Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–33 of 33 results for author: Goldfeld, Z

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.06509  [pdf, ps, other

    cs.LG stat.ML

    Robust Distribution Learning with Local and Global Adversarial Corruptions

    Authors: Sloan Nietert, Ziv Goldfeld, Soroosh Shafiee

    Abstract: We consider learning in an adversarial environment, where an $\varepsilon$-fraction of samples from a distribution $P$ are arbitrarily modified (global corruptions) and the remaining perturbations have average magnitude bounded by $ρ$ (local corruptions). Given access to $n$ such corrupted samples, we seek a computationally efficient estimator $\hat{P}_n$ that minimizes the Wasserstein distance… ▽ More

    Submitted 24 June, 2024; v1 submitted 10 June, 2024; originally announced June 2024.

    Comments: Accepted for presentation at the Conference on Learning Theory (COLT) 2024

  2. arXiv:2404.03176  [pdf, other

    cs.LG cs.IT

    Information-Theoretic Generalization Bounds for Deep Neural Networks

    Authors: Haiyun He, Christina Lee Yu, Ziv Goldfeld

    Abstract: Deep neural networks (DNNs) exhibit an exceptional capacity for generalization in practical applications. This work aims to capture the effect and benefits of depth for supervised learning via information-theoretic generalization bounds. We first derive two hierarchical bounds on the generalization error in terms of the Kullback-Leibler (KL) divergence or the 1-Wasserstein distance between the tra… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

    Comments: 25 pages, 5 figures

  3. arXiv:2311.05573  [pdf, other

    stat.ML cs.LG math.OC

    Outlier-Robust Wasserstein DRO

    Authors: Sloan Nietert, Ziv Goldfeld, Soroosh Shafiee

    Abstract: Distributionally robust optimization (DRO) is an effective approach for data-driven decision-making in the presence of uncertainty. Geometric uncertainty due to sampling or localized perturbations of data points is captured by Wasserstein DRO (WDRO), which seeks to learn a model that performs uniformly well over a Wasserstein ball centered around the observed data distribution. However, WDRO fails… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

    Comments: Appearing at NeurIPS 2023

  4. arXiv:2309.16200  [pdf, other

    cs.LG cs.IT

    Max-Sliced Mutual Information

    Authors: Dor Tsur, Ziv Goldfeld, Kristjan Greenewald

    Abstract: Quantifying the dependence between high-dimensional random variables is central to statistical learning and inference. Two classical methods are canonical correlation analysis (CCA), which identifies maximally correlated projected versions of the original variables, and Shannon's mutual information, which is a universal dependence measure that also captures high-order dependencies. However, CCA on… ▽ More

    Submitted 28 September, 2023; originally announced September 2023.

    Comments: Accepted at NeurIPS 2023

  5. arXiv:2307.01171  [pdf, other

    quant-ph cond-mat.stat-mech cs.IT cs.LG

    Quantum Neural Estimation of Entropies

    Authors: Ziv Goldfeld, Dhrumil Patel, Sreejith Sreekumar, Mark M. Wilde

    Abstract: Entropy measures quantify the amount of information and correlation present in a quantum system. In practice, when the quantum state is unknown and only copies thereof are available, one must resort to the estimation of such entropy measures. Here we propose a variational quantum algorithm for estimating the von Neumann and Rényi entropies, as well as the measured relative entropy and measured Rén… ▽ More

    Submitted 5 February, 2024; v1 submitted 3 July, 2023; originally announced July 2023.

