February 1 – 2, 2024

NSF TRIPODS Workship

The NSF TRIPODS Workshop brings together a large and diverse team of researchers from each of the TRIPODS centers: EnCORE, FODSI, IDEAL, and IFDS. The aim of the Transdisciplinary Research In Principles Of Data Science (TRIPODS) is to connect the statistics, mathematics, and theoretical computer science communities to develop the theoretical foundations of data science through integrated research and training activities focused on core algorithmic, mathematical, and statistical principles. This workshop focuses on the contributions of each center’s work.

DETAILS:

Agenda

08:00 AM - 09:15 AM      Registration & Breakfast

09:15 AM - 09:30 AM      Welcome & Opening Remarks 

  • Barna Saha, Director of EnCORE, UC San Diego

09:30 AM - 10:30 AM      Plenary Talk

  • Emmanuel Candes, Barnum-Simons Chair in Mathematics and Statistics, Stanford
    University

10:30 AM - 12:00 PM      TRIPODS Institute Talks

  • FODSI - Piotr Indyk (MIT)
  • IFDS - Rob Nowak (Wisc)
  • IDEAL - Matt Walter (TTIC)
  • EnCORE - Sanjoy Dasgupta (UCSD)

12:00 PM - 1:30 PM        Lunch On Your Own

  • The Price Center offers many options. A map to Price Center and various options can be found in the "Lunch On Your Own" section on this page. (Directions can be found here. It is an estimated 5-minute walk). 

1:30 PM - 2:30 PM          Panel Session: Role of Foundations in Data Science

  • Moderator: Raghu Meka (UCLA)
  • Emmanuel Candes (Stanford)
  • Piotr Indyk (MIT)
  • Arya Mazumdar (UCSD)
  • Rob Nowak (U Wisconsin)
  • Nati Srebro (TTIC)

2:30 PM - 4:00 PM        Lightning Talks

  1. Hadley Black
  2. Neophytos Charalambides
  3. Eric Evert
  4. Charlie Guan
  5. Nirmit Joshi
  6. Gene Li
  7. Marko Medvedev
  8. Ronak Mehta
  9. Shyam Narayanan
  10. Max Ovsiankin
  11. Kumar Kshitij Patel
  12. Kavya Ravichandran
  13. Sandeep Silwal
  14. Jake Soloff
  15. Vaidehi Srinivas
  16. Arsen Vasilyan
  17. Zhengchao Wan

4:00 PM - 5:30 PM        Poster Session / Snack Break (Lobby) 

  1. Hadley Black
  2. Neophytos Charalambides
  3. Eric Evert
  4. Charlie Guan
  5. Nirmit Joshi
  6. Gene Li
  7. Marko Medvedev
  8. Ronak Mehta
  9. Shyam Narayanan
  10. Max Ovsiankin
  11. Kumar Kshitij Patel
  12. Kavya Ravichandran
  13. Sandeep Silwal
  14. Jake Soloff
  15. Vaidehi Srinivas
  16. Arsen Vasilyan
  17. Zhengchao Wan

6:00 PM - 8:00 PM       Faculty Dinner (Faculty Only) 

  • Puesto La Jolla - 1026 Wall Street, La Jolla, CA 92037 (Estimated 15-20 drive/rideshare). 

08:00 AM - 09:00 AM       Registration & Breakfast 

09:00 AM - 10:00 AM        Industry Plenary Talks

  • Sanjiv Kumar, VP, Google Research
  • S. Muthukrishnan, VP, Sponsor Products, Amazon Ads

10:00 AM - 10:30 AM         Break

10:30 AM - 11:30 AM           Panel Session: Mentoring Panel for Students: How to be Successful in Your Career 

  • Moderator: Arya Mazumdar (UCSD)
  • Samir Khuller (NU)
  • Raghu Meka (UCLA)
  • Sujay Sanghavi (UT Austin)
  • Rajiv Gandhi (Rutgers Camden & UPenn)

11:30 AM - 01:00 PM          Lunch On Your Own

  • The Price Center offers many options. A map to Price Center and various options can be found in the "Lunch On Your Own" section on this page. (Directions can be found here. It is an estimated 5-minute walk). 

01:00 PM - 02:30 PM        TRIPODS Institute Talks

  • EnCORE - Sujay Sanghavi (UT)
  • IDEAL - Aravindan Vijayaraghavan (NU)
  • IFDS - Zaid Harchaoui (U Washington)
  • FODSI - Sandeep Silwal (MIT)

02:30 PM - 03:00 PM        Snack Break

03:00 PM - 04:00 PM       Panel Session: AI vs. Data Science vs. Computer Science: How to Remain Research-Relevant 

  • Moderator: Sujay Sanghavi (UT Austin)
  • Enis Cetin (UIC)
  • Sorin Lerner (UCSD)
  • Piotr Indyk (MIT)
  • Rose Yu (UCSD)
  • Rajesh Gupta (UCSD)

Lunch On Your Own

Route from the CSE Building at UCSD to Price Center.

Price Center is an estimated 5-minute walk from the Computer Science and Engineering (CSE) Building. A map displaying the route from the CSE Building to Price Center can be seen on the left. 

There are a variety of different food options available at the UCSD Campus, including Price Center. Price Center is an estimated 5-minute walk from the Computer Science and Engineering (CSE) Building. A map displaying the route from the CSE Building to Price Center can be seen on the left. Directions can also be found here.

Alternative dining options on campus can be found here.

The Price Center offers many options, including the following: 

  • Burger King

  • Curry Up Now

  • Dirty Birds

  • Jamba Juice

  • Lemongrass

  • Panda Express

  • Rubio’s Costal Grill

  • Santorini Greek Island Grill

  • Seed + Sprout

  • Starbucks

  • Subway

  • Sunshine Market

  • Tapioca Express

  • Zanzibar Cafe at The Loft

Event Pictures

Online Covering: Secretaries, Prophets, and Samples

Gregory Kehne

Abstract: We give a polynomial-time algorithm for online covering IPs with a competitive ratio of O(log mn) when the constraints are revealed in random order, essentially matching the best possible offline bound of Omega(\og n) and circumventing the Omega(log m log n) lower bound known in adversarial order. We then leverage this O(log mn) competitive algorithm for the prophet version of online integer covering, where constraints are sampled from a sequence of known distributions. Our reduction in fact relies only on samples from these distributions, in a manner evocative of prior work on single-sample prophet inequalities in the packing setting. We present sample guarantees in the prophet setting, as well as in the setting where random samples from an adversarial instance are revealed at the outset.

This talk is based on joint work with Anupam Gupta and Roie Levin.

EIFFeL: Ensuring Integrity for Federated Learning

Amrita Roy Chowdhury

Abstract: Federated learning (FL) is a decentralized learning paradigm where multiple clienst collaborate with a server to train a machine learning model. To ensure privacy, the server performs secure aggregation of model updates from the clients. Unfortunately, this prevents verification of the well-formedness (integrity) of the updates as the updates are masked. Consequently, malformed updates designed to poison the model can be injected without detection. In this talk, I will formalize the problem of ensuring both update privacy and integrity in FL and present a new system, EIFFeL, that enables secure aggregation of verified updates. EIFFeL is a general framework that can enforce arbitrary integrity checks and remove malformed updates from the aggregate, without violating privacy. Further, EIFFeL is practical for real-world usage. For instance, with 100 clients and 10% poisoning, EIFFeL can train an MNIST classification model to the same accuracy as that of a non-poisoned federated learner in just 2.4s per iteration.

Fair, Low-Cost Hierarchical Clustering

Marina Knittel

Abstract: This talk will cover three papers that explore fair, low-cost hierarchical clustering. Ahmadian et al. [2020] initiates the study of fair hierarchical clustering by extending Chierichetti et al.’s [2019] notion of representationally proportional flat clustering to the hierarchical setting. They create the first approximation algorithm for the problem – a highly theoretical O(n^{5/6} log^{3/2} n) approximation, reflecting the difficulty of the problem. This is improved in two follow-up works to a near, and then eventually true, polylogarithmic approximation. We discuss general techniques proposed in these works and how they are used to achieve fairness with limited increase in cost.

