiva Prasad Kasiviswanathan, Nina Narodytska, Hongxia Jin

    Abstract: Deep neural networks are powerful learning models that achieve state-of-the-art performance on many computer vision, speech, and language processing tasks. In this paper, we study a fundamental question that arises when designing deep network architectures: Given a target network architecture can we design a smaller network architecture that approximates the operation of the target network? The qu… ▽ More

    Submitted 21 October, 2017; originally announced October 2017.

    Comments: 19 pages

  15. arXiv:1709.06662  [pdf, other

    stat.ML cs.AI cs.CR cs.LG

    Verifying Properties of Binarized Deep Neural Networks

    Authors: Nina Narodytska, Shiva Prasad Kasiviswanathan, Leonid Ryzhyk, Mooly Sagiv, Toby Walsh

    Abstract: Understanding properties of deep neural networks is an important challenge in deep learning. In this paper, we take a step in this direction by proposing a rigorous way of verifying properties of a popular class of neural networks, Binarized Neural Networks, using the well-developed means of Boolean satisfiability. Our main contribution is a construction that creates a representation of a binarize… ▽ More

    Submitted 31 May, 2018; v1 submitted 19 September, 2017; originally announced September 2017.

    Comments: 10 pages

  16. arXiv:1707.08092  [pdf, other

    stat.ML cs.DS math.ST

    Restricted Eigenvalue from Stable Rank with Applications to Sparse Linear Regression

    Authors: Shiva Prasad Kasiviswanathan, Mark Rudelson

    Abstract: High-dimensional settings, where the data dimension ($d$) far exceeds the number of observations ($n$), are common in many statistical and machine learning applications. Methods based on $\ell_1$-relaxation, such as Lasso, are very popular for sparse recovery in these settings. Restricted Eigenvalue (RE) condition is among the weakest, and hence the most general, condition in literature imposed on… ▽ More

    Submitted 17 February, 2018; v1 submitted 25 July, 2017; originally announced July 2017.

    Comments: 27 pages, Updated paper with stronger results, Corrected Applications

  17. arXiv:1701.01093  [pdf, ps, other

    cs.DS cs.CR stat.ML

    Private Incremental Regression

    Authors: Shiva Prasad Kasiviswanathan, Kobbi Nissim, Hongxia Jin

    Abstract: Data is continuously generated by modern data sources, and a recent challenge in machine learning has been to develop techniques that perform well in an incremental (streaming) setting. In this paper, we investigate the problem of private machine learning, where as common in practice, the data is not given at once, but rather arrives incrementally over time. We introduce the problems of private… ▽ More

    Submitted 4 January, 2017; originally announced January 2017.

    Comments: To appear in PODS 2017

  18. arXiv:1612.06299  [pdf, other

    cs.LG cs.CR stat.ML

    Simple Black-Box Adversarial Perturbations for Deep Networks

    Authors: Nina Narodytska, Shiva Prasad Kasiviswanathan

    Abstract: Deep neural networks are powerful and popular learning models that achieve state-of-the-art pattern recognition performance on many computer vision, speech, and language processing tasks. However, these networks have also been shown susceptible to carefully crafted adversarial perturbations which force misclassification of the inputs. Adversarial examples enable adversaries to subvert the expected… ▽ More

    Submitted 19 December, 2016; originally announced December 2016.

    Comments: 19 Pages

  19. arXiv:1504.05880  [pdf, other

    stat.ML cs.CR cs.LG

    Spectral Norm of Random Kernel Matrices with Applications to Privacy

    Authors: Shiva Prasad Kasiviswanathan, Mark Rudelson

    Abstract: Kernel methods are an extremely popular set of techniques used for many important machine learning and data analysis applications. In addition to having good practical performances, these methods are supported by a well-developed theory. Kernel methods use an implicit mapping of the input data into a high dimensional feature space defined by a kernel function, i.e., a function returning the inner… ▽ More

    Submitted 22 April, 2015; originally announced April 2015.

    Comments: 16 pages, 1 Figure

    ACM Class: F.2.1

  20. arXiv:1210.2381  [pdf, ps, other

    cs.DS cs.CR cs.LG math.PR

    The Power of Linear Reconstruction Attacks

    Authors: Shiva Prasad Kasiviswanathan, Mark Rudelson, Adam Smith

    Abstract: We consider the power of linear reconstruction attacks in statistical data privacy, showing that they can be applied to a much wider range of settings than previously understood. Linear attacks have been studied before (Dinur and Nissim PODS'03, Dwork, McSherry and Talwar STOC'07, Kasiviswanathan, Rudelson, Smith and Ullman STOC'10, De TCC'12, Muthukrishnan and Nikolov STOC'12) but have so far bee… ▽ More

    Submitted 8 October, 2012; originally announced October 2012.

    Comments: 30 pages, to appear in ACM-SIAM Symposium on Discrete Algorithms (SODA 2013)

  21. arXiv:1206.6384  [pdf

    cs.LG stat.ML

    Efficient and Practical Stochastic Subgradient Descent for Nuclear Norm Regularization

    Authors: Haim Avron, Satyen Kale, Shiva Kasiviswanathan, Vikas Sindhwani

    Abstract: We describe novel subgradient methods for a broad class of matrix optimization problems involving nuclear norm regularization. Unlike existing approaches, our method executes very cheap iterations by combining low-rank stochastic subgradients with efficient incremental SVD updates, made possible by highly optimized and parallelizable dense linear algebra operations on small matrices. Our practical… ▽ More

    Submitted 27 June, 2012; originally announced June 2012.