    Comments: 14 pages, 2 figures; see also independent works of Shin, Lee, and Jeong at arXiv:2306.14566v1 and Lee, Kwon, and Lee at arXiv:2307.13511v2

    Journal ref: Physical Review A, vol. 109, no. 3, page 032431, March 2024

  6. arXiv:2306.13054  [pdf, other

    quant-ph cs.CR cs.IT cs.LG

    Quantum Pufferfish Privacy: A Flexible Privacy Framework for Quantum Systems

    Authors: Theshani Nuradha, Ziv Goldfeld, Mark M. Wilde

    Abstract: We propose a versatile privacy framework for quantum systems, termed quantum pufferfish privacy (QPP). Inspired by classical pufferfish privacy, our formulation generalizes and addresses limitations of quantum differential privacy by offering flexibility in specifying private information, feasible measurements, and domain knowledge. We show that QPP can be equivalently formulated in terms of the D… ▽ More

    Submitted 28 May, 2024; v1 submitted 22 June, 2023; originally announced June 2023.

    Comments: v2: 33 pages, 9 figures, accepted to IEEE Transactions on Information Theory

    Journal ref: IEEE Transactions on Information Theory, vol. 70, no. 8, pp. 5731-5762, Aug. 2024

  7. arXiv:2302.01237  [pdf, other

    stat.ML cs.LG math.ST

    Robust Estimation under the Wasserstein Distance

    Authors: Sloan Nietert, Rachel Cummings, Ziv Goldfeld

    Abstract: We study the problem of robust distribution estimation under the Wasserstein metric, a popular discrepancy measure between probability distributions rooted in optimal transport (OT) theory. We introduce a new outlier-robust Wasserstein distance $\mathsf{W}_p^\varepsilon$ which allows for $\varepsilon$ outlier mass to be removed from its input distributions, and show that minimum distance estimatio… ▽ More

    Submitted 2 February, 2023; originally announced February 2023.

    Comments: arXiv admin note: text overlap with arXiv:2111.01361

  8. arXiv:2301.00621  [pdf, ps, other

    cs.IT cs.LG

    Data-Driven Optimization of Directed Information over Discrete Alphabets

    Authors: Dor Tsur, Ziv Aharoni, Ziv Goldfeld, Haim Permuter

    Abstract: Directed information (DI) is a fundamental measure for the study and analysis of sequential stochastic models. In particular, when optimized over input distributions it characterizes the capacity of general communication channels. However, analytic computation of DI is typically intractable and existing optimization techniques over discrete input alphabets require knowledge of the channel model, w… ▽ More

    Submitted 2 January, 2023; originally announced January 2023.

  9. arXiv:2211.11184  [pdf, ps, other

    math.ST cs.IT

    Limit distribution theory for $f$-Divergences

    Authors: Sreejith Sreekumar, Ziv Goldfeld, Kengo Kato

    Abstract: $f$-divergences, which quantify discrepancy between probability distributions, are ubiquitous in information theory, machine learning, and statistics. While there are numerous methods for estimating $f… ▽ More

    Submitted 12 October, 2023; v1 submitted 21 November, 2022; originally announced November 2022.

  10. Pufferfish Privacy: An Information-Theoretic Study

    Authors: Theshani Nuradha, Ziv Goldfeld

    Abstract: Pufferfish privacy (PP) is a generalization of differential privacy (DP), that offers flexibility in specifying sensitive information and integrates domain knowledge into the privacy definition. Inspired by the illuminating formulation of DP in terms of mutual information due to Cuff and Yu, this work explores PP through the lens of information theory. We provide an information-theoretic formulati… ▽ More

    Submitted 3 May, 2023; v1 submitted 23 October, 2022; originally announced October 2022.

    Journal ref: IEEE Transactions on Information Theory, vol. 69, no. 11, pp. 7336-7356, Nov. 2023

  11. arXiv:2210.09160  [pdf, other

    stat.ML cs.LG

    Statistical, Robustness, and Computational Guarantees for Sliced Wasserstein Distances

    Authors: Sloan Nietert, Ritwik Sadhu, Ziv Goldfeld, Kengo Kato

    Abstract: Sliced Wasserstein distances preserve properties of classic Wasserstein distances while being more scalable for computation and estimation in high dimensions. The goal of this work is to quantify this scalability from three key aspects: (i) empirical convergence rates; (ii) robustness to data contamination; and (iii) efficient computational methods. For empirical convergence, we derive fast rates… ▽ More

    Submitted 17 October, 2022; originally announced October 2022.

