3,262 research outputs found

    Skyline Identification in Multi-Armed Bandits

    Full text link
    We introduce a variant of the classical PAC multi-armed bandit problem. There is an ordered set of nn arms A[1],ā€¦,A[n]A[1],\dots,A[n], each with some stochastic reward drawn from some unknown bounded distribution. The goal is to identify the skylineskyline of the set AA, consisting of all arms A[i]A[i] such that A[i]A[i] has larger expected reward than all lower-numbered arms A[1],ā€¦,A[iāˆ’1]A[1],\dots,A[i-1]. We define a natural notion of an Īµ\varepsilon-approximate skyline and prove matching upper and lower bounds for identifying an Īµ\varepsilon-skyline. Specifically, we show that in order to identify an Īµ\varepsilon-skyline from among nn arms with probability 1āˆ’Ī“1-\delta, Ī˜(nĪµ2ā‹…minā”{logā”(1ĪµĪ“),logā”(nĪ“)}) \Theta\bigg(\frac{n}{\varepsilon^2} \cdot \min\bigg\{ \log\bigg(\frac{1}{\varepsilon \delta}\bigg), \log\bigg(\frac{n}{\delta}\bigg) \bigg\} \bigg) samples are necessary and sufficient. When Īµā‰«1/n\varepsilon \gg 1/n, our results improve over the naive algorithm, which draws enough samples to approximate the expected reward of every arm; the algorithm of (Auer et al., AISTATS'16) for Pareto-optimal arm identification is likewise superseded. Our results show that the sample complexity of the skyline problem lies strictly in between that of best arm identification (Even-Dar et al., COLT'02) and that of approximating the expected reward of every arm.Comment: 18 pages, 2 Figures; an ALT'18/ISIT'18 submissio

    Necessary Conditions in Multi-Server Differential Privacy

    Get PDF
    We consider protocols where users communicate with multiple servers to perform a computation on the users\u27 data. An adversary exerts semi-honest control over many of the parties but its view is differentially private with respect to honest users. Prior work described protocols that required multiple rounds of interaction or offered privacy against a computationally bounded adversary. Our work presents limitations of non-interactive protocols that offer privacy against unbounded adversaries. We prove that these protocols require exponentially more samples than centrally private counterparts to solve some learning, testing, and estimation tasks. This means sample-efficiency demands interactivity or computational differential privacy, or both

    Separating Local & Shuffled Differential Privacy via Histograms

    Get PDF
    Recent work in differential privacy has highlighted the shuffled model as a promising avenue to compute accurate statistics while keeping raw data in users\u27 hands. We present a protocol in this model that estimates histograms with error independent of the domain size. This implies an arbitrarily large gap in sample complexity between the shuffled and local models. On the other hand, we show that the models are equivalent when we impose the constraints of pure differential privacy and single-message randomizers

    Private Summation in the Multi-Message Shuffle Model

    Full text link
    The shuffle model of differential privacy (Erlingsson et al. SODA 2019; Cheu et al. EUROCRYPT 2019) and its close relative encode-shuffle-analyze (Bittau et al. SOSP 2017) provide a fertile middle ground between the well-known local and central models. Similarly to the local model, the shuffle model assumes an untrusted data collector who receives privatized messages from users, but in this case a secure shuffler is used to transmit messages from users to the collector in a way that hides which messages came from which user. An interesting feature of the shuffle model is that increasing the amount of messages sent by each user can lead to protocols with accuracies comparable to the ones achievable in the central model. In particular, for the problem of privately computing the sum of nn bounded real values held by nn different users, Cheu et al. showed that O(n)O(\sqrt{n}) messages per user suffice to achieve O(1)O(1) error (the optimal rate in the central model), while Balle et al. (CRYPTO 2019) recently showed that a single message per user leads to Ī˜(n1/3)\Theta(n^{1/3}) MSE (mean squared error), a rate strictly in-between what is achievable in the local and central models. This paper introduces two new protocols for summation in the shuffle model with improved accuracy and communication trade-offs. Our first contribution is a recursive construction based on the protocol from Balle et al. mentioned above, providing poly(logā”logā”n)\mathrm{poly}(\log \log n) error with O(logā”logā”n)O(\log \log n) messages per user. The second contribution is a protocol with O(1)O(1) error and O(1)O(1) messages per user based on a novel analysis of the reduction from secure summation to shuffling introduced by Ishai et al. (FOCS 2006) (the original reduction required O(logā”n)O(\log n) messages per user).Comment: Published at CCS'2

    Hunt for new phenomena using large jet multiplicities and missing transverse momentum with ATLAS in 4.7 fbāˆ’1 of sāˆš=7TeV proton-proton collisions

    Get PDF
    Results are presented of a search for new particles decaying to large numbers of jets in association with missing transverse momentum, using 4.7 fbāˆ’1 of pp collision data at sāˆš=7TeV collected by the ATLAS experiment at the Large Hadron Collider in 2011. The event selection requires missing transverse momentum, no isolated electrons or muons, and from ā‰„6 to ā‰„9 jets. No evidence is found for physics beyond the Standard Model. The results are interpreted in the context of a MSUGRA/CMSSM supersymmetric model, where, for large universal scalar mass m 0, gluino masses smaller than 840 GeV are excluded at the 95% confidence level, extending previously published limits. Within a simplified model containing only a gluino octet and a neutralino, gluino masses smaller than 870 GeV are similarly excluded for neutralino masses below 100 GeV
    • ā€¦
    corecore