The Exponential Mechanism (and maybe some mechanism design) Frank McSherry and Kunal Talwar Microsoft Research, Silicon Valley Campus

Size: px
Start display at page:

Download "The Exponential Mechanism (and maybe some mechanism design) Frank McSherry and Kunal Talwar Microsoft Research, Silicon Valley Campus"

Transcription

1 The Exponential Mechanism (and maybe some mechanism design) Frank McSherry and Kunal Talwar Microsoft Research, Silicon Valley Campus

2 Intentionally Blank Slide. 1

3 Differential Privacy Context: A data set d D N and mechanism M : D N R. Evaluating M(d) shouldn t give specific info about tuples in d. Source of much definitional anxiety for some 30-odd years. What is specific info? Can we prevent everything/anything? Definition: A mechanism M gives ɛ-differential privacy if: For d, d D N differing on at most one datum, and any S R, P r[m(d) S] exp(ɛ) P r[m(d ) S]. Changing one tuple can not change the output distribution much. Relative change in the probability of any event (subset S of R). 1

4 Previous Constructions Simple scheme: Apply f : D N R to data, return noisy result. K f (DB) f(db) + Noise. Database ƒ ` Noise? Theorem: Using Laplace(σ, 0) gives ( f/σ)-differential privacy, f = max max f(db Me) f(db + Me). DB Me For many statistical properties: f is small, small noise benign. 2

5 Problems with Perturbation Pricing: Inputs are n bids in [0, 1]. Output is a price p [0, 1]. Want to make lots of money, but we don t want to reveal bids. Problem: Perturbing the true answer by some noise may fail. 1. The function may have high sensitivity. (eg: Pricing) 2. Perturbations may not actually be useful. (eg: Pricing) Moreover: Additive perturbations also fail when 3. Outputs are not numbers. (eg: strings, trees, etc...) 3

6 A General Mechanism Previously a query was f : D N R, mapping data to result. Implicit assumption that results r near f(d) are nearly as good. Now, a query is q : (D N R) R. Score of result r for data d. Eg: Given bids and a price, revenue is q(d, r) = r #(i : d i > r) Definition: Let E ɛ q(d) output r with probability exp(ɛq(d, r)). 4

7 A General Mechanism Previously a query was f : D N R, mapping data to result. Implicit assumption that results r near f(d) are nearly as good. Now, a query is q : (D N R) R. Score of result r for data d. Eg: Given bids and a price, revenue is q(d, r) = r #(i : d i > r) Definition: Let E ɛ q(d) output r with probability exp(ɛq(d, r)). 4

8 A General Mechanism Previously a query was f : D N R, mapping data to result. Implicit assumption that results r near f(d) are nearly as good. Now, a query is q : (D N R) R. Score of result r for data d. Eg: Given bids and a price, revenue is q(d, r) = r #(i : d i > r) Definition: Let E ɛ q(d) output r with probability exp(ɛq(d, r)). 4

9 Two Exciting Properties Privacy: E ɛ q gives (2ɛ q)-differential privacy, where we define q = max r max d d q(d, r) q(d, r). Proof: Density, normalization alter by factors of at most exp(ɛ q). Utility: For S R, write µ(s) for its base measure. (pre-e ɛ q). Lem: Let S t = {r : q(d, r) > OP T t}. Pr(S 2t ) < exp( t)/µ(s t ). Proof: LHS < Pr(S 2t )/ Pr(S t ) < exp( t)µ(s 2t )/µ(s t ) < RHS. Thm: E[q(d, E q (d))] > OP T 3t, for those t > ln(op T/tµ(S t )). Proof: Pr(OP T 2t) 1 exp( t)/µ(s t ) 1 t/op T. Multiply. 5

10 Two Exciting Properties Privacy: E ɛ q gives (2ɛ q)-differential privacy, where we define q = max r max d d q(d, r) q(d, r). Proof: Density, normalization alter by factors of at most exp(ɛ q). Utility: For S R, write µ(s) for its base measure. (pre-e ɛ q). Lem: Let S t = {r : q(d, r) > OP T t}. Pr(S 2t ) < exp( t)/µ(s t ). Proof: LHS < Pr(S 2t )/ Pr(S t ) < exp( t)µ(s 2t )/µ(s t ) < RHS. Thm: E[q(d, E q (d))] > OP T 3t, for those t > ln(op T/tµ(S t )). Proof: Pr(OP T 2t) 1 exp( t)/µ(s t ) 1 t/op T. Multiply. 5

11 Two Exciting Properties Privacy: E ɛ q gives (2ɛ q)-differential privacy, where we define q = max r max d d q(d, r) q(d, r). Proof: Density, normalization alter by factors of at most exp(ɛ q). Utility: For S R, write µ(s) for its base measure. (pre-e ɛ q). Lem: Let S t = {r : q(d, r) > OP T t}. Pr(S 2t ) exp( t)/µ(s t ). Proof: LHS Pr(S 2t )/ Pr(S t ) exp( t)µ(s 2t )/µ(s t ) RHS. Thm: E[q(d, E q (d))] OP T 3t, for those t ln(op T/tµ(S t )). Proof: Pr(OP T 2t) 1 exp( t)/µ(s t ) 1 t/op T. Multiply. 5

