3,262 research outputs found
Skyline Identification in Multi-Armed Bandits
We introduce a variant of the classical PAC multi-armed bandit problem. There
is an ordered set of arms , each with some stochastic
reward drawn from some unknown bounded distribution. The goal is to identify
the of the set , consisting of all arms such that
has larger expected reward than all lower-numbered arms . We
define a natural notion of an -approximate skyline and prove
matching upper and lower bounds for identifying an -skyline.
Specifically, we show that in order to identify an -skyline from
among arms with probability , samples are necessary and sufficient. When , our results improve over the naive algorithm, which draws enough samples
to approximate the expected reward of every arm; the algorithm of (Auer et al.,
AISTATS'16) for Pareto-optimal arm identification is likewise superseded. Our
results show that the sample complexity of the skyline problem lies strictly in
between that of best arm identification (Even-Dar et al., COLT'02) and that of
approximating the expected reward of every arm.Comment: 18 pages, 2 Figures; an ALT'18/ISIT'18 submissio
Necessary Conditions in Multi-Server Differential Privacy
We consider protocols where users communicate with multiple servers to perform a computation on the users\u27 data. An adversary exerts semi-honest control over many of the parties but its view is differentially private with respect to honest users. Prior work described protocols that required multiple rounds of interaction or offered privacy against a computationally bounded adversary. Our work presents limitations of non-interactive protocols that offer privacy against unbounded adversaries. We prove that these protocols require exponentially more samples than centrally private counterparts to solve some learning, testing, and estimation tasks. This means sample-efficiency demands interactivity or computational differential privacy, or both
Separating Local & Shuffled Differential Privacy via Histograms
Recent work in differential privacy has highlighted the shuffled model as a promising avenue to compute accurate statistics while keeping raw data in users\u27 hands. We present a protocol in this model that estimates histograms with error independent of the domain size. This implies an arbitrarily large gap in sample complexity between the shuffled and local models. On the other hand, we show that the models are equivalent when we impose the constraints of pure differential privacy and single-message randomizers
Private Summation in the Multi-Message Shuffle Model
The shuffle model of differential privacy (Erlingsson et al. SODA 2019; Cheu
et al. EUROCRYPT 2019) and its close relative encode-shuffle-analyze (Bittau et
al. SOSP 2017) provide a fertile middle ground between the well-known local and
central models. Similarly to the local model, the shuffle model assumes an
untrusted data collector who receives privatized messages from users, but in
this case a secure shuffler is used to transmit messages from users to the
collector in a way that hides which messages came from which user. An
interesting feature of the shuffle model is that increasing the amount of
messages sent by each user can lead to protocols with accuracies comparable to
the ones achievable in the central model. In particular, for the problem of
privately computing the sum of bounded real values held by different
users, Cheu et al. showed that messages per user suffice to
achieve error (the optimal rate in the central model), while Balle et
al. (CRYPTO 2019) recently showed that a single message per user leads to
MSE (mean squared error), a rate strictly in-between what is
achievable in the local and central models.
This paper introduces two new protocols for summation in the shuffle model
with improved accuracy and communication trade-offs. Our first contribution is
a recursive construction based on the protocol from Balle et al. mentioned
above, providing error with
messages per user. The second contribution is a protocol with error and
messages per user based on a novel analysis of the reduction from secure
summation to shuffling introduced by Ishai et al. (FOCS 2006) (the original
reduction required messages per user).Comment: Published at CCS'2
Hunt for new phenomena using large jet multiplicities and missing transverse momentum with ATLAS in 4.7 fbā1 of sā=7TeV proton-proton collisions
Results are presented of a search for new particles decaying to large numbers of jets in association with missing transverse momentum, using 4.7 fbā1 of pp collision data at sā=7TeV collected by the ATLAS experiment at the Large Hadron Collider in 2011. The event selection requires missing transverse momentum, no isolated electrons or muons, and from ā„6 to ā„9 jets. No evidence is found for physics beyond the Standard Model. The results are interpreted in the context of a MSUGRA/CMSSM supersymmetric model, where, for large universal scalar mass m 0, gluino masses smaller than 840 GeV are excluded at the 95% confidence level, extending previously published limits. Within a simplified model containing only a gluino octet and a neutralino, gluino masses smaller than 870 GeV are similarly excluded for neutralino masses below 100 GeV
- ā¦