2019
DOI: 10.1137/17m1126680
|View full text |Cite
|
Sign up to set email alerts
|

Robust Estimators in High-Dimensions Without the Computational Intractability

Abstract: We study high-dimensional distribution learning in an agnostic setting where an adversary is allowed to arbitrarily corrupt an ε-fraction of the samples. Such questions have a rich history spanning statistics, machine learning and theoretical computer science. Even in the most basic settings, the only known approaches are either computationally inefficient or lose dimension-dependent factors in their error guarantees. This raises the following question: Is high-dimensional agnostic distribution learning even p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
256
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 171 publications
(259 citation statements)
references
References 42 publications
2
256
1
Order By: Relevance
“…Outlier-robust estimation has received long-time attention in statistics and control [21], [62]. It has a fundamental applications, such as prediction and learning [63], linear decoding [64], and secure state estimation for control [65].…”
Section: B Outlier-robust Estimation In Statistics and Controlmentioning
confidence: 99%
“…Outlier-robust estimation has received long-time attention in statistics and control [21], [62]. It has a fundamental applications, such as prediction and learning [63], linear decoding [64], and secure state estimation for control [65].…”
Section: B Outlier-robust Estimation In Statistics and Controlmentioning
confidence: 99%
“…functions, a fundamentally different setting from the current paper. Our work is also related to the literature on robust statistics [11,12], and particularly, with the recently rekindled research efforts on high dimensional robust statistics [13][14][15]. These works will be the working horse for our attack resilient algorithm.…”
Section: Introductionmentioning
confidence: 89%
“…In this section, we describe two estimators for approximating θ (k) H [cf. (14)] from the received messages (9) without knowing the identity of links in H. To simplify notations, we define α ≥ |A|/N as a known upper bound to the fraction of compromised channels and assume α < 1/2 where less than half of the channels are compromised.…”
Section: Robust Distributed Resource Allocationmentioning
confidence: 99%
“…Additionally, while we cannot visualize the distributions in multidimensional space, we can plot their projections onto a onedimensional space. To choose the vector on which we project the distributions, we use an idea from robust statistics [11,28]. We form a matrix consisting of the embedding vector of each example from both the source and target datasets.…”
Section: Motivationmentioning
confidence: 99%