12 Two Exciting Properties Privacy: E ɛ q gives (2ɛ q)-differential privacy, where we define q = max r max d d q(d, r) q(d, r). Proof: Density, normalization alter by factors of at most exp(ɛ q). Utility: For S R, write µ(s) for its base measure. (pre-e ɛ q). Lem: Let S t = {r : q(d, r) > OP T t}. Pr(S 2t ) exp( t)/µ(s t ). Proof: LHS Pr(S 2t )/ Pr(S t ) exp( t)µ(s 2t )/µ(s t ) RHS. Thm: E[q(d, E ɛ q(d))] OP T 3t, for those t ln(op T/tµ(S t )). Proof: Pr(OP T 2t) 1 exp( t)/µ(s t ) 1 t/op T. Multiply. 5

13 Applications to Pricing Every bidder gives a demand curve: d i : [0, 1] R +. (rd i (r) 1) Theorem: Taking q(d, r) = r i d i (r), then the mechanism Eq ɛ gives (2ɛ)-differential privacy, and has expected revenue at least OP T 3 ln(e + ɛ 2 OP T m)/ɛ, where m is the number of items sold at the optimal price. Proof: Grind t = ln(e+ɛ 2 OP T m) through the previous theorem. Argue that µ(s t ) is not small. (near-opt r gives near-opt q(d, r)). 6

14 Game Theory Implications Differential Privacy implies many game-theoretic properties: P r[m(d) S] exp(ɛ) P r[m(d )] S]. ɛ-dominance: For any utility function g : R R +, E[g(M(d))] exp(ɛ) E[g(M(d ))]. Collusion Resilient: For d t d, (ie: differing on t data) P r[m(d) S] exp(ɛt) P r[m(d )] S]. Repeatability: For M = (M 1, M 2,... M t ) with dependencies, P r[m(d) S] exp ( ) ɛ i P r[m(d )] S]. Truthful whp [CKMT]: M can be implemented so that: For all d, t, with prob exp( 2ɛt), M(d) = M(d ) for all d t d. i t 7

15 Conclusions, Future Direction Stuff we did: General mechanism E ɛ q, more robust, awesome than previously. Applications to Auctions/Pricing of various and new flavors. Neat non-truthful solution concept. Cool consequences. Stuff we didn t do / did badly: Computational questions of sampling from E ɛ q efficiently. Going beyond auctions/pricing to other mechanism problems. Thanks! Questions? 8

Answering Numeric Queries

Answering Numeric Queries Answering Numeric Queries The Laplace Distribution: Lap(b) is the probability distribution with p.d.f.: p x b) = 1 x exp 2b b i.e. a symmetric exponential distribution Y Lap b, E Y = b Pr Y t b = e t Answering

More information

Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization

Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization Zhili Chen, Tianjiao Ni, Hong Zhong, Shun Zhang, Jie Cui School of Computer Science and Technology, Anhui University,

More information

Privacy of Numeric Queries Via Simple Value Perturbation. The Laplace Mechanism

Privacy of Numeric Queries Via Simple Value Perturbation. The Laplace Mechanism Privacy of Numeric Queries Via Simple Value Perturbation The Laplace Mechanism Differential Privacy A Basic Model Let X represent an abstract data universe and D be a multi-set of elements from X. i.e.

More information

CIS 700 Differential Privacy in Game Theory and Mechanism Design January 17, Lecture 1

CIS 700 Differential Privacy in Game Theory and Mechanism Design January 17, Lecture 1 CIS 700 Differential Privacy in Game Theory and Mechanism Design January 17, 2014 Lecture 1 Lecturer: Aaron Roth Scribe: Aaron Roth Intro to Differential Privacy for Game Theorists, and Digital Goods Auctions.

More information

CIS 800/002 The Algorithmic Foundations of Data Privacy September 29, Lecture 6. The Net Mechanism: A Partial Converse

CIS 800/002 The Algorithmic Foundations of Data Privacy September 29, Lecture 6. The Net Mechanism: A Partial Converse CIS 800/002 The Algorithmic Foundations of Data Privacy September 29, 20 Lecturer: Aaron Roth Lecture 6 Scribe: Aaron Roth Finishing up from last time. Last time we showed: The Net Mechanism: A Partial

More information

Answering Many Queries with Differential Privacy

Answering Many Queries with Differential Privacy 6.889 New Developments in Cryptography May 6, 2011 Answering Many Queries with Differential Privacy Instructors: Shafi Goldwasser, Yael Kalai, Leo Reyzin, Boaz Barak, and Salil Vadhan Lecturer: Jonathan

More information

Calibrating Noise to Sensitivity in Private Data Analysis

Calibrating Noise to Sensitivity in Private Data Analysis Calibrating Noise to Sensitivity in Private Data Analysis Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith Mamadou H. Diallo 1 Overview Issues: preserving privacy in statistical databases Assumption:

More information

Privacy-Preserving Data Mining

Privacy-Preserving Data Mining CS 380S Privacy-Preserving Data Mining Vitaly Shmatikov slide 1 Reading Assignment Evfimievski, Gehrke, Srikant. Limiting Privacy Breaches in Privacy-Preserving Data Mining (PODS 2003). Blum, Dwork, McSherry,

More information

Lecture 1 Introduction to Differential Privacy: January 28

Lecture 1 Introduction to Differential Privacy: January 28 Introduction to Differential Privacy CSE711: Topics in Differential Privacy Spring 2016 Lecture 1 Introduction to Differential Privacy: January 28 Lecturer: Marco Gaboardi Scribe: Marco Gaboardi This note

More information

A Review of Auction Theory: Sequential Auctions and Vickrey Auctions

A Review of Auction Theory: Sequential Auctions and Vickrey Auctions A Review of Auction Theory: and Vickrey Daniel R. 1 1 Department of Economics University of Maryland, College Park. September 2017 / Econ415 . Vickrey s. Vickrey. Example Two goods, one per bidder Suppose

