AI

Fingerprinting Codes Meet Geometry: Improved Lower Bounds for Private Query Release and Adaptive Data Analysis

1 Mins read

Fingerprinting codes are a crucial tool for proving lower bounds in differential privacy. They have been used to prove tight lower bounds for several fundamental questions, especially in the “low accuracy” regime. Unlike reconstruction/discrepancy approaches however, they are more suited for proving worst-case lower bounds, for query sets that arise naturally from the fingerprinting codes construction. In this work, we propose a general framework for proving fingerprinting type lower bounds, that allows us to tailor the technique to the geometry of the query set.
Our approach allows us to prove several new results.

First, we show that any (sample- and population-)accurate algorithm for answering QQ arbitrary adaptive counting queries over a universe X\mathcal{X} to accuracy α\alpha needs Ω(logXlogQα3)\Omega(\frac{\sqrt{\log |\mathcal{X}|}\cdot \log Q}{\alpha^3})

Figure 1: Behavior of sample complexity vs. error trade-off for dd random linear queries (left) and worst-case queries (right) over a universe X\mathcal{X} (log\loglog\log scale). The sample complexity for random queries is discontinuous at αlogXd\alpha \approx \frac{\sqrt{\log |\mathcal{X}|}}{\sqrt{d}}


Source link

Related posts
AI

Meta AI Introduces VideoJAM: A Novel AI Framework that Enhances Motion Coherence in AI-Generated Videos

2 Mins read
Despite recent advancements, generative video models still struggle to represent motion realistically. Many existing models focus primarily on pixel-level reconstruction, often leading…
AI

Creating an AI Agent-Based System with LangGraph: Putting a Human in the Loop

4 Mins read
In our previous tutorial, we built an AI agent capable of answering queries by surfing the web and added persistence to maintain…
AI

Meet Crossfire: An Elastic Defense Framework for Graph Neural Networks under Bit Flip Attacks

2 Mins read
Graph Neural Networks (GNNs) have found applications in various domains, such as natural language processing, social network analysis, recommendation systems, etc. Due…

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *