Skip to main content

Showing 1–22 of 22 results for author: Velingker, A

  1. arXiv:2402.07568  [pdf, other

    cs.LG cs.DM cs.NE stat.ML

    Weisfeiler-Leman at the margin: When more expressivity matters

    Authors: Billy J. Franks, Christopher Morris, Ameya Velingker, Floris Geerts

    Abstract: The Weisfeiler-Leman algorithm ($1$-WL) is a well-studied heuristic for the graph isomorphism problem. Recently, the algorithm has played a prominent role in understanding the expressive power of message-passing graph neural networks (MPNNs) and being effective as a graph kernel. Despite its success, $1$-WL faces challenges in distinguishing non-isomorphic graphs, leading to the development of mor… ▽ More

    Submitted 28 May, 2024; v1 submitted 12 February, 2024; originally announced February 2024.

    Comments: Accepted at ICML 2024. arXiv admin note: text overlap with arXiv:2301.11039

  2. arXiv:2310.01668  [pdf, other

    cs.LG

    Locality-Aware Graph-Rewiring in GNNs

    Authors: Federico Barbero, Ameya Velingker, Amin Saberi, Michael Bronstein, Francesco Di Giovanni

    Abstract: Graph Neural Networks (GNNs) are popular models for machine learning on graphs that typically follow the message-passing paradigm, whereby the feature of a node is updated recursively upon aggregating information over its neighbors. While exchanging messages over the input graph endows GNNs with a strong inductive bias, it can also make GNNs susceptible to over-squashing, thereby preventing them f… ▽ More

    Submitted 4 May, 2024; v1 submitted 2 October, 2023; originally announced October 2023.

  3. arXiv:2306.01869  [pdf, other

    cs.DS cs.LG

    Fast $(1+\varepsilon)$-Approximation Algorithms for Binary Matrix Factorization

    Authors: Ameya Velingker, Maximilian Vötsch, David P. Woodruff, Samson Zhou

    Abstract: We introduce efficient $(1+\varepsilon)$-approximation algorithms for the binary matrix factorization (BMF) problem, where the inputs are a matrix $\mathbf{A}\in\{0,1\}^{n\times d}$, a rank parameter $k>0$, as well as an accuracy parameter $\varepsilon>0$, and the goal is to approximate $\mathbf{A}$ as a product of low-rank factors $\mathbf{U}\in\{0,1\}^{n\times k}$ and… ▽ More

    Submitted 2 June, 2023; originally announced June 2023.

    Comments: ICML 2023

  4. arXiv:2303.06147  [pdf, other

    cs.LG

    Exphormer: Sparse Transformers for Graphs

    Authors: Hamed Shirzad, Ameya Velingker, Balaji Venkatachalam, Danica J. Sutherland, Ali Kemal Sinop

    Abstract: Graph transformers have emerged as a promising architecture for a variety of graph learning and representation tasks. Despite their successes, though, it remains challenging to scale graph transformers to large graphs while maintaining accuracy competitive with message-passing networks. In this paper, we introduce Exphormer, a framework for building powerful and scalable graph transformers. Exphor… ▽ More

    Submitted 24 July, 2023; v1 submitted 10 March, 2023; originally announced March 2023.

  5. arXiv:2206.11941  [pdf, other

    cs.LG stat.ML

    Affinity-Aware Graph Networks

    Authors: Ameya Velingker, Ali Kemal Sinop, Ira Ktena, Petar Veličković, Sreenivas Gollapudi

    Abstract: Graph Neural Networks (GNNs) have emerged as a powerful technique for learning on relational data. Owing to the relatively limited number of message passing steps they perform -- and hence a smaller receptive field -- there has been significant interest in improving their expressivity by incorporating structural aspects of the underlying graph. In this paper, we explore the use of affinity measure… ▽ More

    Submitted 23 June, 2022; originally announced June 2022.

