[ { "id": "https://authors.library.caltech.edu/records/kcd3f-5va43", "eprint_id": 96884, "eprint_status": "archive", "datestamp": "2023-08-20 00:41:32", "lastmod": "2023-10-20 21:35:43", "type": "monograph", "metadata_visibility": "show", "creators": { "items": [ { "id": "Zhou-Shuheng", "name": { "family": "Zhou", "given": "Shuheng" } }, { "id": "Ligett-K", "name": { "family": "Ligett", "given": "Katrina" }, "orcid": "0000-0003-2780-6656" }, { "id": "Wasserman-L", "name": { "family": "Wasserman", "given": "Larry" } } ] }, "title": "Differential Privacy with Compression", "ispublished": "unpub", "full_text_status": "public", "note": "We thank Avrim Blum and John Lafferty for helpful discussions. KL is supported in part by an NSF Graduate Research Fellowship. LW and SZ's research is supported by NSF grant CCF-0625879, a Google research grant and a grant from Carnegie Mellon's Cylab.\n\n
Submitted - 0901.1365.pdf
", "abstract": "This work studies formal utility and privacy guarantees for a simple multiplicative database transformation, where the data are compressed by a random linear or affine transformation, reducing the number of data records substantially, while preserving the number of original input variables. We provide an analysis framework inspired by a recent concept known as differential privacy (Dwork 06). Our goal is to show that, despite the general difficulty of achieving the differential privacy guarantee, it is possible to publish synthetic data that are useful for a number of common statistical learning applications. This includes high dimensional sparse regression (Zhou et al. 07), principal component analysis (PCA), and other statistical measures (Liu et al. 06) based on the covariance of the initial data.", "date": "2019-07-08", "date_type": "published", "publisher": "arXiv", "id_number": "CaltechAUTHORS:20190702-110751042", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20190702-110751042", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "funders": { "items": [ { "agency": "NSF Graduate Research Fellowship" }, { "agency": "NSF", "grant_number": "CCF-0625879" }, { "agency": "Google" }, { "agency": "Carnegie Mellon University" } ] }, "doi": "10.48550/arXiv.0901.1365", "primary_object": { "basename": "0901.1365.pdf", "url": "https://authors.library.caltech.edu/records/kcd3f-5va43/files/0901.1365.pdf" }, "resource_type": "monograph", "pub_year": "2019", "author_list": "Zhou, Shuheng; Ligett, Katrina; et el." }, { "id": "https://authors.library.caltech.edu/records/gh6jz-0gh03", "eprint_id": 96883, "eprint_status": "archive", "datestamp": "2023-08-19 01:54:51", "lastmod": "2023-10-20 21:35:40", "type": "monograph", "metadata_visibility": "show", "creators": { "items": [ { "id": "Kleinberg-J", "name": { "family": "Kleinberg", "given": "Jon" } }, { "id": "Ligett-K", "name": { "family": "Ligett", "given": "Katrina" }, "orcid": "0000-0003-2780-6656" } ] }, "title": "Information-Sharing and Privacy in Social Networks", "ispublished": "unpub", "full_text_status": "public", "note": "This work has been supported in part by NSF grants CCF-0325453, BCS-0537606, IIS-0705774, IIS-0910664, CCF-0910940, a Google\nResearch Grant, a Yahoo! Research Alliance Grant, the John D. and Catherine T. MacArthur Foundation, and a NSF-funded Computing Research Association Computing Innovation Postdoctoral Fellowship.\n\nSubmitted - 1003.0469.pdf
", "abstract": "We present a new model for reasoning about the way information is shared among friends in a social network, and the resulting ways in which it spreads. Our model formalizes the intuition that revealing personal information in social settings involves a trade-off between the benefits of sharing information with friends, and the risks that additional gossiping will propagate it to people with whom one is not on friendly terms. We study the behavior of rational agents in such a situation, and we characterize the existence and computability of stable information-sharing networks, in which agents do not have an incentive to change the partners with whom