Robust Testing and Estimation under Manipulation Attacks

04/21/2021
by   Jayadev Acharya, et al.
5

We study robust testing and estimation of discrete distributions in the strong contamination model. We consider both the "centralized setting" and the "distributed setting with information constraints" including communication and local privacy (LDP) constraints. Our technique relates the strength of manipulation attacks to the earth-mover distance using Hamming distance as the metric between messages(samples) from the users. In the centralized setting, we provide optimal error bounds for both learning and testing. Our lower bounds under local information constraints build on the recent lower bound methods in distributed inference. In the communication constrained setting, we develop novel algorithms based on random hashing and an ℓ_1/ℓ_1 isometry.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/03/2018

Adaptive distributed methods under communication constraints

We study distributed estimation methods under communication constraints ...
research
12/30/2018

Inference under Information Constraints I: Lower Bounds from Chi-Square Contraction

We consider a distributed inference problem where only limited informati...
research
10/13/2020

General lower bounds for interactive high-dimensional estimation under information constraints

We consider the task of distributed parameter estimation using sequentia...
research
01/20/2021

Inference under Information Constraints III: Local Privacy Constraints

We study goodness-of-fit and independence testing of discrete distributi...
research
10/07/2021

Pointwise Bounds for Distribution Estimation under Communication Constraints

We consider the problem of estimating a d-dimensional discrete distribut...
research
11/09/2018

Two Party Distribution Testing: Communication and Security

We study the problem of discrete distribution testing in the two-party s...
research
01/14/2020

Group Testing with Runlength Constraints for Topological Molecular Storage

Motivated by applications in topological DNA-based data storage, we intr...

Please sign up or login with your details

Forgot password? Click here to reset