Authors listed in alphabetical order of last name. Safe to assume equal contribution unless an author is highlighted as the primary contributor.
Refutations of Perfect Matchings In Expander Graphs Is Hard
Manuscript available on request
AbstractThis work studies the complexity of refuting the existence of a perfect matching in spectral expanders with an odd number of vertices, in the Polynomial Calculus (PC) and Sum of Squares (SoS) proof system. Austrin and Risse [SODA, 2021] showed that refuting perfect matchings in sparse \(d\)-regular random graphs in the above proof systems requires proofs with degree \(\Omega(n/\log n)\) on average. We extend their result by showing the same lower bound holds for all \(d\)-regular graphs with a mild spectral gap.Additionally, as Austrin and Risse do for random graphs, we show that the hardness of refuting a more general class of formulae, which includes both perfect matchings and even-colouring formulas, also reduces to the hardness of refuting perfect matchings in spectral expanders, thereby settling an open problem of Buss and Nordstrom.
Differentially Private Hierarchical Heavy Hitters
Ari Biswas, Graham Cormode, Yaron Kanza, Divesh Srivastava, Zhengyi Zhou
The poster appeared at TPDP 2024
AbstractThe task of finding Hierarchical Heavy Hitters (HHH) was introduced by Cormode et al. [12] as a generalisation of the heavy hitter problem. While finding HHH in data streams has been studied extensively, the question of releasing HHH when the underlying data is private remains unexplored. In this paper, we formalise and study the notion of differentially private HHH, in both the streaming and non-streaming setting. In the non-streaming setting, we show the surprising result that the relative error in estimating the count for any prefix is independent of the height of the hierarchy and the number of heavy hitters in the stream. Additionally, our algorithms also improve the error guarantees of Ghazi et al. [24] for the problem of counting over trees. Meanwhile, in the streaming setting, the main issue is that although the exact version of HHH has low global sensitivity (as counting queries are 1-sensitive), the approximation functions due to streaming have high global sensitivity, linear in the available space. Despite this obstacle, we show that the absolute error for estimating frequencies in the streaming setting is independent of the available space.
@article{10.1145/3695826 author = {Biswas Ari and Cormode Graham and Kanza Yaron and Srivastava Divesh and Zhou Zhengyi} title = {Differentially Private Hierarchical Heavy Hitters} year = {2024} issue_date = {November 2024} publisher = {Association for Computing Machinery} address = {New York NY USA} volume = {2} number = {5} url = {https://doi.org/10.1145/3695826} doi = {10.1145/3695826} journal = {Proc. ACM Manag. Data} month = nov articleno = {208} umpages = {25} keywords = {differential privacy hierarchical heavy hitters improved composition}}
Interactive Proofs For Differentially Private Counting
The extended abstract appeared at TPDP 2023
AbstractDifferential Privacy (DP) is often presented as a strong privacy-enhancing technology with broad applicability and advocated as a de facto standard for releasing aggregate statistics on sensitive data. However, in many embodiments, DP introduces a new attack surface: a malicious entity entrusted with releasing statistics could manipulate the results and use the randomness of DP as a convenient smokescreen to mask its nefariousness. Since revealing the random noise would obviate the purpose of introducing it, the miscreant may have a perfect alibi. To close this loophole, we introduce the idea of Interactive Proofs For Differential Privacy, which requires the publishing entity to output a zero knowledge proof that convinces an efficient verifier that the output is both DP and reliable. Such a definition might seem unachievable, as a verifier must validate that DP randomness was generated faithfully without learning anything about the randomness itself. We resolve this paradox by carefully mixing private and public randomness to compute verifiable DP counting queries with theoretical guarantees and show that it is also practical for real-world deployment. We also demonstrate that computational assumptions are necessary by showing a separation between information-theoretic DP and computational DP under our definition of verifiability.