they share information. We analyze the implications of these stable networks for social welfare, and the resulting fragmentation of the social network.", "date": "2019-07-08", "date_type": "published", "publisher": "arXiv", "id_number": "CaltechAUTHORS:20190702-110206311", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20190702-110206311", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "funders": { "items": [ { "agency": "NSF", "grant_number": "CCF-0325453" }, { "agency": "NSF", "grant_number": "BCS-0537606" }, { "agency": "NSF", "grant_number": "IIS-0705774" }, { "agency": "NSF", "grant_number": "IIS-0910664" }, { "agency": "NSF", "grant_number": "CCF-0910940" }, { "agency": "Google" }, { "agency": "Yahoo! Research Alliance" }, { "agency": "John D. and Catherine T. MacArthur Foundation" }, { "agency": "NSF Postdoctoral Fellowship" } ] }, "collection": "CaltechAUTHORS", "doi": "10.48550/arXiv.1003.0469", "primary_object": { "basename": "1003.0469.pdf", "url": "https://authors.library.caltech.edu/records/gh6jz-0gh03/files/1003.0469.pdf" }, "resource_type": "monograph", "pub_year": "2019", "author_list": "Kleinberg, Jon and Ligett, Katrina" }, { "id": "https://authors.library.caltech.edu/records/4q56d-e6z05", "eprint_id": 96882, "eprint_status": "archive", "datestamp": "2023-08-19 04:05:31", "lastmod": "2023-10-20 21:35:38", "type": "monograph", "metadata_visibility": "show", "creators": { "items": [ { "id": "Kleinberg-R", "name": { "family": "Kleinberg", "given": "Robert" } }, { "id": "Ligett-K", "name": { "family": "Ligett", "given": "Katrina" }, "orcid": "0000-0003-2780-6656" } ] }, "title": "Privacy-Compatibility For General Utility Metrics", "ispublished": "unpub", "full_text_status": "public", "note": "Supported by NSF Award CCF-0643934, an Alfred P. Sloan Foundation Fellowship, a Microsoft Research New Faculty Fellowship, and a grant from the Air Force Office of Scientific Research. \n\nSupported by an NSF Computing Innovation Fellowship (NSF Award 0937060) and an NSF Mathematical Sciences Postdoctoral Fellowship (NSF Award 1004416).\n\nSubmitted - 1010.2705.pdf
", "abstract": "In this note, we present a complete characterization of the utility metrics that allow for non-trivial differential privacy guarantees.", "date": "2019-07-08", "date_type": "published", "publisher": "arXiv", "id_number": "CaltechAUTHORS:20190702-104130244", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20190702-104130244", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "funders": { "items": [ { "agency": "NSF", "grant_number": "CCF-0643934" }, { "agency": "Alfred P. Sloan Foundation" }, { "agency": "Microsoft Research" }, { "agency": "Air Force Office of Scientific Research (AFOSR)" }, { "agency": "NSF", "grant_number": "CCF-0937060" }, { "agency": "NSF", "grant_number": "DMS-1004416" } ] }, "doi": "10.48550/arXiv.1010.2705", "primary_object": { "basename": "1010.2705.pdf", "url": "https://authors.library.caltech.edu/records/4q56d-e6z05/files/1010.2705.pdf" }, "resource_type": "monograph", "pub_year": "2019", "author_list": "Kleinberg, Robert and Ligett, Katrina" }, { "id": "https://authors.library.caltech.edu/records/js3wn-n1217", "eprint_id": 96815, "eprint_status": "archive", "datestamp": "2023-08-19 04:46:41", "lastmod": "2023-10-20 21:32:32", "type": "monograph", "metadata_visibility": "show", "creators": { "items": [ { "id": "Hardt-M", "name": { "family": "Hardt", "given": "Moritz" } }, { "id": "Ligett-K", "name": { "family": "Ligett", "given": "Katrina" }, "orcid": "0000-0003-2780-6656" }, { "id": "McSherry-F", "name": { "family": "McSherry", "given": "Frank" } } ] }, "title": "A simple and practical algorithm for differentially private data release", "ispublished": "unpub", "full_text_status": "public", "note": "Submitted - 1012.4763.pdf