Faster Approximate All Pairs Shortest Paths

Christopher Ye

Abstract: The all pairs shortest path problem (APSP) is one of the foundational problems in computer science. Given a graph, the goal is to compute distance d(u, v) between all pairs of vertices. On undirected, unweighted graphs, Seidel’s algorithm shows that computing APSP exactly is equivalent to matrix multiplication. Naturally, the search for faster algorithms then must turn to approximate computations. A solution D is (a, b)-approximate if d(u, v) <= D(u, v) <= a d(u, v) + b for all pairs u, v. There has been a long line of work in computing approximate APSP. Dor, Halperin, and Zwick provided a framework obtaining increasingly faster algorithms with increasingly large additive errors in 2000, a framework which has resisted improvement for over two decades. Leveraging fast matrix multiplication, Deng et al. improved the running time for the specific case of (1, 2) from O(n^{7/3}) to O(n^{2.26}), where the stated bound uses a matrix multiplication algorithm due to Durr. Recently, Roditty obtained a O(n^{9/4}) time (2, 0) approximation. In this talk I present a multitude of new approximation algorithms for the APSP problem, obtaining significant improvements in both multiplicative and additive approximations. 

Joint work with Barna Saha.

Monotonicity Testing and Isoperimetry on the Hypergrid

Hadley Black

Abstract

The problem of monotonicity testing is a central problem in the area of property testing which asks us to design a randomized algorithm which can distinguish monotone functions from functions which are far from being monotone. Over the last 20 years a series of beautiful results have unearthed a connection between monotonicity testing and isoperimetric inequalities on the Boolean hypercube. Isoperimetric inequalities give a way of relating the boundary and volume of a set; a famous example is due to Talagrand from 1993. It turns out that the key to analyzing monotonicity testers has been to prove isoperimetric inequalities in the directed hypercube. This culminated in the seminal work of Khot, Minzer, and Safra (STOC 2015) who showed a directed version of Talagrand’s inequality, which they used to obtain an optimal tester for Boolean functions.

The goal of our work is to extend this amazing connection beyond just the hypercube. Towards this, we prove a directed version of Talagrand’s inequality which generalizes the result of Khot, Minzer, and Safra to hypergrids and use this inequality to obtain the first monotonicity tester for Boolean functions on the hypergrid with the optimal dependence on the dimension. 

Based on joint work with D. Chakrabarty (Dartmouth) and C. Seshadhri (UCSC) to appear in STOC 2023

Donghwan Lee

Abstract:

Evaluating the performance of machine learning models under distribution shift is challenging, especially when we only have unlabeled data from the shifted (target) domain, along with labeled data from the original (source) domain. Recent work suggests that the notion of disagreement, the degree to which two models trained with different randomness differ on the same input, is a key to tackle this problem. Experimentally, disagreement and prediction error have been shown to be strongly connected, which has been used to estimate model performance. Experiments have led to the discovery of the disagreement-on-the-line phenomenon, whereby the classification error under the target domain is often a linear function of the classification error under the source domain; and whenever this property holds, disagreement under the source and target domain follow the same linear relation. In this work, we develop a theoretical foundation for analyzing disagreement in high-dimensional random features regression; and study under what conditions the disagreement-on-the-line phenomenon occurs in our setting. Experiments on CIFAR-10-C, Tiny ImageNet-C, and Camelyon17 are consistent with our theory and support the universality of the theoretical findings.

Product Manifold Learning with Independent Coordinate Selection

Jesse He (UCSD)

Abstract: In many dimensionality reduction tasks, we wish to identify the constituent components that explain our observations. For manifold learning, this can be formalized as factoring a Riemannian product manifold. Recovering this factorization, however, may suffer from certain difficulties in practice, especially when data is sparse or noisy, or when one factor is distorted by the other. To address these limitations, we propose identifying non-redundant coordinates on the product manifold before applying product manifold learning to identify which coordinates correspond to different factor manifolds.