More information

The Optimal Mechanism in Differential Privacy

The Optimal Mechanism in Differential Privacy The Optimal Mechanism in Differential Privacy Quan Geng Advisor: Prof. Pramod Viswanath 11/07/2013 PhD Final Exam of Quan Geng, ECE, UIUC 1 Outline Background on Differential Privacy ε-differential Privacy:

More information

The Exponential Mechanism for Social Welfare: Private, Truthful, and Nearly Optimal

The Exponential Mechanism for Social Welfare: Private, Truthful, and Nearly Optimal The Exponential Mechanism for Social Welfare: Private, Truthful, and Nearly Optimal Zhiyi Huang Computer and Information Science University of Pennsylvania Philadelphia, USA Email: hzhiyi@cis.upenn.edu

More information

Differential Privacy and Pan-Private Algorithms. Cynthia Dwork, Microsoft Research

Differential Privacy and Pan-Private Algorithms. Cynthia Dwork, Microsoft Research Differential Privacy and Pan-Private Algorithms Cynthia Dwork, Microsoft Research A Dream? C? Original Database Sanitization Very Vague AndVery Ambitious Census, medical, educational, financial data, commuting

More information

arxiv: v1 [cs.cr] 28 Apr 2015

arxiv: v1 [cs.cr] 28 Apr 2015 Differentially Private Release and Learning of Threshold Functions Mark Bun Kobbi Nissim Uri Stemmer Salil Vadhan April 28, 2015 arxiv:1504.07553v1 [cs.cr] 28 Apr 2015 Abstract We prove new upper and lower

More information

On Random Sampling Auctions for Digital Goods

On Random Sampling Auctions for Digital Goods On Random Sampling Auctions for Digital Goods Saeed Alaei Azarakhsh Malekian Aravind Srinivasan Saeed Alaei, Azarakhsh Malekian, Aravind Srinivasan Random Sampling Auctions... 1 Outline Background 1 Background

More information

Lecture 20: Introduction to Differential Privacy

Lecture 20: Introduction to Differential Privacy 6.885: Advanced Topics in Data Processing Fall 2013 Stephen Tu Lecture 20: Introduction to Differential Privacy 1 Overview This lecture aims to provide a very broad introduction to the topic of differential

More information

2 Making the Exponential Mechanism Exactly Truthful Without

2 Making the Exponential Mechanism Exactly Truthful Without CIS 700 Differential Privacy in Game Theory and Mechanism Design January 31, 2014 Lecture 3 Lecturer: Aaron Roth Scribe: Aaron Roth Privacy as a Tool for Mechanism Design for arbitrary objective functions)

More information

Query and Computational Complexity of Combinatorial Auctions

Query and Computational Complexity of Combinatorial Auctions Query and Computational Complexity of Combinatorial Auctions Jan Vondrák IBM Almaden Research Center San Jose, CA Algorithmic Frontiers, EPFL, June 2012 Jan Vondrák (IBM Almaden) Combinatorial auctions

More information

Learning and Fourier Analysis

Learning and Fourier Analysis Learning and Fourier Analysis Grigory Yaroslavtsev http://grigory.us Slides at http://grigory.us/cis625/lecture2.pdf CIS 625: Computational Learning Theory Fourier Analysis and Learning Powerful tool for

More information

Vickrey-Clarke-Groves Mechanisms

Vickrey-Clarke-Groves Mechanisms Vickrey-Clarke-Groves Mechanisms Jonathan Levin 1 Economics 285 Market Design Winter 2009 1 These slides are based on Paul Milgrom s. onathan Levin VCG Mechanisms Winter 2009 1 / 23 Motivation We consider

More information

Privacy in Statistical Databases

Privacy in Statistical Databases Privacy in Statistical Databases Individuals x 1 x 2 x n Server/agency ( ) answers. A queries Users Government, researchers, businesses (or) Malicious adversary What information can be released? Two conflicting

More information

CMPUT651: Differential Privacy

CMPUT651: Differential Privacy CMPUT65: Differential Privacy Homework assignment # 2 Due date: Apr. 3rd, 208 Discussion and the exchange of ideas are essential to doing academic work. For assignments in this course, you are encouraged

More information

Iterative Constructions and Private Data Release

Iterative Constructions and Private Data Release Iterative Constructions and Private Data Release Anupam Gupta 1, Aaron Roth 2, and Jonathan Ullman 3 1 Computer Science Department, Carnegie Mellon University, Pittsburgh, PA, USA. 2 Department of Computer

More information

Report on Differential Privacy

Report on Differential Privacy Report on Differential Privacy Lembit Valgma Supervised by Vesal Vojdani December 19, 2017 1 Introduction Over the past decade the collection and analysis of personal data has increased a lot. This has

More information

CS 151 Complexity Theory Spring Solution Set 5

CS 151 Complexity Theory Spring Solution Set 5 CS 151 Complexity Theory Spring 2017 Solution Set 5 Posted: May 17 Chris Umans 1. We are given a Boolean circuit C on n variables x 1, x 2,..., x n with m, and gates. Our 3-CNF formula will have m auxiliary

More information

Improved Direct Product Theorems for Randomized Query Complexity

Improved Direct Product Theorems for Randomized Query Complexity Improved Direct Product Theorems for Randomized Query Complexity Andrew Drucker Nov. 16, 2010 Andrew Drucker, Improved Direct Product Theorems for Randomized Query Complexity 1/28 Big picture Usually,