", "abstract": "We present new theoretical results on differentially private data release useful with respect to any target class of counting queries, coupled with experimental results on a variety of real world data sets. \nSpecifically, we study a simple combination of the multiplicative weights approach of [Hardt and Rothblum, 2010] with the exponential mechanism of [McSherry and Talwar, 2007]. The multiplicative weights framework allows us to maintain and improve a distribution approximating a given data set with respect to a set of counting queries. We use the exponential mechanism to select those queries most incorrectly tracked by the current distribution. Combing the two, we quickly approach a distribution that agrees with the data set on the given set of queries up to small error. \nThe resulting algorithm and its analysis is simple, but nevertheless improves upon previous work in terms of both error and running time. We also empirically demonstrate the practicality of our approach on several data sets commonly used in the statistical community for contingency table release.", "date": "2019-06-28", "date_type": "published", "publisher": "arXiv", "id_number": "CaltechAUTHORS:20190628-094218811", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20190628-094218811", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "doi": "10.48550/arXiv.1012.4763", "primary_object": { "basename": "1012.4763.pdf", "url": "https://authors.library.caltech.edu/records/js3wn-n1217/files/1012.4763.pdf" }, "resource_type": "monograph", "pub_year": "2019", "author_list": "Hardt, Moritz; Ligett, Katrina; et el." }, { "id": "https://authors.library.caltech.edu/records/fe520-djp54", "eprint_id": 96806, "eprint_status": "archive", "datestamp": "2023-08-20 10:59:42", "lastmod": "2023-10-20 21:32:00", "type": "monograph", "metadata_visibility": "show", "creators": { "items": [ { "id": "Kong-Yuqing", "name": { "family": "Kong", "given": "Yuqing" } }, { "id": "Schoenebeck-G", "name": { "family": "Schoenebeck", "given": "Grant" } }, { "id": "Ligett-K", "name": { "family": "Ligett", "given": "Katrina" }, "orcid": "0000-0003-2780-6656" } ] }, "title": "Putting Peer Prediction Under the Micro(economic)scope and Making Truth-telling Focal", "ispublished": "unpub", "full_text_status": "public", "note": "Submitted - 1603.07319.pdf
", "abstract": "Peer-prediction is a (meta-)mechanism which, given any proper scoring rule, produces a mechanism to elicit privately-held, non-verifiable information from self-interested agents. Formally, truth-telling is a strict Nash equilibrium of the mechanism. Unfortunately, there may be other equilibria as well (including uninformative equilibria where all players simply report the same fixed signal, regardless of their true signal) and, typically, the truth-telling equilibrium does not have the highest expected payoff. The main result of this paper is to show that, in the symmetric binary setting, by tweaking peer-prediction, in part by carefully selecting the proper scoring rule it is based on, we can make the truth-telling equilibrium focal---that is, truth-telling has higher expected payoff than any other equilibrium. \nAlong the way, we prove the following: in the setting where agents receive binary signals we 1) classify all equilibria of the peer-prediction mechanism; 2) introduce a new technical tool for understanding scoring rules, which allows us to make truth-telling pay better than any other informative equilibrium; 3) leverage this tool to provide an optimal version of the previous result; that is, we optimize the gap between the expected payoff of truth-telling and other informative equilibria; and 4) show that with a slight modification to the peer prediction framework, we can, in general, make the truth-telling equilibrium focal---that is, truth-telling pays more than any other equilibrium (including the uninformative equilibria).", "date": "2019-06-28", "date_type": "published", "publisher": "arXiv", "id_number": "CaltechAUTHORS:20190628-082029235", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20190628-082029235", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "doi": "10.48550/arXiv.1603.07319", "primary_object": { "basename": "1603.07319.pdf", "url": "https://authors.library.caltech.edu/records/fe520-djp54/files/1603.07319.pdf" }, "resource_type": "monograph", "pub_year": "2019", "author_list": "Kong, Yuqing; Schoenebeck, Grant; et