Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Noise-tolerant learning, the parity problem, and the statistical query model

Published: 01 July 2003 Publication History

Abstract

We describe a slightly subexponential time algorithm for learning parity functions in the presence of random classification noise, a problem closely related to several cryptographic and coding problems. Our algorithm runs in polynomial time for the case of parity functions that depend on only the first O(log n log log n) bits of input, which provides the first known instance of an efficient noise-tolerant algorithm for a concept class that is not learnable in the Statistical Query model of Kearns [1998]. Thus, we demonstrate that the set of problems learnable in the statistical query model is a strict subset of those problems learnable in the presence of noise in the PAC model.In coding-theory terms, what we give is a poly(n)-time algorithm for decoding linear k × n codes in the presence of random noise for the case of k = c log n log log n for some c > 0. (The case of k = O(log n) is trivial since one can just individually check each of the 2k possible messages and choose the one that yields the closest codeword.)A natural extension of the statistical query model is to allow queries about statistical properties that involve t-tuples of examples, as opposed to just single examples. The second result of this article is to show that any class of functions learnable (strongly or weakly) with t-wise queries for t = O(log n) is also weakly learnable with standard unary queries. Hence, this natural extension to the statistical query model does not increase the set of weakly learnable functions.

References

[1]
Ajtai, M., Kumar, R., and Sivakumar, D. 2001. A sieve algorithm for the shortest lattice vector problem. In Proceedings of the 33rd Annual ACM Symposium on Theory of Computing. ACM, New York.
[2]
Angluin, D., and Laird, P. 1988. Learning from noisy examples. Mach. Learn. 2, 4, 343--370.
[3]
Aslam, J. A., and Decatur, S. E. 1998a. General bounds on statistical query learning and PAC learning with noise via hypothesis boosting. Inf. Comput. 141, 2 (Mar.), 85--118.
[4]
Aslam, J. A., and Decatur, S. E. 1998b. Specification and simulation of statistical query algorithms for efficiency and noise tolerance. J. Comput. Syst. Sci. 56, 2 (Apr.), 191--208.
[5]
Blum, A., Furst, M., Jackson, J., Kearns, M., Mansour, Y., and Rudich, S. 1994. Weakly learning DNF and characterizing statistical query learning using fourier analysis. In Proceedings of the 26th Annual ACM Symposium on Theory of Computing (May). ACM New York, pp. 253--262.
[6]
Decatur, S. E. 1993. Statistical queries and faulty PAC oracles. In Proceedings of the 6th Annual ACM Workshop on Computational Learning Theory. ACM, New York.
[7]
Decatur, S. E. 1996. Learning in hybrid noise environments using statistical queries. In Learning from Data: Artificial Intelligence and Statistics V, D. Fisher and H.-J. Lenz, Eds. Springer-Verlag, New York.
[8]
Helmbold, D., Sloan, R., and Warmuth, M. 1992. Learning integer lattices. SIAM J. Comput. 21, 2, 240--266.
[9]
MacWilliams, F., and Sloane, N. 1977. The Theory of Error-Correcting Codes. North-Holland, Amsterdam, The Netherlands.
[10]
Jackson, J. 2000. On the efficiency of noise-tolerant PAC algorithms derived from statistical queries. In Proceedings of the 13th Annual Workshop on Computational Learning Theory.
[11]
Kearns, M. 1998. Efficient noise-tolerant learning from statistical queries. J. ACM, 45, 6 (Nov.), 983--1006.
[12]
Kumar, R., and Sivakumar, D. 2001. On polynomial approximations to the shortest lattice vector length. In Proceedings of the 12th Annual Symposium on Discrete Algorithms.
[13]
Littlestone, N. 1988. Learning quickly when irrelevant attributes abound: A new linear-threshold algorithm. Mach. Learn. 2, 285--318.
[14]
Littlestone, N. 1989. From online to batch learning. In Proceedings of the 2nd Annual ACM Conference on Computational Learning Theory. ACM, New York, pp. 269--284.
[15]
Wagner, D. 2002. A generalized birthday problem. In Proceedings in Advances in Cryptology---Crypto 2002. Lecture Notes in Computer Science, vol. 2442. Springer-Verlag, New York, pp. 288--304.

Cited By

View all
  • (2024)Optimizing $c$-sum BKW and Faster Quantum Variant for LWEIACR Communications in Cryptology10.62056/a6qj5w7sfOnline publication date: 7-Oct-2024
  • (2024)A joint training framework for learning with noisy labelsSCIENTIA SINICA Informationis10.1360/SSI-2022-039554:1(144)Online publication date: 15-Jan-2024
  • (2024)Fine-grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XORJournal of the ACM10.1145/365301471:3(1-41)Online publication date: 11-Jun-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Journal of the ACM
Journal of the ACM  Volume 50, Issue 4
July 2003
163 pages
ISSN:0004-5411
EISSN:1557-735X
DOI:10.1145/792538
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 2003
Published in JACM Volume 50, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Computational learning theory
  2. machine learning
  3. statistical queries

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)145
  • Downloads (Last 6 weeks)21
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Optimizing $c$-sum BKW and Faster Quantum Variant for LWEIACR Communications in Cryptology10.62056/a6qj5w7sfOnline publication date: 7-Oct-2024
  • (2024)A joint training framework for learning with noisy labelsSCIENTIA SINICA Informationis10.1360/SSI-2022-039554:1(144)Online publication date: 15-Jan-2024
  • (2024)Fine-grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XORJournal of the ACM10.1145/365301471:3(1-41)Online publication date: 11-Jun-2024
  • (2024)Tackling Instance-Dependent Label Noise with Class Rebalance and Geometric RegularizationProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671707(211-221)Online publication date: 25-Aug-2024
  • (2024)Randomly Punctured Reed–Solomon Codes Achieve List-Decoding Capacity over Linear-Sized FieldsProceedings of the 56th Annual ACM Symposium on Theory of Computing10.1145/3618260.3649634(1458-1469)Online publication date: 10-Jun-2024
  • (2024)A Key-Recovery Attack on the LCMQ Authentication Protocol2024 IEEE International Symposium on Information Theory (ISIT)10.1109/ISIT57864.2024.10619211(1824-1829)Online publication date: 7-Jul-2024
  • (2024)Learning with Noisy Labels: A Novel Meta Label Corrector without Clean Validation Data2024 International Joint Conference on Neural Networks (IJCNN)10.1109/IJCNN60899.2024.10651351(1-8)Online publication date: 30-Jun-2024
  • (2024)Quadripartite: Tackle Noisy Labels by Better Utilizing Uncertain Samples2024 International Joint Conference on Neural Networks (IJCNN)10.1109/IJCNN60899.2024.10651073(1-8)Online publication date: 30-Jun-2024
  • (2024)Neural-shadow quantum state tomographyPhysical Review Research10.1103/PhysRevResearch.6.0232506:2Online publication date: 6-Jun-2024
  • (2024)An iterative correction method for practically LPN solvingInformation Sciences10.1016/j.ins.2024.121080679(121080)Online publication date: Sep-2024
  • Show More Cited By

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media