More information

Differential Privacy

Differential Privacy CS 380S Differential Privacy Vitaly Shmatikov most slides from Adam Smith (Penn State) slide 1 Reading Assignment Dwork. Differential Privacy (invited talk at ICALP 2006). slide 2 Basic Setting DB= x 1

More information

PMR Learning as Inference

PMR Learning as Inference Outline PMR Learning as Inference Probabilistic Modelling and Reasoning Amos Storkey Modelling 2 The Exponential Family 3 Bayesian Sets School of Informatics, University of Edinburgh Amos Storkey PMR Learning

More information

NETS 412: Algorithmic Game Theory March 28 and 30, Lecture Approximation in Mechanism Design. X(v) = arg max v i (a)

NETS 412: Algorithmic Game Theory March 28 and 30, Lecture Approximation in Mechanism Design. X(v) = arg max v i (a) NETS 412: Algorithmic Game Theory March 28 and 30, 2017 Lecture 16+17 Lecturer: Aaron Roth Scribe: Aaron Roth Approximation in Mechanism Design In the last lecture, we asked how far we can go beyond the

More information

Uni- and Bivariate Power

Uni- and Bivariate Power Uni- and Bivariate Power Copyright 2002, 2014, J. Toby Mordkoff Note that the relationship between risk and power is unidirectional. Power depends on risk, but risk is completely independent of power.

More information

Secure Multiparty Computation from Graph Colouring

Secure Multiparty Computation from Graph Colouring Secure Multiparty Computation from Graph Colouring Ron Steinfeld Monash University July 2012 Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 1/34 Acknowledgements Based on joint

More information

Econ Slides from Lecture 10

Econ Slides from Lecture 10 Econ 205 Sobel Econ 205 - Slides from Lecture 10 Joel Sobel September 2, 2010 Example Find the tangent plane to {x x 1 x 2 x 2 3 = 6} R3 at x = (2, 5, 2). If you let f (x) = x 1 x 2 x3 2, then this is

More information

On Random Sampling Auctions for Digital Goods

On Random Sampling Auctions for Digital Goods On Random Sampling Auctions for Digital Goods Saeed Alaei Azarakhsh Malekian Aravind Srinivasan February 8, 2009 Abstract In the context of auctions for digital goods, an interesting Random Sampling Optimal

More information

On the Complexity of Computing an Equilibrium in Combinatorial Auctions

On the Complexity of Computing an Equilibrium in Combinatorial Auctions On the Complexity of Computing an Equilibrium in Combinatorial Auctions Shahar Dobzinski Hu Fu Robert Kleinberg April 8, 2014 Abstract We study combinatorial auctions where each item is sold separately

More information

Vickrey Auction. Mechanism Design. Algorithmic Game Theory. Alexander Skopalik Algorithmic Game Theory 2013 Mechanism Design

Vickrey Auction. Mechanism Design. Algorithmic Game Theory. Alexander Skopalik Algorithmic Game Theory 2013 Mechanism Design Algorithmic Game Theory Vickrey Auction Vickrey-Clarke-Groves Mechanisms Mechanisms with Money Player preferences are quantifiable. Common currency enables utility transfer between players. Preference

More information

CS1800: Mathematical Induction. Professor Kevin Gold

CS1800: Mathematical Induction. Professor Kevin Gold CS1800: Mathematical Induction Professor Kevin Gold Induction: Used to Prove Patterns Just Keep Going For an algorithm, we may want to prove that it just keeps working, no matter how big the input size

More information

The Optimal Mechanism in Differential Privacy

The Optimal Mechanism in Differential Privacy The Optimal Mechanism in Differential Privacy Quan Geng Advisor: Prof. Pramod Viswanath 3/29/2013 PhD Prelimary Exam of Quan Geng, ECE, UIUC 1 Outline Background on differential privacy Problem formulation

More information

DESIGN THEORY FOR RELATIONAL DATABASES. csc343, Introduction to Databases Renée J. Miller and Fatemeh Nargesian and Sina Meraji Winter 2018

DESIGN THEORY FOR RELATIONAL DATABASES. csc343, Introduction to Databases Renée J. Miller and Fatemeh Nargesian and Sina Meraji Winter 2018 DESIGN THEORY FOR RELATIONAL DATABASES csc343, Introduction to Databases Renée J. Miller and Fatemeh Nargesian and Sina Meraji Winter 2018 1 Introduction There are always many different schemas for a given

More information

Notes on the Exponential Mechanism. (Differential privacy)

Notes on the Exponential Mechanism. (Differential privacy) Notes on the Exponential Mechanism. (Differential privacy) Boston University CS 558. Sharon Goldberg. February 22, 2012 1 Description of the mechanism Let D be the domain of input datasets. Let R be the

More information

Lecture 10: Mechanisms, Complexity, and Approximation

Lecture 10: Mechanisms, Complexity, and Approximation CS94 P9: Topics Algorithmic Game Theory November 8, 011 Lecture 10: Mechanisms, Complexity, and Approximation Lecturer: Christos Papadimitriou Scribe: Faraz Tavakoli It is possible to characterize a Mechanism

More information

Mechanism Design Tutorial David C. Parkes, Harvard University Indo-US Lectures Week in Machine Learning, Game Theory and Optimization

Mechanism Design Tutorial David C. Parkes, Harvard University Indo-US Lectures Week in Machine Learning, Game Theory and Optimization 1 Mechanism Design Tutorial David C. Parkes, Harvard University Indo-US Lectures Week in Machine Learning, Game Theory and Optimization 2 Outline Classical mechanism design Preliminaries (DRMs, revelation