el." }, { "id": "https://authors.library.caltech.edu/records/hea4q-5ry15", "eprint_id": 96822, "eprint_status": "archive", "datestamp": "2023-08-19 10:00:47", "lastmod": "2023-10-20 21:32:43", "type": "monograph", "metadata_visibility": "show", "creators": { "items": [ { "id": "Ligett-K", "name": { "family": "Ligett", "given": "Katrina" }, "orcid": "0000-0003-2780-6656" }, { "id": "Roth-A", "name": { "family": "Roth", "given": "Aaron" } } ] }, "title": "Take it or Leave it: Running a Survey when Privacy Comes at a Cost", "ispublished": "unpub", "full_text_status": "public", "note": "Submitted - 1202.4741.pdf
", "abstract": "In this paper, we consider the problem of estimating a potentially sensitive (individually stigmatizing) statistic on a population. In our model, individuals are concerned about their privacy, and experience some cost as a function of their privacy loss. Nevertheless, they would be willing to participate in the survey if they were compensated for their privacy cost. These cost functions are not publicly known, however, nor do we make Bayesian assumptions about their form or distribution. Individuals are rational and will misreport their costs for privacy if doing so is in their best interest. Ghosh and Roth recently showed in this setting, when costs for privacy loss may be correlated with private types, if individuals value differential privacy, no individually rational direct revelation mechanism can compute any non-trivial estimate of the population statistic. In this paper, we circumvent this impossibility result by proposing a modified notion of how individuals experience cost as a function of their privacy loss, and by giving a mechanism which does not operate by direct revelation. Instead, our mechanism has the ability to randomly approach individuals from a population and offer them a take-it-or-leave-it offer. This is intended to model the abilities of a surveyor who may stand on a street corner and approach passers-by.", "date": "2019-06-28", "date_type": "published", "publisher": "arXiv", "id_number": "CaltechAUTHORS:20190628-104835073", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20190628-104835073", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "doi": "10.48550/arXiv.1202.4741", "primary_object": { "basename": "1202.4741.pdf", "url": "https://authors.library.caltech.edu/records/hea4q-5ry15/files/1202.4741.pdf" }, "resource_type": "monograph", "pub_year": "2019", "author_list": "Ligett, Katrina and Roth, Aaron" }, { "id": "https://authors.library.caltech.edu/records/j6dy9-09z38", "eprint_id": 96783, "eprint_status": "archive", "datestamp": "2023-08-20 10:49:28", "lastmod": "2023-10-20 21:31:02", "type": "monograph", "metadata_visibility": "show", "creators": { "items": [ { "id": "Ziani-Juba", "name": { "family": "Ziani", "given": "Juba" }, "orcid": "0000-0002-3324-4349" }, { "id": "Chandrasekaran-V", "name": { "family": "Chandrasekaran", "given": "Venkat" } }, { "id": "Ligett-K", "name": { "family": "Ligett", "given": "Katrina" }, "orcid": "0000-0003-2780-6656" } ] }, "title": "Efficiently characterizing games consistent with perturbed equilibrium observations", "ispublished": "unpub", "full_text_status": "public", "note": "We thank Federico Echenique, Denis Nekipelov, Matt Shum, and Vasilis Syrgkanis for extremely helpful comments and suggestions. Ziani's research was funded in part by NSF grant CNS-1254169. Chandrasekaran's research was funded in part by NSF awards CCF-1350590 and CCF-1637598, Air Force Office of Scientific Research grants FA9550-14-1-0098 and FA9550-16-1-0210, and the Sloan research fellowship. Ligett's research was funded in part by ISF grant 1044/16, NSF grants CNS-1254169 and CNS-1518941, a subcontract under the DARPA Brandeis Project, and the Hebrew University Cybersecurity Research Center in conjunction with the Israel National Cyber Bureau in the Prime Minister's Office. Ligett's work was done in part while the author was visiting the Simons Institute for the Theory of Computing at Berkeley.\n\nSubmitted - 1603.01318.pdf