  6. arXiv:2112.03548  [pdf, ps, other

    stat.ML cs.CR cs.DS cs.IT cs.LG

    Private Robust Estimation by Stabilizing Convex Relaxations

    Authors: Pravesh K. Kothari, Pasin Manurangsi, Ameya Velingker

    Abstract: We give the first polynomial time and sample $(ε, δ)$-differentially private (DP) algorithm to estimate the mean, covariance and higher moments in the presence of a constant fraction of adversarial outliers. Our algorithm succeeds for families of distributions that satisfy two well-studied properties in prior works on robust estimation: certifiable subgaussianity of directional moments and certifi… ▽ More

    Submitted 7 December, 2021; originally announced December 2021.

  7. arXiv:2106.13078  [pdf, other

    cs.CC cs.DS

    Linear Space Streaming Lower Bounds for Approximating CSPs

    Authors: Chi-Ning Chou, Alexander Golovnev, Madhu Sudan, Ameya Velingker, Santhoshini Velusamy

    Abstract: We consider the approximability of constraint satisfaction problems in the streaming setting. For every constraint satisfaction problem (CSP) on $n$ variables taking values in $\{0,\ldots,q-1\}$, we prove that improving over the trivial approximability by a factor of $q$ requires $Ω(n)$ space even on instances with $O(n)$ constraints. We also identify a broad subclass of problems for which any imp… ▽ More

    Submitted 24 April, 2022; v1 submitted 24 June, 2021; originally announced June 2021.

  8. arXiv:2003.09756  [pdf, ps, other

    stat.ML cs.DS cs.LG

    Scaling up Kernel Ridge Regression via Locality Sensitive Hashing

    Authors: Michael Kapralov, Navid Nouri, Ilya Razenshteyn, Ameya Velingker, Amir Zandieh

    Abstract: Random binning features, introduced in the seminal paper of Rahimi and Recht (2007), are an efficient method for approximating a kernel matrix using locality sensitive hashing. Random binning features provide a very simple and efficient way of approximating the Laplace kernel but unfortunately do not apply to many important classes of kernels, notably ones that generate smooth Gaussian processes,… ▽ More

    Submitted 21 March, 2020; originally announced March 2020.

  9. arXiv:2002.01919  [pdf, other

    cs.CR cs.DS

    Pure Differentially Private Summation from Anonymous Messages

    Authors: Badih Ghazi, Noah Golowich, Ravi Kumar, Pasin Manurangsi, Rasmus Pagh, Ameya Velingker

    Abstract: The shuffled (aka anonymous) model has recently generated significant interest as a candidate distributed privacy framework with trust assumptions better than the central model but with achievable errors smaller than the local model. We study pure differentially private (DP) protocols in the shuffled model for summation, a basic and widely used primitive: - For binary summation where each of n u… ▽ More

    Submitted 5 February, 2020; originally announced February 2020.

    Comments: 40 pages, 3 figures

  10. arXiv:1909.11073  [pdf, ps, other

    cs.CR cs.DS

    Private Aggregation from Fewer Anonymous Messages

    Authors: Badih Ghazi, Pasin Manurangsi, Rasmus Pagh, Ameya Velingker

    Abstract: Consider the setup where $n$ parties are each given a number $x_i \in \mathbb{F}_q$ and the goal is to compute the sum $\sum_i x_i$ in a secure fashion and with as little communication as possible. We study this problem in the anonymized model of Ishai et al. (FOCS 2006) where each party may broadcast anonymous messages on an insecure channel. We present a new analysis of the one-round "split an… ▽ More

    Submitted 15 October, 2019; v1 submitted 24 September, 2019; originally announced September 2019.

    Comments: 31 pages; 1 table

  11. arXiv:1909.01410  [pdf, ps, other

    cs.DS

    Oblivious Sketching of High-Degree Polynomial Kernels

    Authors: Thomas D. Ahle, Michael Kapralov, Jakob B. T. Knudsen, Rasmus Pagh, Ameya Velingker, David Woodruff, Amir Zandieh

    Abstract: Kernel methods are fundamental tools in machine learning that allow detection of non-linear dependencies between data without explicitly constructing feature vectors in high dimensional spaces. A major disadvantage of kernel methods is their poor scalability: primitives such as kernel PCA or kernel ridge regression generally take prohibitively large quadratic space and (at least) quadratic time, a… ▽ More

    Submitted 22 December, 2020; v1 submitted 3 September, 2019; originally announced September 2019.