Tear and Repulsion Enabled Registration of Point Clouds for Manifold Learning

Dhruv Kohli (UCSD)

Abstract: We present a framework for aligning the local views of a possibly closed/non-orientable data manifold to produce an embedding in its intrinsic dimension through tearing. Through a spectral coloring scheme, we render the embeddings of the points across the tear with matching colors, enabling a visual recovery of the topology of the data manifold. The embedding is further equipped with a tear-aware metric that enables computation of shortest paths while accounting for the tear. To measure the quality of an embedding, we propose two Lipschitz-type notions of global distortion—a stronger and a weaker one—along with their pointwise counterparts for a finer assessment of the embedding. Subsequently, we bound them using the distortion of the local views and the alignment error between them. We show that our theoretical result on strong distortion leads to a new perspective on the need for a repulsion term in manifold learning objectives. As a result, we enhance our alignment approach by incorporating repulsion. Finally, we compare various strategies for the tear and repulsion enabled alignment, with regard to their speed of convergence and the quality of the embeddings produced.


This is joint work with my advisors Gal Mishne and Alex Cloninger at UCSD.

Efficient Online Clustering with Moving Costs

Dimitrios Christou (UT Austin)

Abstract: In this talk, I will consider an online-learning problem, called Online Clustering with Moving Costs, at which a learner maintains a set of facilities over rounds so as to minimize the connection cost of an adversarially selected sequence of clients. The learner is informed on the positions of the clients at each round only after its facility-selection and can use this information to update its decision in the next round. However, updating the facility positions comes with an additional moving cost based on the moving distance of the facilities. I will be presenting the first (polynomial-time) approximate-regret algorithm for this setting through a combination of different algorithmic techniques such as HST embeddings, the FTRL framework with a dilated entropic regulariser as well as a novel rounding scheme.

Encoding Structural Symmetry is Key for Length Generalization in Arithmetic Tasks

Mahdi Sabbaghi (UPenn)

Abstract: Despite the success of Transformers on language understanding, code generation, and logical reasoning, they still fail to (length) generalize on basic arithmetic tasks such as addition and multiplication. A major reason behind this failure is the vast difference in structure of numbers versus text; for example, numbers are associated with a specific significance order that plays a role in calculating the answer. In contrast, for text, such symmetries are quite unnatural. In this work, we propose to encode these semantics explicitly into the model via appropriate data formatting and custom positional encodings. To further elucidate the importance of explicitly encoding structure, in a simplified linear setting, we prove that standard positional encodings even when trained with augmentations to implicitly induce structure fail at such generalization, whereas enforcing structure via positional encodings succeeds.

Bio: Mahdi Sabbaghi is a second year PhD student at UPenn, department of Electrical and System Engineering, supervised by Professors Hamed Hassani and George Pappas. Previously he obtained a B. Sc. degree in Electrical Engineering as well as a B. Sc. degree in Physics from the Sharif University of Technology, in Tehran.

Private Estimation of U Statistics

Shourya Pandey (UT Austin)

Abstract: We consider the problem of private estimation of U statistics. U statistics are widely used estimators that naturally arise in a broad class of problems, from nonparametric signed rank tests to subgraph counts in random networks. Despite the recent outpouring of interest in private mean estimation, private algorithms for more general U statistics have received little attention.  We propose a framework where, for a broad class of U statistics, one can use existing tools in private mean estimation to obtain confidence intervals where the private error does not overwhelm the irreducible error resulting from the variance of the U statistics. However, in specific cases that arise when the U statistics degenerate or have vanishing moments, the private error may be of a larger order than the non-private error. To remedy this, we propose a new thresholding-based approach that uses Hajek projections to re-weight different subsets. As we show,  this leads to more accurate inference in certain settings.