", "abstract": "We study the problem of characterizing the set of games that are consistent with observed equilibrium play. Our contribution is to develop and analyze a new methodology based on convex optimization to address this problem for many classes of games and observation models of interest. Our approach provides a sharp, computationally efficient characterization of the extent to which a particular set of observations constrains the space of games that could have generated them. This allows us to solve a number of variants of this problem as well as to quantify the power of games from particular classes (e.g., zero-sum, potential, linearly parameterized) to explain player behavior. We illustrate our approach with numerical simulations.", "date": "2019-06-27", "date_type": "published", "publisher": "arXiv", "id_number": "CaltechAUTHORS:20190627-103855805", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20190627-103855805", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "funders": { "items": [ { "agency": "NSF", "grant_number": "CNS-1254169" }, { "agency": "NSF", "grant_number": "CCF-1350590" }, { "agency": "NSF", "grant_number": "CCF-1637598" }, { "agency": "Air Force Office of Scientific Research (AFOSR)", "grant_number": "FA9550-14-1-0098" }, { "agency": "Air Force Office of Scientific Research (AFOSR)", "grant_number": "FA9550-16-1-0210" }, { "agency": "Alfred P. Sloan Foundation" }, { "agency": "Israel Science Foundation", "grant_number": "1044/16" }, { "agency": "NSF", "grant_number": "CNS-1254169" }, { "agency": "NSF", "grant_number": "CNS-1518941" }, { "agency": "Defense Advanced Research Projects Agency (DARPA)" }, { "agency": "Hebrew University of Jerusalem" }, { "agency": "Israel National Cyber Bureau" } ] }, "doi": "10.48550/arXiv.1603.01318", "primary_object": { "basename": "1603.01318.pdf", "url": "https://authors.library.caltech.edu/records/j6dy9-09z38/files/1603.01318.pdf" }, "resource_type": "monograph", "pub_year": "2019", "author_list": "Ziani, Juba; Chandrasekaran, Venkat; et el." }, { "id": "https://authors.library.caltech.edu/records/79zf1-8qz79", "eprint_id": 96753, "eprint_status": "archive", "datestamp": "2023-08-19 14:15:06", "lastmod": "2023-10-20 21:29:41", "type": "monograph", "metadata_visibility": "show", "creators": { "items": [ { "id": "Bechavod-Y", "name": { "family": "Bechavod", "given": "Yahav" } }, { "id": "Ligett-K", "name": { "family": "Ligett", "given": "Katrina" }, "orcid": "0000-0003-2780-6656" }, { "id": "Roth-A", "name": { "family": "Roth", "given": "Aaron" } }, { "id": "Waggoner-B", "name": { "family": "Waggoner", "given": "Bo" } }, { "id": "Wu-Zhiwei-Steven", "name": { "family": "Wu", "given": "Zhiwei Steven" } } ] }, "title": "Equal Opportunity in Online Classification with Partial Feedback", "ispublished": "unpub", "full_text_status": "public", "note": "Supported in part by Israeli Science Foundation (ISF) grant #1044/16, a subcontract on the DARPA Brandeis Project, and the Federmann Cyber Security Center in conjunction with the Israel national cyber directorate. \n\nSupported in part by Israeli Science Foundation (ISF) grant #1044/16, a subcontract on the DARPA Brandeis Project, and the Federmann Cyber Security Center in conjunction with the Israel national cyber directorate. Part of this work was done while the author was visiting the Simons Institute for the Theory of Computing. \n\nSupported in part by NSF grants AF-1763307, CNS-1253345, a subcontract on the DARPA Brandeis Project, and an Amazon Research award. \n\nWe thank Nati Srebro for a conversation leading to the question we study here. We thank Michael Kearns for helpful discussions at an early stage of this work.\n\nSubmitted - 1902.02242.pdf