More information

Optimal Auctions with Correlated Bidders are Easy

Optimal Auctions with Correlated Bidders are Easy Optimal Auctions with Correlated Bidders are Easy Shahar Dobzinski Department of Computer Science Cornell Unversity shahar@cs.cornell.edu Robert Kleinberg Department of Computer Science Cornell Unversity

More information

Mechanism Design. Terence Johnson. December 7, University of Notre Dame. Terence Johnson (ND) Mechanism Design December 7, / 44

Mechanism Design. Terence Johnson. December 7, University of Notre Dame. Terence Johnson (ND) Mechanism Design December 7, / 44 Mechanism Design Terence Johnson University of Notre Dame December 7, 2017 Terence Johnson (ND) Mechanism Design December 7, 2017 1 / 44 Market Design vs Mechanism Design In Market Design, we have a very

More information

Private Learning and Sanitization: Pure vs. Approximate Differential Privacy

Private Learning and Sanitization: Pure vs. Approximate Differential Privacy Private Learning and Sanitization: Pure vs. Approximate Differential Privacy Amos Beimel 1, Kobbi Nissim 2,andUriStemmer 1 1 Dept. of Computer Science Ben-Gurion University 2 Dept. of Computer Science

More information

Differential Privacy and its Application in Aggregation

Differential Privacy and its Application in Aggregation Differential Privacy and its Application in Aggregation Part 1 Differential Privacy presenter: Le Chen Nanyang Technological University lechen0213@gmail.com October 5, 2013 Introduction Outline Introduction

More information

Vickrey Auction VCG Characterization. Mechanism Design. Algorithmic Game Theory. Alexander Skopalik Algorithmic Game Theory 2013 Mechanism Design

Vickrey Auction VCG Characterization. Mechanism Design. Algorithmic Game Theory. Alexander Skopalik Algorithmic Game Theory 2013 Mechanism Design Algorithmic Game Theory Vickrey Auction Vickrey-Clarke-Groves Mechanisms Characterization of IC Mechanisms Mechanisms with Money Player preferences are quantifiable. Common currency enables utility transfer

More information

On Random Sampling Auctions for Digital Goods

On Random Sampling Auctions for Digital Goods On Random Sampling Auctions for Digital Goods Saeed Alaei Azarakhsh Malekian Aravind Srinivasan Saeed Alaei, Azarakhsh Malekian, Aravind Srinivasan Random Sampling Auctions... 1 Outline 1 2 3 Saeed Alaei,

More information

CS 573: Algorithmic Game Theory Lecture date: April 11, 2008

CS 573: Algorithmic Game Theory Lecture date: April 11, 2008 CS 573: Algorithmic Game Theory Lecture date: April 11, 2008 Instructor: Chandra Chekuri Scribe: Hannaneh Hajishirzi Contents 1 Sponsored Search Auctions 1 1.1 VCG Mechanism......................................

More information

Learning to Bid Without Knowing your Value. Chara Podimata Harvard University June 4, 2018

Learning to Bid Without Knowing your Value. Chara Podimata Harvard University June 4, 2018 Learning to Bid Without Knowing your Value Zhe Feng Harvard University zhe feng@g.harvard.edu Chara Podimata Harvard University podimata@g.harvard.edu June 4, 208 Vasilis Syrgkanis Microsoft Research vasy@microsoft.com

More information

Differential Privacy for Probabilistic Systems. Michael Carl Tschantz Anupam Datta Dilsun Kaynar. May 14, 2009 CMU-CyLab

Differential Privacy for Probabilistic Systems. Michael Carl Tschantz Anupam Datta Dilsun Kaynar. May 14, 2009 CMU-CyLab Differential Privacy for Probabilistic Systems Michael Carl Tschantz Anupam Datta Dilsun Kaynar May 14, 2009 CMU-CyLab-09-008 CyLab Carnegie Mellon University Pittsburgh, PA 15213 Differential Privacy

More information

Introduction to Computational Learning Theory

Introduction to Computational Learning Theory Introduction to Computational Learning Theory The classification problem Consistent Hypothesis Model Probably Approximately Correct (PAC) Learning c Hung Q. Ngo (SUNY at Buffalo) CSE 694 A Fun Course 1

More information

Lecture 6: Communication Complexity of Auctions

Lecture 6: Communication Complexity of Auctions Algorithmic Game Theory October 13, 2008 Lecture 6: Communication Complexity of Auctions Lecturer: Sébastien Lahaie Scribe: Rajat Dixit, Sébastien Lahaie In this lecture we examine the amount of communication

More information

Solutions to Second Midterm(pineapple)

Solutions to Second Midterm(pineapple) Math 125 Solutions to Second Midterm(pineapple) 1. Compute each of the derivatives below as indicated. 4 points (a) f(x) = 3x 8 5x 4 + 4x e 3. Solution: f (x) = 24x 7 20x + 4. Don t forget that e 3 is

More information

Efficient Probabilistically Checkable Debates

Efficient Probabilistically Checkable Debates Efficient Probabilistically Checkable Debates Andrew Drucker MIT Andrew Drucker MIT, Efficient Probabilistically Checkable Debates 1/53 Polynomial-time Debates Given: language L, string x; Player 1 argues

More information

The Competition Complexity of Auctions: Bulow-Klemperer Results for Multidimensional Bidders

The Competition Complexity of Auctions: Bulow-Klemperer Results for Multidimensional Bidders The : Bulow-Klemperer Results for Multidimensional Bidders Oxford, Spring 2017 Alon Eden, Michal Feldman, Ophir Friedler @ Tel-Aviv University Inbal Talgam-Cohen, Marie Curie Postdoc @ Hebrew University