  12. arXiv:2206.08526  [pdf, other

    cs.IT stat.ML

    k-Sliced Mutual Information: A Quantitative Study of Scalability with Dimension

    Authors: Ziv Goldfeld, Kristjan Greenewald, Theshani Nuradha, Galen Reeves

    Abstract: Sliced mutual information (SMI) is defined as an average of mutual information (MI) terms between one-dimensional random projections of the random variables. It serves as a surrogate measure of dependence to classic MI that preserves many of its properties but is more scalable to high dimensions. However, a quantitative characterization of how SMI itself and estimation rates thereof depend on the… ▽ More

    Submitted 14 October, 2022; v1 submitted 16 June, 2022; originally announced June 2022.

    Comments: Accepted at NeurIPS 2022

  13. arXiv:2203.14743  [pdf, ps, other

    cs.IT

    Neural Estimation and Optimization of Directed Information over Continuous Spaces

    Authors: Dor Tsur, Ziv Aharoni, Ziv Goldfeld, Haim Permuter

    Abstract: This work develops a new method for estimating and optimizing the directed information rate between two jointly stationary and ergodic stochastic processes. Building upon recent advances in machine learning, we propose a recurrent neural network (RNN)-based estimator which is optimized via gradient ascent over the RNN parameters. The estimator does not require prior knowledge of the underlying joi… ▽ More

    Submitted 28 March, 2022; originally announced March 2022.

    Comments: 38 pages, 6 figures

  14. arXiv:2111.11328  [pdf, other

    cs.LG stat.ML

    Cycle Consistent Probability Divergences Across Different Spaces

    Authors: Zhengxin Zhang, Youssef Mroueh, Ziv Goldfeld, Bharath K. Sriperumbudur

    Abstract: Discrepancy measures between probability distributions are at the core of statistical inference and machine learning. In many applications, distributions of interest are supported on different spaces, and yet a meaningful correspondence between data points is desired. Motivated to explicitly encode consistent bidirectional maps into the discrepancy measure, this work proposes a novel unbalanced Mo… ▽ More

    Submitted 22 November, 2021; originally announced November 2021.

    Comments: 35 pages

  15. arXiv:2111.01361  [pdf, other

    stat.ML cs.LG

    Outlier-Robust Optimal Transport: Duality, Structure, and Statistical Analysis

    Authors: Sloan Nietert, Rachel Cummings, Ziv Goldfeld

    Abstract: The Wasserstein distance, rooted in optimal transport (OT) theory, is a popular discrepancy measure between probability distributions with various applications to statistics and machine learning. Despite their rich structure and demonstrated utility, Wasserstein distances are sensitive to outliers in the considered distributions, which hinders applicability in practice. We propose a new outlier-ro… ▽ More

    Submitted 28 February, 2023; v1 submitted 2 November, 2021; originally announced November 2021.

    Comments: updated to match AISTATS publication

  16. arXiv:2110.05279  [pdf, ps, other

    cs.IT

    Sliced Mutual Information: A Scalable Measure of Statistical Dependence

    Authors: Ziv Goldfeld, Kristjan Greenewald

    Abstract: Mutual information (MI) is a fundamental measure of statistical dependence, with a myriad of applications to information theory, statistics, and machine learning. While it possesses many desirable structural properties, the estimation of high-dimensional MI from samples suffers from the curse of dimensionality. Motivated by statistical scalability to high dimensions, this paper proposes sliced MI… ▽ More

    Submitted 18 October, 2021; v1 submitted 11 October, 2021; originally announced October 2021.