", "abstract": "We study an online classification problem with partial feedback in which individuals arrive one at a time from a fixed but unknown distribution, and must be classified as positive or negative. Our algorithm only observes the true label of an individual if they are given a positive classification. This setting captures many classification problems for which fairness is a concern: for example, in criminal recidivism prediction, recidivism is only observed if the inmate is released; in lending applications, loan repayment is only observed if the loan is granted. We require that our algorithms satisfy common statistical fairness constraints (such as equalizing false positive or negative rates --- introduced as \"equal opportunity\" in Hardt et al. (2016)) at every round, with respect to the underlying distribution. We give upper and lower bounds characterizing the cost of this constraint in terms of the regret rate (and show that it is mild), and give an oracle efficient algorithm that achieves the upper bound.", "date": "2019-06-27", "date_type": "published", "publisher": "arXiv", "id_number": "CaltechAUTHORS:20190626-152715232", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20190626-152715232", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "funders": { "items": [ { "agency": "Israel Science Foundation", "grant_number": "1044/16" }, { "agency": "Defense Advanced Research Projects Agency (DARPA)" }, { "agency": "Hebrew University of Jerusalem" }, { "agency": "NSF", "grant_number": "AF-1763307" }, { "agency": "NSF", "grant_number": "CNS-1253345" }, { "agency": "Amazon" } ] }, "doi": "10.48550/arXiv.1902.02242", "primary_object": { "basename": "1902.02242.pdf", "url": "https://authors.library.caltech.edu/records/79zf1-8qz79/files/1902.02242.pdf" }, "resource_type": "monograph", "pub_year": "2019", "author_list": "Bechavod, Yahav; Ligett, Katrina; et el." }, { "id": "https://authors.library.caltech.edu/records/gzzjp-dfz12", "eprint_id": 96801, "eprint_status": "archive", "datestamp": "2023-08-19 03:46:55", "lastmod": "2023-10-20 21:31:45", "type": "monograph", "metadata_visibility": "show", "creators": { "items": [ { "id": "Bechavod-Y", "name": { "family": "Bechavod", "given": "Yahav" } }, { "id": "Ligett-K", "name": { "family": "Ligett", "given": "Katrina" }, "orcid": "0000-0003-2780-6656" } ] }, "title": "Penalizing Unfairness in Binary Classification", "ispublished": "unpub", "full_text_status": "public", "note": "This work was supported in part by NSF grants CNS-1254169 and CNS-1518941, US-Israel Binational Science Foundation grant 2012348, Israeli Science Foundation (ISF) grant #1044/16, a subcontract on the DARPA Brandeis Project, and the HUJI Cyber Security Research Center in conjunction with the Israel National Cyber Bureau in the Prime Minister's Office.\n\nSubmitted - 1707.00044.pdf
", "abstract": "We present a new approach for mitigating unfairness in learned classifiers. In particular, we focus on binary classification tasks over individuals from two populations, where, as our criterion for fairness, we wish to achieve similar false positive rates in both populations, and similar false negative rates in both populations. As a proof of concept, we implement our approach and empirically evaluate its ability to achieve both fairness and accuracy, using datasets from the fields of criminal risk assessment, credit, lending, and college admissions.", "date": "2019-06-27", "date_type": "published", "publisher": "arXiv", "id_number": "CaltechAUTHORS:20190627-153828844", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20190627-153828844", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "funders": { "items": [ { "agency": "NSF", "grant_number": "CNS-1254169" }, { "agency": "NSF", "grant_number": "CNS-1518941" }, { "agency": "Binational Science Foundation (USA-Israel)", "grant_number": "2012348" }, { "agency": "Israel Science Foundation", "grant_number": "1044/16" }, { "agency": "Defense Advanced Research Projects Agency (DARPA)" }, { "agency": "Hebrew University of Jerusalem" }, { "agency": "Israel National Cyber Bureau" } ] }, "doi": "10.48550/arXiv.1707.00044", "primary_object": { "basename": "1707.00044.pdf", "url": "https://authors.library.caltech.edu/records/gzzjp-dfz12/files/1707.00044.pdf" }, "resource_type": "monograph", "pub_year": "2019", "author_list": "Bechavod, Yahav