More information

Knapsack Auctions. Sept. 18, 2018

Knapsack Auctions. Sept. 18, 2018 Knapsack Auctions Sept. 18, 2018 aaacehicbvdlssnafj34rpuvdelmsigvskmkoasxbtcuk9ghncfmjpn26gqszibsevojbvwvny4ucevsnx/jpm1cww8mndnnxu69x08ylcqyvo2v1bx1jc3svnl7z3dv3zw47mg4fzi0ccxi0forjixy0lzumdjlbegrz0jxh93kfvebceljfq8mcxejnoa0pbgplxnmwxxs2tu49ho16lagvjl/8hpoua6dckkhrizrtt2zytwtgeaysqtsaqvanvnlbdfoi8ivzkjkvm0lys2qubqzmi07qsqjwim0ih1noyqidlpzqvn4qpuahrhqjys4u393zcischl5ujjfus56ufif109veovmlcepihzpb4upgyqgetowoijgxsaaicyo3hxiiriik51hwydgl568tdqnum3v7bulsvo6ikmejsejqaibxiimuaut0ayypijn8arejcfjxxg3pualk0brcwt+wpj8acrvmze=

More information

Selling Privacy at Auction

Selling Privacy at Auction Selling Privacy at Auction Arpita Ghosh Yahoo Research Santa Clara, CA arpita@yahoo-inc.com Aaron Roth Microsoft Research New England Campus Cambridge, MA aaroth@cis.upenn.edu ABSTRACT We initiate the

More information

Reverse Auctions - The Contractors Game

Reverse Auctions - The Contractors Game Elmar G. Wolfstetter 1/12 Reverse Auctions - The Contractors Game June 24, 2014 Elmar G. Wolfstetter 2/12 Motivation Observers are often puzzled by the wide range of bids from similar consultants or contractors

More information

Introduction to Data Management. Lecture #6 (Relational DB Design Theory)

Introduction to Data Management. Lecture #6 (Relational DB Design Theory) Introduction to Data Management Lecture #6 (Relational DB Design Theory) Instructor: Mike Carey mjcarey@ics.uci.edu Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke 1 Announcements v Homework

More information

CO759: Algorithmic Game Theory Spring 2015

CO759: Algorithmic Game Theory Spring 2015 CO759: Algorithmic Game Theory Spring 2015 Instructor: Chaitanya Swamy Assignment 1 Due: By Jun 25, 2015 You may use anything proved in class directly. I will maintain a FAQ about the assignment on the

More information

Differentially private convex optimization with piecewise affine objectives

Differentially private convex optimization with piecewise affine objectives 53rd IEEE Conference on Decision and Control December 15-17, 2014. Los Angeles, California, USA Differentially private convex optimization with piecewise affine objectives Shuo Han, Ufuk Topcu, George

More information

Midterm Study Guide and Practice Problems

Midterm Study Guide and Practice Problems Midterm Study Guide and Practice Problems Coverage of the midterm: Sections 10.1-10.7, 11.2-11.6 Sections or topics NOT on the midterm: Section 11.1 (The constant e and continuous compound interest, Section

More information

SYMMETRIC MATRIX PERTURBATION FOR DIFFERENTIALLY-PRIVATE PRINCIPAL COMPONENT ANALYSIS. Hafiz Imtiaz and Anand D. Sarwate

SYMMETRIC MATRIX PERTURBATION FOR DIFFERENTIALLY-PRIVATE PRINCIPAL COMPONENT ANALYSIS. Hafiz Imtiaz and Anand D. Sarwate SYMMETRIC MATRIX PERTURBATION FOR DIFFERENTIALLY-PRIVATE PRINCIPAL COMPONENT ANALYSIS Hafiz Imtiaz and Anand D. Sarwate Rutgers, The State University of New Jersey ABSTRACT Differential privacy is a strong,

More information

Bounds on the Sample Complexity for Private Learning and Private Data Release

Bounds on the Sample Complexity for Private Learning and Private Data Release Bounds on the Sample Complexity for Private Learning and Private Data Release Amos Beimel 1,, Shiva Prasad Kasiviswanathan 2, and Kobbi Nissim 1,3, 1 Dept. of Computer Science, Ben-Gurion University 2

More information

A) (-1, -1, -2) B) No solution C) Infinite solutions D) (1, 1, 2) A) (6, 5, -3) B) No solution C) Infinite solutions D) (1, -3, -7)

A) (-1, -1, -2) B) No solution C) Infinite solutions D) (1, 1, 2) A) (6, 5, -3) B) No solution C) Infinite solutions D) (1, -3, -7) Algebra st Semester Final Exam Review Multiple Choice. Write an equation that models the data displayed in the Interest-Free Loan graph that is provided. y = x + 80 y = -0x + 800 C) y = 0x 00 y = 0x +

More information

Differentially Private Chi-squared Test by Unit Circle Mechanism

Differentially Private Chi-squared Test by Unit Circle Mechanism A Support Vector Technique We describe Algorithm in detail Algorithm takes as input the sample set S, the query sequence F, the sensitivity of query, the threshold τ, and the stop parameter s Algorithm

More information

Game Theory: introduction and applications to computer networks

Game Theory: introduction and applications to computer networks Game Theory: introduction and applications to computer networks Introduction Giovanni Neglia INRIA EPI Maestro February 04 Part of the slides are based on a previous course with D. Figueiredo (UFRJ) and

More information

Maryam Shoaran Alex Thomo Jens Weber. University of Victoria, Canada

Maryam Shoaran Alex Thomo Jens Weber. University of Victoria, Canada Maryam Shoaran Alex Thomo Jens Weber University of Victoria, Canada Introduction Challenge: Evidence of Participation Sample Aggregates Zero-Knowledge Privacy Analysis of Utility of ZKP Conclusions 12/17/2015

More information

Simple Proofs of Sequential Work

Simple Proofs of Sequential Work Simple Proofs of Sequential Work Bram Cohen Krzysztof Pietrzak Eurocrypt 2018, Tel Aviv, May 1st 2018 Outline What How Why Proofs of Sequential Work Sketch of Construction & Proof Sustainable Blockchains

More information

Auctions. data better than the typical data set in industrial organization. auction game is relatively simple, well-specified rules.