Finite-Time Logarithmic Bayes Regret Upper Bounds

Alexia Atsidakou (UT Austin)

Abstract: We derive the first finite-time logarithmic Bayes regret upper bounds for Bayesian bandits, for BayesUCB and Thompson Sampling. In Gaussian and Bernoulli multi-armed bandits, we obtain $O(c_\Delta \log n)$ and $O(c_h \log^2 n)$ upper bounds for an upper confidence bound algorithm, where $c_h$ and $c_\Delta$ are constants depending on the prior distribution and the gaps of bandit instances sampled from it, respectively. The latter bound asymptotically matches the lower bound of Lai (1987). Our proofs are a major technical departure from prior works, while being simple and general. The key idea in our proofs is to conduct a frequentist per-instance analysis with Bayesian confidence intervals, and then integrate it over the prior.

Our results provide insights on the value of prior in the Bayesian setting, both in the objective and as a side information given to the learner. They significantly improve upon existing $\tilde{O}(\sqrt{n})$ bounds, which have become standard in the literature despite the logarithmic lower bound of Lai (1987).

Pareto-Optimal Algorithms for Learning in Games

Natalie Collina and Eshwar Ram Arunachaleswaran

Abstract: We study the problem of characterizing optimal learning algorithms for playing repeated games against an adversary with unknown payoffs. In this problem, the first player (called the learner) commits to a learning algorithm against a second player (called the optimizer), and the optimizer best-responds by choosing the optimal dynamic strategy for their (unknown but well-defined) payoff. Classic learning algorithms (such as no-regret algorithms) provide some counterfactual guarantees for the learner, but might perform much more poorly than other learning algorithms against particular optimizer payoffs.

In this paper, we introduce the notion of asymptotically Pareto-optimal learning algorithms. Intuitively, if a learning algorithm is Pareto-optimal, then there is no other algorithm which performs asymptotically at least as well against all optimizers and performs strictly better (by at least $\Omega(T)$) against some optimizer. We show that well-known no-regret algorithms such as Multiplicative Weights and Follow The Regularized Leader are Pareto-dominated. However, while no-regret is not enough to ensure Pareto-optimality, we show that a strictly stronger property, no-swap-regret, is a sufficient condition for Pareto-optimality.

Proving these results requires us to address various technical challenges specific to repeated play, including the fact that there is no simple characterization of how optimizers who are rational in the long-term best-respond against a learning algorithm over multiple rounds of play. To address this, we introduce the idea of the asymptotic menu of a learning algorithm: the convex closure of all correlated distributions over strategy profiles that are asymptotically implementable by an adversary. Interestingly, we show that all no-swap-regret algorithms share the same asymptotic menu, implying that all no-swap-regret algorithms are “strategically equivalent”.

This talk is based on work with Jon Schneider.

Metric Learning from Lazy Crowds

Geelon So

Abstract: We consider crowd-based metric learning from preference comparisons, where given two items, a user prefers the item that is closer to their latent ideal item. Here, “closeness” is measured with respect to a shared but unknown Mahalanobis distance. Can we recover this distance when we can only obtain very few responses per user?

In this very low-budget regime, we show that generally, nothing at all about the metric is revealed, even with infinitely many users. But when the items have subspace cluster structure, we present a divide-and-conquer approach for metric recovery, and provide theoretical recovery guarantees and empirical validation.

This is joint work with Zhi Wang (UCSD) and Ramya Korlakai Vinayak (UW–Madison).

Random Walks, Conductance, and Resistance for the Connection Graph Laplacian

Zhengchao Wan

Abstract: We investigate the concept of effective resistance in connection graphs, expanding its traditional application from undirected graphs. We propose a robust definition of effective resistance in connection graphs by focusing on the duality of Dirichlet-type and Poisson-type problems on connection graphs. Additionally, we delve into random walks, taking into account both node transitions and vector rotations. This approach introduces novel concepts of effective conductance and resistance matrices for connection graphs, capturing mean rotation matrices corresponding to random walk transitions. Thereby, it provides new theoretical insights for network analysis and optimization.

This is based on a joint work with Alexander Cloninger, Gal Mishne, Andreas Oslandsbotn, Sawyer Jack Robertson and Yusu Wang.