  17. arXiv:2004.14941  [pdf, other

    cs.LG stat.ML

    The Information Bottleneck Problem and Its Applications in Machine Learning

    Authors: Ziv Goldfeld, Yury Polyanskiy

    Abstract: Inference capabilities of machine learning (ML) systems skyrocketed in recent years, now playing a pivotal role in various aspect of society. The goal in statistical learning is to use data to obtain simple algorithms for predicting a random variable $Y$ from a correlated observation $X$. Since the dimension of $X$ is typically huge, computationally feasible solutions should summarize it into a lo… ▽ More

    Submitted 1 May, 2020; v1 submitted 30 April, 2020; originally announced April 2020.

  18. arXiv:2004.04330  [pdf, other

    cs.IT

    The Secrecy Capacity of Cost-Constrained Wiretap Channels

    Authors: Sreejith Sreekumar, Alexander Bunin, Ziv Goldfeld, Haim H. Permuter, Shlomo Shamai

    Abstract: In many information-theoretic channel coding problems, adding an input cost constraint to the operational setup amounts to restricting the optimization domain in the capacity formula. This paper shows that, in contrast to common belief, such a simple modification does not hold for the cost-constrained (CC) wiretap channel (WTC). The secrecy-capacity of the discrete memoryless (DM) WTC without cost… ▽ More

    Submitted 26 December, 2020; v1 submitted 8 April, 2020; originally announced April 2020.

  19. arXiv:2003.04179  [pdf, ps, other

    cs.IT cs.LG

    Capacity of Continuous Channels with Memory via Directed Information Neural Estimator

    Authors: Ziv Aharoni, Dor Tsur, Ziv Goldfeld, Haim Henry Permuter

    Abstract: Calculating the capacity (with or without feedback) of channels with memory and continuous alphabets is a challenging task. It requires optimizing the directed information (DI) rate over all channel input distributions. The objective is a multi-letter expression, whose analytic solution is only known for a few specific cases. When no analytic solution is present or the channel model is unknown, th… ▽ More

    Submitted 16 May, 2020; v1 submitted 9 March, 2020; originally announced March 2020.

  20. arXiv:1905.13576  [pdf, other

    math.ST cs.IT

    Convergence of Smoothed Empirical Measures with Applications to Entropy Estimation

    Authors: Ziv Goldfeld, Kristjan Greenewald, Yury Polyanskiy, Jonathan Weed

    Abstract: This paper studies convergence of empirical measures smoothed by a Gaussian kernel. Specifically, consider approximating $P\ast\mathcal{N}_σ$, for $\mathcal{N}_σ\triangleq\mathcal{N}(0,σ^2 \mathrm{I}_d)$, by $\hat{P}_n\ast\mathcal{N}_σ$, where $\hat{P}_n$ is the empirical measure, under different statistical distances. The convergence is examined in terms of the Wasserstein distance, total variati… ▽ More

    Submitted 1 May, 2020; v1 submitted 30 May, 2019; originally announced May 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1810.11589

  21. arXiv:1810.05728  [pdf, other

    cs.LG stat.ML

    Estimating Information Flow in Deep Neural Networks

    Authors: Ziv Goldfeld, Ewout van den Berg, Kristjan Greenewald, Igor Melnyk, Nam Nguyen, Brian Kingsbury, Yury Polyanskiy

    Abstract: We study the flow of information and the evolution of internal representations during deep neural network (DNN) training, aiming to demystify the compression aspect of the information bottleneck theory. The theory suggests that DNN training comprises a rapid fitting phase followed by a slower compression phase, in which the mutual information $I(X;T)$ between the input $X$ and internal representat… ▽ More

    Submitted 30 May, 2019; v1 submitted 12 October, 2018; originally announced October 2018.

    Comments: Main text accepted to ICML 2019. This preprint contains the full version of that paper (including omitted appendices)

  22. arXiv:1805.03027  [pdf, ps, other

    cs.IT cond-mat.stat-mech

    Information Storage in the Stochastic Ising Model

    Authors: Ziv Goldfeld, Guy Bresler, Yury Polyanskiy

    Abstract: Most information storage devices write data by modifying the local state of matter, in the hope that sub-atomic local interactions stabilize the state for sufficiently long time, thereby allowing later recovery. Motivated to explore how temporal evolution of physical states in magnetic storage media affects their capacity, this work initiates the study of information retention in locally-interacti… ▽ More

    Submitted 23 December, 2020; v1 submitted 8 May, 2018; originally announced May 2018.