Auctions. data better than the typical data set in industrial organization. auction game is relatively simple, well-specified rules. Auctions Introduction of Hendricks and Porter. subject, they argue To sell interest in the auctions are prevalent data better than the typical data set in industrial organization auction game is relatively

More information

Markov Networks. l Like Bayes Nets. l Graph model that describes joint probability distribution using tables (AKA potentials)

Markov Networks. l Like Bayes Nets. l Graph model that describes joint probability distribution using tables (AKA potentials) Markov Networks l Like Bayes Nets l Graph model that describes joint probability distribution using tables (AKA potentials) l Nodes are random variables l Labels are outcomes over the variables Markov

More information

FORMAL LANGUAGES, AUTOMATA AND COMPUTATION

FORMAL LANGUAGES, AUTOMATA AND COMPUTATION FORMAL LANGUAGES, AUTOMATA AND COMPUTATION DECIDABILITY ( LECTURE 15) SLIDES FOR 15-453 SPRING 2011 1 / 34 TURING MACHINES-SYNOPSIS The most general model of computation Computations of a TM are described

More information

ECE 564/645 - Digital Communications, Spring 2018 Homework #2 Due: March 19 (In Lecture)

ECE 564/645 - Digital Communications, Spring 2018 Homework #2 Due: March 19 (In Lecture) ECE 564/645 - Digital Communications, Spring 018 Homework # Due: March 19 (In Lecture) 1. Consider a binary communication system over a 1-dimensional vector channel where message m 1 is sent by signaling

More information

Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program May 2012

Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program May 2012 Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program May 2012 The time limit for this exam is 4 hours. It has four sections. Each section includes two questions. You are

More information

Walrasian Equilibrium: Hardness, Approximations and Tractable Instances

Walrasian Equilibrium: Hardness, Approximations and Tractable Instances Walrasian Equilibrium: Hardness, Approximations and Tractable Instances Ning Chen Atri Rudra Abstract. We study the complexity issues for Walrasian equilibrium in a special case of combinatorial auction,

More information

From query complexity to computational complexity (for optimization of submodular functions)

From query complexity to computational complexity (for optimization of submodular functions) From query complexity to computational complexity (for optimization of submodular functions) Shahar Dobzinski 1 Jan Vondrák 2 1 Cornell University Ithaca, NY 2 IBM Almaden Research Center San Jose, CA

More information

Final Exam Study Guide

Final Exam Study Guide Final Exam Study Guide Final Exam Coverage: Sections 10.1-10.2, 10.4-10.5, 10.7, 11.2-11.4, 12.1-12.6, 13.1-13.2, 13.4-13.5, and 14.1 Sections/topics NOT on the exam: Sections 10.3 (Continuity, it definition

More information

Propositional Logic: Bottom-Up Proofs

Propositional Logic: Bottom-Up Proofs Propositional Logic: Bottom-Up Proofs CPSC 322 Logic 3 Textbook 5.2 Propositional Logic: Bottom-Up Proofs CPSC 322 Logic 3, Slide 1 Lecture Overview 1 Recap 2 Bottom-Up Proofs 3 Soundness of Bottom-Up

More information

Extending Oblivious Transfers Efficiently

Extending Oblivious Transfers Efficiently Extending Oblivious Transfers Efficiently Yuval Ishai Technion Joe Kilian Kobbi Nissim Erez Petrank NEC Microsoft Technion Motivation x y f(x,y) How (in)efficient is generic secure computation? myth don

More information

On the Competitive Ratio of the Random Sampling Auction

On the Competitive Ratio of the Random Sampling Auction On the Competitive Ratio of the Random Sampling Auction Uriel Feige 1, Abraham Flaxman 2, Jason D. Hartline 3, and Robert Kleinberg 4 1 Microsoft Research, Redmond, WA 98052. urifeige@microsoft.com 2 Carnegie

More information

Game Theory: Spring 2017

Game Theory: Spring 2017 Game Theory: Spring 2017 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today In this second lecture on mechanism design we are going to generalise

More information

Vasilis Syrgkanis Microsoft Research NYC

Vasilis Syrgkanis Microsoft Research NYC Vasilis Syrgkanis Microsoft Research NYC 1 Large Scale Decentralized-Distributed Systems Multitude of Diverse Users with Different Objectives Large Scale Decentralized-Distributed Systems Multitude of

More information

University of Warwick, Department of Economics Spring Final Exam. Answer TWO questions. All questions carry equal weight. Time allowed 2 hours.