    Comments: Appears in Proceedings of the 29th International Conference on Machine Learning (ICML 2012)

  22. arXiv:1010.3605  [pdf, other

    math.CO cond-mat.dis-nn cond-mat.stat-mech cs.CG cs.DS

    The rigidity transition in random graphs

    Authors: Shiva Prasad Kasiviswanathan, Cristopher Moore, Louis Theran

    Abstract: As we add rigid bars between points in the plane, at what point is there a giant (linear-sized) rigid component, which can be rotated and translated, but which has no internal flexibility? If the points are generic, this depends only on the combinatorics of the graph formed by the bars. We show that if this graph is an Erdos-Renyi random graph G(n,c/n), then there exists a sharp threshold for a gi… ▽ More

    Submitted 26 November, 2010; v1 submitted 18 October, 2010; originally announced October 2010.

    Comments: To appear in SODA'11. Added proofs omitted from the proceedings version

  23. arXiv:0906.1953  [pdf, ps, other

    cs.DS cs.DM

    An Exponential Time 2-Approximation Algorithm for Bandwidth

    Authors: Martin Fürer, Serge Gaspers, Shiva Prasad Kasiviswanathan

    Abstract: The bandwidth of a graph G on n vertices is the minimum b such that the vertices of G can be labeled from 1 to n such that the labels of every pair of adjacent vertices differ by at most b. In this paper, we present a 2-approximation algorithm for the bandwidth problem that takes worst-case O(1.9797^n) time and uses polynomial space. This improves both the previous best 2- and 3-approximation al… ▽ More

    Submitted 29 April, 2012; v1 submitted 10 June, 2009; originally announced June 2009.

    ACM Class: F.2.2; G.2.2

  24. Approximately Counting Embeddings into Random Graphs

    Authors: Martin Furer, Shiva Prasad Kasiviswanathan

    Abstract: Let H be a graph, and let C_H(G) be the number of (subgraph isomorphic) copies of H contained in a graph G. We investigate the fundamental problem of estimating C_H(G). Previous results cover only a few specific instances of this general problem, for example, the case when H has degree at most one (monomer-dimer problem). In this paper, we present the first general subcase of the subgraph isomorph… ▽ More

    Submitted 21 June, 2013; v1 submitted 13 June, 2008; originally announced June 2008.

    Comments: Earlier version appeared in Random 2008. Fixed an typo in Definition 3.1

    Journal ref: Combinator. Probab. Comp. 23 (2014) 1028-1056

  25. On the `Semantics' of Differential Privacy: A Bayesian Formulation

    Authors: Shiva Prasad Kasiviswanathan, Adam Smith

    Abstract: Differential privacy is a definition of "privacy'" for algorithms that analyze and publish information about statistical databases. It is often claimed that differential privacy provides guarantees against adversaries with arbitrary side information. In this paper, we provide a precise formulation of these guarantees in terms of the inferences drawn by a Bayesian adversary. We show that this formu… ▽ More

    Submitted 22 January, 2023; v1 submitted 27 March, 2008; originally announced March 2008.

    Comments: Older version of this paper was titled: "A Note on Differential Privacy: Defining Resistance to Arbitrary Side Information"

    Journal ref: Journal of Privacy and Confidentiality, 6 (1), 2014

  26. arXiv:0803.0924  [pdf, other

    cs.LG cs.CC cs.CR cs.DB

    What Can We Learn Privately?

    Authors: Shiva Prasad Kasiviswanathan, Homin K. Lee, Kobbi Nissim, Sofya Raskhodnikova, Adam Smith

    Abstract: Learning problems form an important category of computational tasks that generalizes many of the computations researchers apply to large real-life data sets. We ask: what concept classes can be learned privately, namely, by an algorithm whose output does not depend too heavily on any one input or specific training example? More precisely, we investigate learning algorithms that satisfy different… ▽ More

    Submitted 18 February, 2010; v1 submitted 6 March, 2008; originally announced March 2008.

    Comments: 35 pages, 2 figures

    Journal ref: SIAM Journal of Computing 40(3) (2011) 793-826

  27. arXiv:0803.0032  [pdf, other

    cs.DB cs.CR

    Composition Attacks and Auxiliary Information in Data Privacy

    Authors: Srivatsava Ranjit Ganta, Shiva Prasad Kasiviswanathan, Adam Smith

    Abstract: Privacy is an increasingly important aspect of data publishing. Reasoning about privacy, however, is fraught with pitfalls. One of the most significant is the auxiliary information (also called external knowledge, background knowledge, or side information) that an adversary gleans from other channels such as the web, public records, or domain knowledge. This paper explores how one can reason abo… ▽ More

    Submitted 31 March, 2008; v1 submitted 29 February, 2008; originally announced March 2008.

  28. arXiv:cs/0605029  [pdf, ps, other

    cs.CG

    Spanners for Geometric Intersection Graphs

    Authors: Martin Furer, Shiva Prasad Kasiviswanathan

    Abstract: Efficient algorithms are presented for constructing spanners in geometric intersection graphs. For a unit ball graph in R^k, a (1+ε)-spanner is obtained using efficient partitioning of the space into hypercubes and solving bichromatic closest pair problems. The spanner construction has almost equivalent complexity to the construction of Euclidean minimum spanning trees. The results are extended… ▽ More

    Submitted 7 May, 2006; originally announced May 2006.

    Comments: 16 pages, 5 figures, Latex

    ACM Class: F.2.2

    Journal ref: Journal of Computational Geometry 3(1) (2012) 31-64