CountSketch and Feature Hashing (the ``hashing trick'') are popular randomized dimensionality reduction methods that support recovery of l2 -heavy hitters and approximate inner products. When the inputs are not adaptive (do not depend on prior outputs), classic estimators applied to a sketch of size O(l / epsilon) are accurate for a number of queries that is exponential in l. When inputs are adaptive, however, an adversarial input can be constructed after O(l) queries with the classic estimator and the best known robust estimator only supports ~O(l^2) queries. In this work we show that this quadratic dependence is in a sense inherent: We design an attack that after O(l^2) queries produces an adversarial input vector whose sketch is high...
AbstractIn this paper we analyze the performance of double hashing, a well-known hashing algorithm i...
Machine Learning (ML) algorithms are vulnerable to poisoning attacks, where a fraction of the traini...
International audienceMachine learning systems are vulnerable to adversarial attack. By applying to ...
This lecture discusses a very neat paper of Mitzenmacher and Vadhan [8], which proposes a robust mea...
Modern machine learning algorithms are able to reach an astonishingly high level of performance in ...
We investigate probabilistic hashing techniques for addressing computational and memory challenges i...
Linear sketches are powerful algorithmic tools that turn an n-dimensional input into a concise lower...
Many efficient data structures use randomness, allowing them to improve upon deterministic ones. Usu...
We show that, under a standard hardness assumption, there is no computationally effi-cient algorithm...
Yao’s garbling scheme is one of the most fundamental cryptographic constructions. Lindell and Pinkas...
The algorithm Argon2i-B of Biryukov, Dinu and Khovratovich is currently being considered by the IRTF...
Increasing the computational complexity of evaluating a hash function, both for the honest users as ...
Machine learning models are critically susceptible to evasion attacks from adversarial examples. Gen...
Randomized algorithms are often enjoyed for their simplicity, but the hash functions employed to yie...
Deep learning plays an important role in various disciplines, such as auto-driving, information tech...
AbstractIn this paper we analyze the performance of double hashing, a well-known hashing algorithm i...
Machine Learning (ML) algorithms are vulnerable to poisoning attacks, where a fraction of the traini...
International audienceMachine learning systems are vulnerable to adversarial attack. By applying to ...
This lecture discusses a very neat paper of Mitzenmacher and Vadhan [8], which proposes a robust mea...
Modern machine learning algorithms are able to reach an astonishingly high level of performance in ...
We investigate probabilistic hashing techniques for addressing computational and memory challenges i...
Linear sketches are powerful algorithmic tools that turn an n-dimensional input into a concise lower...
Many efficient data structures use randomness, allowing them to improve upon deterministic ones. Usu...
We show that, under a standard hardness assumption, there is no computationally effi-cient algorithm...
Yao’s garbling scheme is one of the most fundamental cryptographic constructions. Lindell and Pinkas...
The algorithm Argon2i-B of Biryukov, Dinu and Khovratovich is currently being considered by the IRTF...
Increasing the computational complexity of evaluating a hash function, both for the honest users as ...
Machine learning models are critically susceptible to evasion attacks from adversarial examples. Gen...
Randomized algorithms are often enjoyed for their simplicity, but the hash functions employed to yie...
Deep learning plays an important role in various disciplines, such as auto-driving, information tech...
AbstractIn this paper we analyze the performance of double hashing, a well-known hashing algorithm i...
Machine Learning (ML) algorithms are vulnerable to poisoning attacks, where a fraction of the traini...
International audienceMachine learning systems are vulnerable to adversarial attack. By applying to ...