  12. arXiv:1908.11358  [pdf, other

    cs.CR cs.DS cs.LG stat.ML

    On the Power of Multiple Anonymous Messages

    Authors: Badih Ghazi, Noah Golowich, Ravi Kumar, Rasmus Pagh, Ameya Velingker

    Abstract: An exciting new development in differential privacy is the shuffled model, in which an anonymous channel enables non-interactive, differentially private protocols with error much smaller than what is possible in the local model, while relying on weaker trust assumptions than in the central model. In this paper, we study basic counting problems in the shuffled model and establish separations betwee… ▽ More

    Submitted 19 May, 2020; v1 submitted 29 August, 2019; originally announced August 2019.

    Comments: 70 pages, 2 figures, 3 tables

  13. arXiv:1906.08320  [pdf, other

    cs.LG cs.CR cs.DC cs.DS stat.ML

    Scalable and Differentially Private Distributed Aggregation in the Shuffled Model

    Authors: Badih Ghazi, Rasmus Pagh, Ameya Velingker

    Abstract: Federated learning promises to make machine learning feasible on distributed, private datasets by implementing gradient descent using secure aggregation methods. The idea is to compute a global weight update without revealing the contributions of individual users. Current practical protocols for secure aggregation work in an "honest but curious" setting where a curious adversary observing all comm… ▽ More

    Submitted 2 December, 2019; v1 submitted 19 June, 2019; originally announced June 2019.

    Comments: 17 pages, 1 figure, 1 table, 2 algorithms

  14. arXiv:1902.10633  [pdf, ps, other

    cs.DS

    Dimension-independent Sparse Fourier Transform

    Authors: Michael Kapralov, Ameya Velingker, Amir Zandieh

    Abstract: The Discrete Fourier Transform (DFT) is a fundamental computational primitive, and the fastest known algorithm for computing the DFT is the FFT (Fast Fourier Transform) algorithm. One remarkable feature of FFT is the fact that its runtime depends only on the size $N$ of the input vector, but not on the dimensionality of the input domain: FFT runs in time $O(N\log N)$ irrespective of whether the DF… ▽ More

    Submitted 27 February, 2019; originally announced February 2019.

  15. arXiv:1812.08723  [pdf, ps, other

    cs.DS cs.LG eess.SP math.NA

    A Universal Sampling Method for Reconstructing Signals with Simple Fourier Transforms

    Authors: Haim Avron, Michael Kapralov, Cameron Musco, Christopher Musco, Ameya Velingker, Amir Zandieh

    Abstract: Reconstructing continuous signals from a small number of discrete samples is a fundamental problem across science and engineering. In practice, we are often interested in signals with 'simple' Fourier structure, such as bandlimited, multiband, and Fourier sparse signals. More broadly, any prior knowledge about a signal's Fourier power spectrum can constrain its complexity. Intuitively, signals wit… ▽ More

    Submitted 20 December, 2018; originally announced December 2018.

  16. arXiv:1804.09893  [pdf, other

    cs.LG cs.DS math.NA stat.ML

    Random Fourier Features for Kernel Ridge Regression: Approximation Bounds and Statistical Guarantees

    Authors: Haim Avron, Michael Kapralov, Cameron Musco, Christopher Musco, Ameya Velingker, Amir Zandieh

    Abstract: Random Fourier features is one of the most popular techniques for scaling up kernel methods, such as kernel ridge regression. However, despite impressive empirical results, the statistical properties of random Fourier features are still not well understood. In this paper we take steps toward filling this gap. Specifically, we approach random Fourier features from a spectral matrix approximation po… ▽ More

    Submitted 21 May, 2018; v1 submitted 26 April, 2018; originally announced April 2018.

    Comments: An extended abstract of this work appears in the Proceedings of the 34th International Conference on Machine Learning (ICML 2017)

  17. arXiv:1605.08792  [pdf, other

    cs.IT cs.DS

    Bridging the Capacity Gap Between Interactive and One-Way Communication

    Authors: Bernhard Haeupler, Ameya Velingker

    Abstract: We study the communication rate of coding schemes for interactive communication that transform any two-party interactive protocol into a protocol that is robust to noise. Recently, Haeupler (FOCS '14) showed that if an $ε> 0$ fraction of transmissions are corrupted, adversarially or randomly, then it is possible to achieve a communication rate of $1 - \widetilde{O}(\sqrtε)$. Furthermore, Haeuple… ▽ More

    Submitted 27 May, 2016; originally announced May 2016.

