Sahil Singla

ORCID: 0000-0002-8800-6479
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Optimization and Search Problems
  • Auction Theory and Applications
  • Complexity and Algorithms in Graphs
  • Adversarial Robustness in Machine Learning
  • Advanced Bandit Algorithms Research
  • Advanced Neural Network Applications
  • Cryptography and Data Security
  • Domain Adaptation and Few-Shot Learning
  • Mathematical Approximation and Integration
  • Advanced Graph Theory Research
  • Game Theory and Voting Systems
  • Computational Geometry and Mesh Generation
  • Stochastic Gradient Optimization Techniques
  • Consumer Market Behavior and Pricing
  • Explainable Artificial Intelligence (XAI)
  • Vehicle Routing Optimization Methods
  • Privacy-Preserving Technologies in Data
  • Scheduling and Optimization Algorithms
  • Caching and Content Delivery
  • Machine Learning and Data Classification
  • Anomaly Detection Techniques and Applications
  • Integrated Circuits and Semiconductor Failure Analysis
  • Machine Learning and Algorithms
  • Electric Vehicles and Infrastructure
  • Advanced Data Storage Technologies

Google (United States)
2024

Georgia Institute of Technology
2002-2024

Princeton University
2019-2023

Carnegie Mellon University
2014-2022

Indian Institute of Technology Delhi
2021-2022

Stanford University
2022

Laboratoire d'Informatique de Paris-Nord
2022

University of Maryland, College Park
2019-2021

Birla Institute of Technology and Science, Pilani
2020

Institute for Advanced Study
2020

Deep neural networks (DNNs) are increasingly used in real-world applications (e.g. facial recognition). This has resulted concerns about the fairness of decisions made by these models. Various notions and measures have been proposed to ensure that a decision-making system does not disproportionately harm (or benefit) particular subgroups population. In this paper, we argue traditional only based on models' outputs sufficient when model is vulnerable adversarial attacks. We some cases, it may...

10.1145/3442188.3445910 article EN 2021-02-24

Traditional evaluation metrics for learned models that report aggregate scores over a test set are insufficient surfacing important and informative patterns of failure features instances. We introduce study method aimed at characterizing explaining failures by identifying visual attributes whose presence or absence results in poor performance. In distinction to previous work relies upon crowdsourced labels attributes, we leverage the representation separate robust model extract interpretable...

10.1109/cvpr46437.2021.01266 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2021-06-01

A key challenge in adversarial robustness is the lack of a precise mathematical characterization human perception, used very definition attacks that are imperceptible to eyes. Most current and defenses try avoid this issue by considering restrictive threat models such as those bounded $L_2$ or $L_\infty$ distance, spatial perturbations, etc. However, robust against any these still fragile other models. To resolve issue, we propose training set all examples, approximated using deep neural...

10.48550/arxiv.2006.12655 preprint EN other-oa arXiv (Cornell University) 2020-01-01

We introduce a novel framework of Prophet Inequalities for combinatorial valuation functions. For (non-monotone) submodular objective function over an arbitrary matroid feasibility constraint, we give O(1)-competitive algorithm. monotone subadditive downward-closed O(log n log2r)-competitive algorithm (where r is the cardinality largest feasible subset).Inspired by proof our prophet inequality, also obtain · Secretary Problem with subject to constraint. Even special case circumvents...

10.5555/3039686.3039796 article EN Symposium on Discrete Algorithms 2017-01-16

Adversarial training is one of the most effective defenses against adversarial attacks. Previous works suggest that overfitting a dominant phenomenon in leading to large generalization gap between test and train accuracy neural networks. In this work, we show observed closely related choice activation function. particular, using functions with low (exact or approximate) curvature values has regularization effect significantly reduces both standard robust gaps training. We observe for...

10.1109/iccv48922.2021.01611 article EN 2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2021-10-01

TTL caching models have recently regained significant research interest, largely due to their ability fit popular policies such as LRU. In this extended abstract we briefly describe our recent work on two exact methods analyze cache networks. The first method generalizes existing results for line networks under renewal requests the broad class of whereby evictions are driven by stopping times. obtained further generalized, using second method, feedforward with Markov arrival processes (MAP)...

10.1145/2591971.2592038 article EN 2014-06-10

Given an $n$-vertex graph and two straight-line planar drawings of the that have same faces outer face, we show there is a morph (i.e., continuous transformation) between preserves planarity consists $O(n)$ steps, which prove optimal in worst case. Each step unidirectional linear morph, means every vertex moves at constant speed along straight line, lines are parallel although speeds may differ. Thus provide efficient version Cairns' 1944 proof existence planarity-preserving morphs for...

10.1137/16m1069171 article EN SIAM Journal on Computing 2017-01-01

Suppose we are given a submodular function f over set of elements, and want to maximize its value subject certain constraints. Good approximation algorithms known for such problems under both monotone non-monotone functions. We consider these in stochastic setting, where elements not all active only get from elements. Each element e is independently with some probability pe, but don't know the element's status priori: find it out when probe e. Moreover, sequence must satisfy prefix-closed...