Approximability and Inapproximability of Strict-CSPs

Akbar Rafiey

Abstract: We study the approximability and inapproximability of Strict-CSPs. An instance of the Strict-CSPs consists of a set of constraints over a set of variables and a cost function over the assignments. The goal is to find an assignment to the variables of minimum cost which satisfies all the constraints. Some prominent problems that this framework captures are (Hypergraph) Vertex Cover, Min Sum k-Coloring, Multiway Cut, Min Ones, and others.

We focus on a systematic study of Strict-CSPs of the form Strict-CSPs(H), that is, Strict-CSPs where the type of constraints is limited to predicates from a set H. Our first result is a dichotomy for approximation of Strict-CSPs(H), where H is a binary predicate, i.e., a digraph. We prove that if digraph H has bounded width, then Strict-CSPs(H) is approximable within a constant factor (depending on H); otherwise, there is no approximation for Strict-CSPs(H) unless P=NP.

Second, we study the inapproximability of Strict-CSP and present the first general hardness of approximation for Strict-CSP. More precisely, we prove a dichotomy theorem that states every instance of Strict-CSP(H) (H being a digraph) is either polynomial-time solvable or APX-complete. Moreover, we show the existence of a universal constant 0<\delta<1 such that it is NP-hard to approximate Strict-CSP(H) within a factor of (2-\delta) for all digraphs H where Strict-CSP(H) is NP-complete.

Buy-many Mechanisms for Many Unit-demand Buyers

Rojin Rezvan

Abstract: A recent line of research has established a novel desideratum for designing approximatelyrevenue-optimal multi-item mechanisms, namely the buy-many constraint. Under this constraint, prices for different allocations made by the mechanism must be subadditive implying that the price of a bundle cannot exceed the sum of prices of individual items it contains. This natural constraint has enabled several positive results in multi-item mechanism design bypassing well-established impossibility results. Our work addresses a main open question from this literature involving the design of buymany mechanisms for multiple buyers. Our main result is that a simple sequential item pricing mechanism with buyer-specific prices can achieve an O(log m) approximation to the revenue of any buy-many mechanism when all buyers have unit-demand preferences over m items. This is the best possible as it directly matches the previous results for the single-buyer setting where no simple mechanism can obtain a better approximation. Our result applies in full generality: even though there are many alternative ways buy-many mechanisms can be defined for multibuyer settings, our result captures all of them at the same time. We achieve this by directly competing with a more permissive upper-bound on the buy-many revenue, obtained via an ex-ante relaxation.

Streaming PCA for Markovian Data

Syamantak Kumar

Abstract: Since its inception in 1982, Oja’s algorithm has become an established method for streaming principle component analysis (PCA). We study the problem of streaming PCA, where the data-points are sampled from an irreducible, aperiodic, and reversible Markov chain. Our goal is to estimate the top eigenvector of the unknown covariance matrix of the stationary distribution. This setting has implications in scenarios where data can solely be sampled from a Markov Chain Monte Carlo (MCMC) type algorithm, and the objective is to perform inference on parameters of the stationary distribution. Most convergence guarantees for Oja’s algorithm in the literature assume that the data-points are sampled IID. For data streams with Markovian dependence, one typically downsamples the data to get a “nearly” independent data stream. In this paper, we obtain the first sharp rate for Oja’s algorithm on the entire data, where we remove the logarithmic dependence on the sample size, resulting from throwing data away in downsampling strategies.

A d^{1/2 + o(1)} Monotonicity Tester for Boolean Functions on d-Dimensional Hypergrids

Hadley Black

Abstract: Monotonicity testing of Boolean functions over the n-width, d-dimensional hypergrid is a classic problem in property testing, where the goal is to design a randomized algorithm which can distinguish monotone functions from those which are far from any monotone function while making as few queries as possible. The special case of n = 2 corresponds to the hypercube domain. Here a long line of works exploiting a very interesting connection with isoperimetric inequalities for Boolean functions culminated in a non-adaptive tester making ~O(d^{1/2}) queries in a celebrated paper by Khot, Minzer, and Safra (SICOMP 2018). This is known to be optimal for non-adaptive testers. However, the general case of hypergrids for n > 2 remained open. Very recently, two papers (Black-Chakrabarty-Seshadhri STOC 2023 and Braverman-Khot-Kindler-Minzer ITCS 2023) independently obtained ~O(poly(n) d^{1/2}) query testers for hypergrids. These results are essentially optimal for n < polylog(d), but are far from optimal for n >> polylog(d).