University of Warwick, Department of Economics Spring Final Exam. Answer TWO questions. All questions carry equal weight. Time allowed 2 hours. University of Warwick, Department of Economics Spring 2012 EC941: Game Theory Prof. Francesco Squintani Final Exam Answer TWO questions. All questions carry equal weight. Time allowed 2 hours. 1. Consider

More information

Machine Learning for Computational Advertising

Machine Learning for Computational Advertising Machine Learning for Computational Advertising L1: Basics and Probability Theory Alexander J. Smola Yahoo! Labs Santa Clara, CA 95051 alex@smola.org UC Santa Cruz, April 2009 Alexander J. Smola: Machine

More information

CS599: Algorithm Design in Strategic Settings Fall 2012 Lecture 12: Approximate Mechanism Design in Multi-Parameter Bayesian Settings

CS599: Algorithm Design in Strategic Settings Fall 2012 Lecture 12: Approximate Mechanism Design in Multi-Parameter Bayesian Settings CS599: Algorithm Design in Strategic Settings Fall 2012 Lecture 12: Approximate Mechanism Design in Multi-Parameter Bayesian Settings Instructor: Shaddin Dughmi Administrivia HW1 graded, solutions on website

More information

Outline for Static Games of Incomplete Information

Outline for Static Games of Incomplete Information Outline for Static Games of Incomplete Information I. Example 1: An auction game with discrete bids II. Example 2: Cournot duopoly with one-sided asymmetric information III. Definition of Bayesian-Nash

More information

Asymptotic Analysis. Slides by Carl Kingsford. Jan. 27, AD Chapter 2

Asymptotic Analysis. Slides by Carl Kingsford. Jan. 27, AD Chapter 2 Asymptotic Analysis Slides by Carl Kingsford Jan. 27, 2014 AD Chapter 2 Independent Set Definition (Independent Set). Given a graph G = (V, E) an independent set is a set S V if no two nodes in S are joined

More information

Top Ten Algorithms Class 6

Top Ten Algorithms Class 6 Top Ten Algorithms Class 6 John Burkardt Department of Scientific Computing Florida State University... http://people.sc.fsu.edu/ jburkardt/classes/tta 2015/class06.pdf 05 October 2015 1 / 24 Our Current

More information

Consistent Sampling with Replacement

Consistent Sampling with Replacement Consistent Sampling with Replacement Ronald L. Rivest MIT CSAIL rivest@mit.edu arxiv:1808.10016v1 [cs.ds] 29 Aug 2018 August 31, 2018 Abstract We describe a very simple method for consistent sampling that

More information

Mathematics Extension 1

Mathematics Extension 1 Northern Beaches Secondary College Manly Selective Campus 04 HSC Trial Examination Mathematics Extension General Instructions Total marks 70 Reading time 5 minutes. Working time hours. Write using blue

More information

Database Design and Implementation

Database Design and Implementation Database Design and Implementation CS 645 Data provenance Provenance provenance, n. The fact of coming from some particular source or quarter; origin, derivation [Oxford English Dictionary] Data provenance

More information

SECTION 5.1: Polynomials

SECTION 5.1: Polynomials 1 SECTION 5.1: Polynomials Functions Definitions: Function, Independent Variable, Dependent Variable, Domain, and Range A function is a rule that assigns to each input value x exactly output value y =

More information

Plan of the lecture. G53RDB: Theory of Relational Databases Lecture 10. Logical consequence (implication) Implication problem for fds

Plan of the lecture. G53RDB: Theory of Relational Databases Lecture 10. Logical consequence (implication) Implication problem for fds Plan of the lecture G53RDB: Theory of Relational Databases Lecture 10 Natasha Alechina School of Computer Science & IT nza@cs.nott.ac.uk Logical implication for functional dependencies Armstrong closure.

More information

An Algorithms-based Intro to Machine Learning

An Algorithms-based Intro to Machine Learning CMU 15451 lecture 12/08/11 An Algorithmsbased Intro to Machine Learning Plan for today Machine Learning intro: models and basic issues An interesting algorithm for combining expert advice Avrim Blum [Based

More information

A Structural Model of Sponsored Search Advertising Auctions

A Structural Model of Sponsored Search Advertising Auctions A Structural Model of Sponsored Search Advertising Auctions S. Athey and D. Nekipelov presented by Marcelo A. Fernández February 26, 2014 Remarks The search engine does not sell specic positions on the

More information

Sequential Bidding in the Bailey-Cavallo Mechanism

Sequential Bidding in the Bailey-Cavallo Mechanism Sequential Bidding in the Bailey-Cavallo Mechanism Krzysztof R. Apt 1,2 and Evangelos Markakis 2 1 CWI, Science Park 123, 1098 XG Amsterdam 2 Institute of Logic, Language and Computation, University of

More information

Database Privacy: k-anonymity and de-anonymization attacks

Database Privacy: k-anonymity and de-anonymization attacks 18734: Foundations of Privacy Database Privacy: k-anonymity and de-anonymization attacks Piotr Mardziel or Anupam Datta CMU Fall 2018 Publicly Released Large Datasets } Useful for improving recommendation

More information

Differential Privacy II: Basic Tools

Differential Privacy II: Basic Tools Differential Privacy II: Basic Tools Adam Smith Computer Science & Engineering Department Penn State IPAM Data 2010 June 8, 2009 Image Oakland Community College 32 33 Techniques for differential privacy

More information

Mechanisms for Multi-Unit Auctions

Mechanisms for Multi-Unit Auctions Journal of Artificial Intelligence Research 37 (2010) 85-98 Submitted 10/09; published 2/10 Mechanisms for Multi-Unit Auctions Shahar Dobzinski Computer Science Department, Cornell University Ithaca, NY

More information

6.830 Lecture 11. Recap 10/15/2018

6.830 Lecture 11. Recap 10/15/2018 6.830 Lecture 11 Recap 10/15/2018 Celebration of Knowledge 1.5h No phones, No laptops Bring your Student-ID The 5 things allowed on your desk Calculator allowed 4 pages (2 pages double sided) of your liking

More information