and Ligett, Katrina" }, { "id": "https://authors.library.caltech.edu/records/h40vh-exq36", "eprint_id": 96799, "eprint_status": "archive", "datestamp": "2023-08-20 06:52:22", "lastmod": "2023-10-20 21:31:42", "type": "monograph", "metadata_visibility": "show", "creators": { "items": [ { "id": "Cummings-R", "name": { "family": "Cummings", "given": "Rachel" } }, { "id": "Ioannidis-S", "name": { "family": "Ioannidis", "given": "Stratis" } }, { "id": "Ligett-K", "name": { "family": "Ligett", "given": "Katrina" }, "orcid": "0000-0003-2780-6656" } ] }, "title": "Truthful Linear Regression", "ispublished": "unpub", "full_text_status": "public", "note": "The first author was funded in part by NSF grant CNS-1254169, US-Israel Binational Science Foundation grant 2012348, and a Google Faculty Research Award. The third author was funded in part by NSF grant CNS-1254169, US-Israel Binational Science Foundation grant 2012348, the Charles Lee Powell Foundation, a Google Faculty Research Award, an Okawa Foundation Research Grant, and a Microsoft Faculty Fellowship. Work completed in part while the first and second authors were at Technicolor Research Labs. We thank Jenn Wortman Vaughan for her comments on the final version of this paper.\n\nSubmitted - 1506.03489.pdf
", "abstract": "We consider the problem of fitting a linear model to data held by individuals who are concerned about their privacy. Incentivizing most players to truthfully report their data to the analyst constrains our design to mechanisms that provide a privacy guarantee to the participants; we use differential privacy to model individuals' privacy losses. This immediately poses a problem, as differentially private computation of a linear model necessarily produces a biased estimation, and existing approaches to design mechanisms to elicit data from privacy-sensitive individuals do not generalize well to biased estimators. We overcome this challenge through an appropriate design of the computation and payment scheme.", "date": "2019-06-27", "date_type": "published", "publisher": "arXiv", "id_number": "CaltechAUTHORS:20190627-150412956", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20190627-150412956", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "funders": { "items": [ { "agency": "NSF", "grant_number": "CNS-1254169" }, { "agency": "Binational Science Foundation (USA-Israel)", "grant_number": "2012348" }, { "agency": "Google Faculty Research Award" }, { "agency": "NSF" }, { "agency": "Charles Lee Powell Foundation" }, { "agency": "Okawa Foundation" }, { "agency": "Microsoft Faculty Fellowship" } ] }, "doi": "10.48550/arXiv.1506.03489", "primary_object": { "basename": "1506.03489.pdf", "url": "https://authors.library.caltech.edu/records/h40vh-exq36/files/1506.03489.pdf" }, "resource_type": "monograph", "pub_year": "2019", "author_list": "Cummings, Rachel; Ioannidis, Stratis; et el." }, { "id": "https://authors.library.caltech.edu/records/4hdgc-1nf60", "eprint_id": 96732, "eprint_status": "archive", "datestamp": "2023-08-19 16:12:06", "lastmod": "2023-10-20 21:28:34", "type": "monograph", "metadata_visibility": "show", "creators": { "items": [ { "id": "Ligett-K", "name": { "family": "Ligett", "given": "Katrina" }, "orcid": "0000-0003-2780-6656" }, { "id": "Shenfeld-M", "name": { "family": "Shenfeld", "given": "Moshe" } } ] }, "title": "A necessary and sufficient stability notion for adaptive generalization", "ispublished": "unpub", "full_text_status": "public", "note": "Submitted - 1906.00930.pdf