This talk covers our most recent result (appearing at FOCS 2023) which obtains a non-adaptive d^{1/2+o(1)} query tester for all n, resolving the non-adaptive monotonicity testing problem for hypergrids, up to a factor of d^{o(1)}. Our proof relies on many new techniques as well as two key theorems which we proved in earlier works from SODA 2020 and STOC 2023.

SmoothLLMs: Defending LLMs against Adversarial Attacks

Alex Robey

Abstract: Despite efforts to align large language models (LLMs) with human values, widely-used LLMs such as GPT, Llama, Claude, and PaLM are susceptible to jailbreaking attacks, wherein an adversary fools a targeted LLM into generating objectionable content.  To address this vulnerability, we propose SmoothLLM, the first algorithm designed to mitigate jailbreaking attacks on LLMs.  Based on our finding that adversarially-generated prompts are brittle to character-level changes, our defense first randomly perturbs multiple copies of a given input prompt, and then aggregates the corresponding predictions to detect adversarial inputs.  SmoothLLM reduces the attack success rate on numerous popular LLMs to below one percentage point, avoids unnecessary conservatism, and admits provable guarantees on attack mitigation.  Moreover, our defense uses exponentially fewer queries than existing attacks and is compatible with any LLM.

Composition of Nested Embeddings with an Application to Outlier Removal

Kristin Sheridan

Abstract: We study the design of embeddings into Euclidean space with outliers. Given a metric space $(X,d)$ and an integer $k$, the goal is to embed all but $k$ points in $X$ (called the “”outliers””) into $\ell_2$ with the smallest possible distortion $c$. Finding the optimal distortion $c$ for a given outlier set size $k$, or alternately the smallest $k$ for a given target distortion $c$ are both NP-hard problems. In fact, it is UGC-hard to approximate $k$ to within a factor smaller than $2$ even when the metric sans outliers is isometrically embeddable into $\ell_2$. We consider bi-criteria approximations. Our main result is a polynomial time algorithm that approximates the outlier set size to within an $O(\log^2 k)$ factor and the distortion to within a constant factor.

The main technical component in our result is an approach for constructing a composition of two given embeddings from subsets of $X$ into $\ell_2$ which inherits the distortions of each to within small multiplicative factors. Specifically, given a low $c_S$ distortion embedding from $S\subset X$ into $\ell_2$ and a high(er) $c_X$ distortion embedding from the entire set $X$ into $\ell_2$, we construct a single embedding that achieves the same  distortion $c_S$ over pairs of points in $S$ and an expansion of at most $O(\log k)\cdot c_X$ over the remaining pairs of points, where $k=|X\setminus S|$. Our composition theorem extends to embeddings into arbitrary $\ell_p$ metrics for $p\ge 1$, and may be of independent interest. While unions of embeddings over disjoint sets have been studied previously, to our knowledge, this is the first work to consider compositions of {\em nested} embeddings.

Graph Sparsification by Approximate Matrix Multiplication

Neo Charalambides

Abstract:  Graphs arising in statistical problems, signal processing, large networks, combinatorial optimization, and data analysis are often dense, which causes both computational and storage bottlenecks. One way of sparsifying a weighted graph, while sharing the same vertices as the original graph but reducing the number of edges, is through spectral sparsification. We study this problem through the perspective of RandNLA. Specifically, we utilize randomized matrix multiplication to give a clean and simple analysis of how sampling according to edge weights gives a spectral approximation to graph Laplacians, without requiring spectral information. Through the CR−MM algorithm, we attain a simple and computationally efficient sparsifier whose resulting Laplacian estimate is unbiased and of minimum variance. Furthermore, we define a new notion of additive spectral sparsifiers, which has not been considered in the literature.

Talk Title

Student Name

Abstract