@inproceedings{10.1145/3576915.3616681 author = {Biswas Ari and Cormode Graham} title = {Interactive Proofs For Differentially Private Counting} year = {2023} isbn = {9798400700507} publisher = {Association for Computing Machinery} address = {New York NY USA} url = {https://doi.org/10.1145/3576915.3616681} doi = {10.1145/3576915.3616681} booktitle = {Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security} pages = {1919–1933} numpages = {15} keywords = {differential privacy secure multiparty computation verifiable computation zero knowledge} location = {Copenhagen Denmark} series = {CCS '23}}
Seeker: Real-Time Interactive Search
Ari Biswas, Thai Pham, Houssam Nassif, Ben Snyder, Michael Vogelsong
Abstract
This paper introduces Seeker, a system that allows users to interactively refine search rankings in real time, through feedback in the form of likes and dislikes. When searching online, users may not know how to accurately describe their product of choice in words. An alternative approach is to search an embedding space, allowing the user to query using a representation of the item (like a tune for a song, or a picture for an object). However, this approach requires the user to possess an example representation of their desired item. Additionally, most current search systems do not allow the user to dynamically adapt the results with further feedback. On the other hand, users often have a mental picture of the desired item and are able to answer ordinal questions of the form: Is this item similar to what you have in mind? With this assumption, our algorithm allows for users to provide sequential feedback on search results to adapt the search feed. We show that our proposed approach works well both qualitatively and quantitatively. Unlike most previous representation-based search systems, we can quantify the quality of our algorithm by evaluating humans-in-the-loop experiments.
@inproceedings{10.1145/3292500.3330733 author = {Biswas Ari and Pham Thai T. and Vogelsong Michael and Snyder Benjamin and Nassif Houssam} title = {Seeker: Real-Time Interactive Search} year = {2019} isbn = {9781450362016} publisher = {Association for Computing Machinery} address = {New York NY USA} url = {https://doi.org/10.1145/3292500.3330733} doi = {10.1145/3292500.3330733} booktitle = {Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining} pages = {2867–2875} numpages = {9} keywords = {real time recommendation online learning multi-armed bandit interactive search active learning} location = {Anchorage AK USA} series = {KDD '19}}
Adversarial Principal Component Analysis
Ari Biswas, Daniel Pimentel, Claudia SolÃs-Lemus
Abstract
This paper studies the following question: where should an adversary place an outlier of a given magnitude in order to maximize the error of the subspace estimated by PCA? We give the exact location of this worst possible outlier, and the exact expression of the maximum possible error. Equivalently, we determine the information-theoretic bounds on how much an outlier can tilt a subspace in its direction. This in turn provides universal (worst-case) error bounds for PCA under arbitrary noisy settings. Our results also have several implications on adaptive PCA, online PCA, and rank-one updates. We illustrate our results with a subspace tracking experiment.
@INPROCEEDINGS{8006952 author={Pimentel-Alarcón Daniel L. and Biswas Aritra and SolÃs-Lemus Claudia R.} booktitle={2017 IEEE International Symposium on Information Theory (ISIT)} title={Adversarial principal component analysis} year={2017} volume={} number={} pages={2363-2367} keywords={Principal component analysis;Noise measurement;Transforms;Robustness;Approximation algorithms;Genetic communication} doi={10.1109/ISIT.2017.8006952}}
Hands-on Introduction To Computer Science At The Freshman Level
Ari Biswas, Timur Girgin, Karu Sankaralingam, Zach York, Raghuraman Balasubramanian
Abstract
This paper details the creation of a hands-on introduction course that reflects the dramatic growth and diversity in computer science. Our aim was to enable students to get an end-to-end perspective on computer system design by building one. We report on a two-year exercise in using the Arduino platform to build a series of hands-on projects. We have used these projects in two course instances, and have obtained detailed student feedback, which we analyze and present in this paper. The instructions, code and videos developed are available open-source.
@inproceedings{10.1145/2538862.2538889 author = {Balasubramanian Raghuraman and York Zachary and Doran Matthew and Biswas Aritra and Girgin Timur and Sankaralingam Karthikeyan} title = {Hands-on introduction to computer science at the freshman level} year = {2014} isbn = {9781450326056} publisher = {Association for Computing Machinery} address = {New York NY USA} url = {https://doi.org/10.1145/2538862.2538889} doi = {10.1145/2538862.2538889} booktitle = {Proceedings of the 45th ACM Technical Symposium on Computer Science Education} pages = {235–240} numpages = {6} keywords = {hands-on projects introduction to computer science pedagogy} location = {Atlanta Georgia USA} series = {SIGCSE '14}}