  18. arXiv:1502.08048  [pdf, other

    cs.CG

    Approximating Nearest Neighbor Distances

    Authors: Michael B. Cohen, Brittany Terese Fasy, Gary L. Miller, Amir Nayyeri, Donald R. Sheehy, Ameya Velingker

    Abstract: Several researchers proposed using non-Euclidean metrics on point sets in Euclidean space for clustering noisy data. Almost always, a distance function is desired that recognizes the closeness of the points in the same cluster, even if the Euclidean cluster diameter is large. Therefore, it is preferred to assign smaller costs to the paths that stay close to the input points. In this paper, we co… ▽ More

    Submitted 27 February, 2015; originally announced February 2015.

    Comments: corrected author name

  19. arXiv:1502.07410  [pdf, other

    math.CO cs.CC

    Towards Constructing Ramanujan Graphs Using Shift Lifts

    Authors: Karthekeyan Chandrasekaran, Ameya Velingker

    Abstract: In a breakthrough work, Marcus-Spielman-Srivastava recently showed that every $d$-regular bipartite Ramanujan graph has a 2-lift that is also $d$-regular bipartite Ramanujan. As a consequence, a straightforward iterative brute-force search algorithm leads to the construction of a $d$-regular bipartite Ramanujan graph on $N$ vertices in time $2^{O(dN)}$. Shift $k$-lifts studied by Agarwal-Kolla-Mad… ▽ More

    Submitted 31 August, 2015; v1 submitted 25 February, 2015; originally announced February 2015.

  20. arXiv:1411.6993  [pdf, ps, other

    cs.IT cs.CC

    An Entropy Sumset Inequality and Polynomially Fast Convergence to Shannon Capacity Over All Alphabets

    Authors: Venkatesan Guruswami, Ameya Velingker

    Abstract: We prove a lower estimate on the increase in entropy when two copies of a conditional random variable $X | Y$, with $X$ supported on $\mathbb{Z}_q=\{0,1,\dots,q-1\}$ for prime $q$, are summed modulo $q$. Specifically, given two i.i.d copies $(X_1,Y_1)$ and $(X_2,Y_2)$ of a pair of random variables $(X,Y)$, with $X$ taking values in $\mathbb{Z}_q$, we show \[ H(X_1 + X_2 \mid Y_1, Y_2) - H(X|Y) \ge… ▽ More

    Submitted 25 November, 2014; originally announced November 2014.

  21. arXiv:1304.0524  [pdf, other

    cs.CG

    A Fast Algorithm for Well-Spaced Points and Approximate Delaunay Graphs

    Authors: Gary L. Miller, Donald R. Sheehy, Ameya Velingker

    Abstract: We present a new algorithm that produces a well-spaced superset of points conforming to a given input set in any dimension with guaranteed optimal output size. We also provide an approximate Delaunay graph on the output points. Our algorithm runs in expected time $O(2^{O(d)}(n\log n + m))$, where $n$ is the input size, $m$ is the output point set size, and $d$ is the ambient dimension. The constan… ▽ More

    Submitted 1 April, 2013; originally announced April 2013.

    Comments: Full version

    ACM Class: F.2.2

  22. arXiv:1207.1140  [pdf, ps, other

    cs.IT math.CO math.PR

    Restricted Isometry of Fourier Matrices and List Decodability of Random Linear Codes

    Authors: Mahdi Cheraghchi, Venkatesan Guruswami, Ameya Velingker

    Abstract: We prove that a random linear code over F_q, with probability arbitrarily close to 1, is list decodable at radius (1-1/q-ε) with list size L=O(1/ε^2) and rate R=Ω_q(ε^2/(log^3(1/ε))). Up to the polylogarithmic factor in (1/ε) and constant factors depending on q, this matches the lower bound L=Ω_q(1/ε^2) for the list size and upper bound R=O_q(ε^2) for the rate. Previously only existence (and not a… ▽ More

    Submitted 4 July, 2012; originally announced July 2012.

    Comments: Preliminary full version