  23. arXiv:1712.10299  [pdf, ps, other

    cs.IT

    Wiretap and Gelfand-Pinsker Channels Analogy and its Applications

    Authors: Ziv Goldfeld, Haim. H. Permuter

    Abstract: An analogy framework between wiretap channels (WTCs) and state-dependent point-to-point channels with non-causal encoder channel state information (referred to as Gelfand-Pinker channels (GPCs)) is proposed. A good sequence of stealth-wiretap codes is shown to induce a good sequence of codes for a corresponding GPC. Consequently, the framework enables exploiting existing results for GPCs to produc… ▽ More

    Submitted 28 May, 2019; v1 submitted 29 December, 2017; originally announced December 2017.

  24. arXiv:1708.04283  [pdf, ps, other

    cs.IT

    Key and Message Semantic-Security over State-Dependent Channels

    Authors: Alexander Bunin, Ziv Goldfeld, Haim H. Permuter, Shlomo Shamai, Paul Cuff, Pablo Piantanida

    Abstract: We study the trade-off between secret message (SM) and secret key (SK) rates, simultaneously achievable over a state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes other instances of CSI availability as special cases, and calls for efficient utilization of the state sequence for both reliability and security purposes. An inn… ▽ More

    Submitted 7 June, 2019; v1 submitted 14 August, 2017; originally announced August 2017.

  25. arXiv:1610.03990  [pdf, ps, other

    cs.IT

    Fourier-Motzkin Elimination Software for Information Theoretic Inequalities

    Authors: Ido B. Gattegno, Ziv Goldfeld, Haim H. Permuter

    Abstract: We provide open-source software implemented in MATLAB, that performs Fourier-Motzkin elimination (FME) and removes constraints that are redundant due to Shannon-type inequalities (STIs). The FME is often used in information theoretic contexts to simplify rate regions, e.g., by eliminating auxiliary rates. Occasionally, however, the procedure becomes cumbersome, which makes an error-free hand-writt… ▽ More

    Submitted 13 October, 2016; originally announced October 2016.

  26. arXiv:1608.06057  [pdf, ps, other

    cs.IT

    MIMO Gaussian Broadcast Channels with Common, Private and Confidential Messages

    Authors: Ziv Goldfeld, Haim H. Permuter

    Abstract: The two-user multiple-input multiple-output (MIMO) Gaussian broadcast channel (BC) with common, private and confidential messages is considered. The transmitter sends a common message to both users, a confidential message to User 1 and a private (non-confidential) message to User 2. The secrecy-capacity region is characterized by showing that certain inner and outer bounds coincide and that the bo… ▽ More

    Submitted 28 May, 2019; v1 submitted 22 August, 2016; originally announced August 2016.

  27. arXiv:1608.00743  [pdf, ps, other

    cs.IT

    Wiretap Channels with Random States Non-Causally Available at the Encoder

    Authors: Ziv Goldfeld, Paul Cuff, Haim H. Permuter

    Abstract: We study the state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes all other instances of CSI availability as special cases, and calls for an efficient utilization of the state sequence for both reliability and security purposes. A lower bound on the secrecy-capacity, that improves upon the previously best known result publis… ▽ More

    Submitted 28 May, 2019; v1 submitted 2 August, 2016; originally announced August 2016.