10.5555/3039686.3039797 article EN arXiv (Cornell University) 2017-01-16

A stochastic probing problem consists of a set elements whose values are independent random variables. The algorithm knows the distributions these variables, but not actual outcomes. only way to learn outcomes is probe elements. However, there constraints on which may be probed. (E.g., we have travel in some metric limited time.) These called outer constraints. We want develop an that picks maximize (expected) value, subject picked subset satisfying other constraints, inner In past, problems...

10.5555/2884435.2884555 article EN Symposium on Discrete Algorithms 2016-01-10

Our main contribution is a general framework to design efficient polynomial time approximation schemes (EPTAS) for fundamental stochastic combinatorial optimization problems. Given an error parameter ε>0, such algorithmic attain (1-ε)-approximation in t(ε)· poly(n) time, where t(·) some function that depends only on ε. Technically speaking, our approach relies presenting tailor-made reductions newly-introduced multi-dimensional load balancing problem. Even though the single-dimensional...

10.1145/3465456.3467614 article EN 2021-07-18

The Ontario electrical grid is sized to meet peak electricity load. If this worst-case load were reduced, the government and tax-payers could defer large infrastructural costs, reducing cost of generation prices. Storage, batteries that can store energy during times low be discharged load, one proposed solution We evaluate effect storage on under different customer pricing schemes. find for existing schemes, adopting not profitable. Furthermore, as level adoption in population increases,...

10.1145/2208828.2208846 article EN 2012-05-09

In 1944, Cairns proved the following theorem: given any two straight-line planar drawings of a triangulation with same outer face, there exists morph (i.e., continuous transformation) between so that drawing remains at all times. Cairns's original proof required exponentially many morphing steps. We prove is consists O(n2) steps, where each step linear moves vertex constant speed along straight line. Using known result on compatible triangulations this implies for general graph G and...

10.5555/2627817.2627936 article EN Symposium on Discrete Algorithms 2013-01-06

We introduce a novel framework of Prophet Inequalities for combinatorial valuation functions. For (non-monotone) submodular objective function over an arbitrary matroid feasibility constraint, we give O(1)-competitive algorithm. monotone subadditive downward- closed O(log n log2 r)- competitive algorithm (where r is the cardinality largest feasible subset).Inspired by proof our prophet inequality, also obtain · r)-competitive Secretary Problem with subject to downward-closed constraint. Even...

10.1137/1.9781611974782.110 preprint EN 2017-01-01

TTL caching models have recently regained significant research interest, largely due to their ability fit popular policies such as LRU. In this extended abstract we briefly describe our recent work on two exact methods analyze cache networks. The first method generalizes existing results for line networks under renewal requests the broad class of whereby evictions are driven by stopping times. obtained further generalized, using second method, feedforward with Markov arrival processes (MAP)...

10.1145/2637364.2592038 article EN ACM SIGMETRICS Performance Evaluation Review 2014-06-16

A longstanding open problem in Algorithmic Mechanism Design is to design computationally-efficient truthful mechanisms for (approximately) maximizing welfare combinatorial auctions with submodular bidders. The first such mechanism was obtained by Dobzinski, Nisan, and Schapira [STOC'06] who gave an O(log <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> m)-approximation where m number of items. This has been studied extensively since,...

10.1109/focs.2019.00024 article EN 2019-11-01

Suppose we are given a submodular function f over set of elements, and want to maximize its value subject certain constraints. Good approximation algorithms known for such problems under both monotone non-monotone functions. We consider these in stochastic setting, where elements not all active only get from elements. Each element e is independently with some probability pe, but don't know the element's status priori: find it out when probe e. Moreover, sequence must satisfy prefix-closed...

10.1137/1.9781611974782.111 preprint EN 2017-01-01

We consider an online vector balancing question where T vectors, chosen from arbitrary distribution over [−1,1] n , arrive one-by-one and must be immediately given a ± sign. The goal is to keep the discrepancy—the ℓ∞-norm of any signed prefix-sum—as small as possible. A concrete example this interval discrepancy problem points are sampled uniformly in unit [0,1], color them such that every sub-interval remains always nearly balanced. As random coloring incurs Ω(T 1/2) discrepancy, while...

10.1145/3357713.3384280 article EN 2020-06-07

Deep learning interpretation is essential to explain the reasoning behind model predictions. Understanding robustness of methods important especially in sensitive domains such as medical applications since results are often used downstream tasks. Although gradient-based saliency maps popular for deep interpretation, recent works show that they can be vulnerable adversarial attacks. In this paper, we address problem and provide a certifiable defense method interpretation. We sparsified...

10.48550/arxiv.1905.12105 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Deep neural networks can be unreliable in the real world especially when they heavily use {\it spurious} features for their predictions. Focusing on image classifications, we define core features} as set of visual that are always a part object definition while spurious ones likely to co-occur} with but not it (e.g., attribute "fingers" class "band aid"). Traditional methods discovering either require extensive human annotations (thus, scalable), or useful specific models. In this work,...

10.48550/arxiv.2110.04301 preprint EN other-oa arXiv (Cornell University) 2021-01-01
Coming Soon ...