", "abstract": "We introduce a new notion of the stability of computations, which holds under post-processing and adaptive composition, and show that the notion is both necessary and sufficient to ensure generalization in the face of adaptivity, for any computations that respond to bounded-sensitivity linear queries while providing accuracy with respect to the data sample set. The stability notion is based on quantifying the effect of observing a computation's outputs on the posterior over the data sample elements. We show a separation between this stability notion and previously studied notions.", "date": "2019-06-26", "date_type": "published", "publisher": "arXiv", "id_number": "CaltechAUTHORS:20190626-101449888", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20190626-101449888", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "doi": "10.48550/arXiv.1906.00930", "primary_object": { "basename": "1906.00930.pdf", "url": "https://authors.library.caltech.edu/records/4hdgc-1nf60/files/1906.00930.pdf" }, "resource_type": "monograph", "pub_year": "2019", "author_list": "Ligett, Katrina and Shenfeld, Moshe" }, { "id": "https://authors.library.caltech.edu/records/4wnh4-mv004", "eprint_id": 96752, "eprint_status": "archive", "datestamp": "2023-08-19 15:31:57", "lastmod": "2023-10-20 21:29:39", "type": "monograph", "metadata_visibility": "show", "creators": { "items": [ { "id": "Alabi-D", "name": { "family": "Alabi", "given": "Daniel" } }, { "id": "Kalai-A-T", "name": { "family": "Kalai", "given": "Adam Tauman" } }, { "id": "Ligett-K", "name": { "family": "Ligett", "given": "Katrina" }, "orcid": "0000-0003-2780-6656" }, { "id": "Musco-C", "name": { "family": "Musco", "given": "Cameron" } }, { "id": "Tzamos-C", "name": { "family": "Tzamos", "given": "Christos" } }, { "id": "Vitercik-E", "name": { "family": "Vitercik", "given": "Ellen" } } ] }, "title": "Learning to Prune: Speeding up Repeated Computations", "ispublished": "unpub", "full_text_status": "public", "note": "This work was supported in part by Israel Science Foundation (ISF) grant #1044/16, a subcontract on the DARPA Brandeis Project, and the Federmann Cyber Security Center in conjunction with the Israel national cyber directorate.\n\nSubmitted - 1904.11875.pdf
", "abstract": "It is common to encounter situations where one must solve a sequence of similar computational problems. Running a standard algorithm with worst-case runtime guarantees on each instance will fail to take advantage of valuable structure shared across the problem instances. For example, when a commuter drives from work to home, there are typically only a handful of routes that will ever be the shortest path. A naive algorithm that does not exploit this common structure may spend most of its time checking roads that will never be in the shortest path. More generally, we can often ignore large swaths of the search space that will likely never contain an optimal solution. \nWe present an algorithm that learns to maximally prune the search space on repeated computations, thereby reducing runtime while provably outputting the correct solution each period with high probability. Our algorithm employs a simple explore-exploit technique resembling those used in online algorithms, though our setting is quite different. We prove that, with respect to our model of pruning search spaces, our approach is optimal up to constant factors. Finally, we illustrate the applicability of our model and algorithm to three classic problems: shortest-path routing, string search, and linear programming. We present experiments confirming that our simple algorithm is effective at significantly reducing the runtime of solving repeated computations.", "date": "2019-06-26", "date_type": "published", "publisher": "arXiv", "id_number": "CaltechAUTHORS:20190626-145729225", "official_url": "https://resolver.caltech.edu/CaltechAUTHORS:20190626-145729225", "rights": "No commercial reproduction, distribution, display or performance rights in this work are provided.", "funders": { "items": [ { "agency": "Israel Science Foundation", "grant_number": "1044/16" }, { "agency": "Defense Advanced Research Projects Agency (DARPA)" }, { "agency": "Hebrew University of Jerusalem" } ] }, "doi": "10.48550/arXiv.1904.11875", "primary_object": { "basename": "1904.11875.pdf", "url": "https://authors.library.caltech.edu/records/4wnh4-mv004/files/1904.11875.pdf" }, "resource_type": "monograph", "pub_year": "2019", "author_list": "Alabi, Daniel; Kalai, Adam Tauman; et el." } ]