  28. arXiv:1601.03660  [pdf, ps, other

    cs.IT

    Arbitrarily Varying Wiretap Channels with Type Constrained States

    Authors: Ziv Goldfeld, Paul Cuff, Haim H. Permuter

    Abstract: An arbitrarily varying wiretap channel (AVWTC) with a type constraint on the allowed state sequences is considered, and a single-letter characterization of its correlated-random (CR) assisted semantic-security (SS) capacity is derived. The allowed state sequences are the ones in a typical set around a single constraining type. SS is established by showing that the mutual information between the me… ▽ More

    Submitted 18 October, 2016; v1 submitted 14 January, 2016; originally announced January 2016.

  29. arXiv:1601.01286  [pdf, ps, other

    cs.IT

    Strong Secrecy for Cooperative Broadcast Channels

    Authors: Ziv Goldfeld, Gerhard Kramer, Haim H. Permuter, Paul Cuff

    Abstract: A broadcast channel (BC) where the decoders cooperate via a one-sided link is considered. One common and two private messages are transmitted and the private message to the cooperative user should be kept secret from the cooperation-aided user. The secrecy level is measured in terms of strong secrecy, i.e., a vanishing information leakage. An inner bound on the capacity region is derived by using… ▽ More

    Submitted 28 May, 2019; v1 submitted 6 January, 2016; originally announced January 2016.

  30. arXiv:1509.03619  [pdf, ps, other

    cs.IT

    Semantic-Security Capacity for Wiretap Channels of Type II

    Authors: Ziv Goldfeld, Paul Cuff, Haim H. Permuter

    Abstract: The secrecy capacity of the type II wiretap channel (WTC II) with a noisy main channel is currently an open problem. Herein its secrecy-capacity is derived and shown to be equal to its semantic-security (SS) capacity. In this setting, the legitimate users communicate via a discrete-memoryless (DM) channel in the presence of an eavesdropper that has perfect access to a subset of its choosing of the… ▽ More

    Submitted 17 August, 2016; v1 submitted 11 September, 2015; originally announced September 2015.

    Journal ref: IEEE Transactions in Information Theory, Vol. 62, No. 7, July 2016

  31. Broadcast Channels with Privacy Leakage Constraints

    Authors: Ziv Goldfeld, Gerhard Kramer, Haim H. Permuter

    Abstract: The broadcast channel (BC) with one common and two private messages with leakage constraints is studied, where leakage rate refers to the normalized mutual information between a message and a channel symbol string. Each private message is destined for a different user and the leakage rate to the other receiver must satisfy a constraint. This model captures several scenarios concerning secrecy, i.e… ▽ More

    Submitted 28 May, 2017; v1 submitted 23 April, 2015; originally announced April 2015.

  32. Duality of a Source Coding Problem and the Semi-Deterministic Broadcast Channel with Rate-Limited Cooperation

    Authors: Ziv Goldfeld, Haim H. Permuter, Gerhard Kramer

    Abstract: The Wyner-Ahlswede-Körner (WAK) empirical-coordination problem where the encoders cooperate via a finite-capacity one-sided link is considered. The coordination-capacity region is derived by combining several source coding techniques, such as Wyner-Ziv (WZ) coding, binning and superposition coding. Furthermore, a semi-deterministic (SD) broadcast channel (BC) with one-sided decoder cooperation is… ▽ More

    Submitted 17 August, 2016; v1 submitted 30 May, 2014; originally announced May 2014.

    Journal ref: IEEE Transactions on Information Theory, Vol. 62, No. 5, May 2016

  33. The Finite State MAC with Cooperative Encoders and Delayed CSI

    Authors: Ziv Goldfeld, Haim H. Permuter, Benjamin M. Zaidel

    Abstract: In this paper, we consider the finite-state multiple access channel (MAC) with partially cooperative encoders and delayed channel state information (CSI). Here partial cooperation refers to the communication between the encoders via finite-capacity links. The channel states are assumed to be governed by a Markov process. Full CSI is assumed at the receiver, while at the transmitters, only delayed… ▽ More

    Submitted 29 January, 2015; v1 submitted 28 March, 2013; originally announced March 2013.

    Journal ref: IEEE Transactions on Information Theory, Vol. 60, No. 10, October 2014