Welcome to the Spring 2025 series of the University of Massachusetts Computer Science Theory Seminar. The seminar is 4-5 pm on Tuesdays in CS 140, in the Computer Science Building at UMass Amherst, and is free and open to the public. The faculty host is Yair Zick. If you are interested in giving a talk, please email Professor Zick or Adam Lechowicz. Note that in addition to being a public lecture series, this is also a one-credit graduate seminar (CompSci 891M) that can be taken repeatedly for credit.
All Tuesday talks are in CS 140, unless otherwise stated.
NOTE: In order to ensure you get weekly updates for all the talks, please make sure you are part of the seminars@cs.umass.edu mailing list. If you wish to give a talk, or would like to nominate someone to give one, please email us to let us know!
Tuesday, February 4 @ 4 pm
Mengfan Xu (UMass M&I Eng.) – Tuesday, February 11 @ 4 pm
We study the optimality and complexity of decentralized multi-agent multi-armed bandits (MA-MAB). We first consider MA-MAB in which multiple clients are connected by time dependent random graphs. The reward distributions of each arm vary across agents, including both sub-exponential and sub-Gaussian distributions. Each agent pulls an arm and communicates with neighbors based on the graph. The goal is to minimize the overall regret of the entire system through collaborations. To this end, we introduce a novel algorithmic framework, which first provides robust simulation methods for generating random graphs, and then combines an averaging-based consensus approach with a newly proposed weighting technique and the upper confidence bound to deliver a UCB-type solution. We derive instance-dependent and mean-gap regret upper bounds of order \(\log{T}\) and \(\sqrt{T}\log T\), respectively. While efficient algorithms with regret upper bounds have emerged, limited attention has been given to the corresponding regret lower bounds that characterizes the complexity of MA-MAB, except for a recent lower bound for adversarial settings, which, however, has a gap with let known upper bounds. To this end, we provide a study on regret lower bounds in different MA-MAB and establish their tightness. Specifically, for graphs with good connectivity properties and stochastic rewards, we demonstrate tight lower bounds \(O(\log T)\) and \(\sqrt{T}\) for instance-dependent and mean-gap bounds, respectively. Assuming adversarial rewards, we establish a lower bound \(O(T^{\frac{2}{3}})\) for connected graphs, thereby bridging the gap between the lower and upper bound in the prior work. We also show a linear regret lower bound when the graph is disconnected.
Mengfan Xu is an assistant professor in the Department of Mechanical and Industrial Engineering at UMass Amherst. Before joining UMass, she earned her Ph.D. in Operations Research from the Department of Industrial Engineering and Management Sciences at Northwestern University in 2024. Her research leverages statistical and mathematical tools to advance machine learning by developing novel formulations and provably effective algorithms, inspired by emerging real-world problems in operations research. Her research focuses on online and statistical learning, particularly multi-armed bandits and reinforcement learning, and their applications in various operations research problems, including supply chain management and healthcare. Her work has been recognized by top-tier machine learning conferences, including NeurIPS, ICML, AISTATS, and workshops at KDD and RLC. Beyond academia, she interned at LinkedIn in Summer 2023 and Didi Chuxing in 2021, where she worked on people recommendation using large language models and online dynamic pricing using causal inference, respectively.
Miranda Christ (Columbia) – Tuesday, February 18 @ 4 pm (virtual talk)
The rise of increasingly realistic generative models has necessitated tools for distinguishing between human-generated and AI-generated content. A promising approach is watermarking, where a hidden pattern is embedded in this AI-generated content. We introduce a powerful new framework for watermarking, which can be instantiated with a cryptographic primitive that we define, called a pseudorandom error-correcting code (PRC). While motivated by watermarking, a PRC is a natural cryptographic object of independent interest.
A PRC is an error-correcting code with the property that any polynomial number of codewords are pseudorandom to any efficient adversary. We construct PRCs from standard cryptographic assumptions, and in this talk I will give an overview of our construction relying on subexponential hardness of LPN. I will then show how PRCs yield LLM watermarks with strong quality and robustness guarantees.
This is based on works with Sam Gunn, Omar Alrabiah, Prabhanjan Ananth, and Yevgeniy Dodis: https://eprint.iacr.org/2024/235.pdf, https://eprint.iacr.org/2024/1840
Miranda Christ is a computer science PhD student at Columbia University, advised by Tal Malkin and Mihalis Yannakakis. She is a member of the Theory Group and the Crypto Lab. Her research is generally on theoretical cryptography, and recently has focused on the intersection of cryptography and machine learning.
Jacob Urisman (UMass) – Tuesday, February 25 @ 4 pm
The problem of Graph Isomorphism exists in a very strange place in the landscape of complexity theory under our current understanding. It is one of a very small number of problems that is known to be in NP but has not been proven to be either in P or NP-complete.
A promising, relatively new approach for problems in complexity theory has been using the algebraic tools commonly used in algebraic geometry and representation theory to see if they may shed new light on open problems. This led us to a natural motivating question: Can we use these tools to tackle Graph Isomorphism?
The talk will discuss some interesting results that have arisen from an approach to Graph Isomorphism using representation theory. This work is in collaboration with Dr. Joshua Grochow at CU Boulder.
Manolis Zampetakis (Yale) – Tuesday, March 4 @ 4 pm
Abstract TBA
Bio TBA
Soumyajit Pyne (TIFR) – Tuesday, March 11 @ 4 pm
The Hotelling-Downs model is a natural and appealing model for understanding strategic positioning by candidates in elections. In this model, voters are distributed on a line, representing their ideological position on an issue. Each candidate then chooses as a strategy a position on the line to maximize her vote share. Each voter votes for the nearest candidate, closest to their ideological position. This sets up a game between the candidates, and we study pure Nash equilibria in this game. The model and its variants are an important tool in political economics, and are studied widely in computational social choice as well.
Despite the interest and practical relevance, most prior work focuses on the existence and properties of pure Nash equilibria in this model, ignoring computational issues. Our work gives algorithms for computing pure Nash equilibria in the basic model. We give three algorithms, depending on whether the distribution of voters is continuous or discrete, and similarly, whether the possible candidate positions are continuous or discrete. In each case, our algorithms return either an exact equilibrium or one arbitrarily close to exact, assuming existence. We believe our work will be useful, and may prompt interest, in computing equilibria in the wide variety of extensions of the basic model as well.
Arxiv link: https://arxiv.org/abs/2412.12523
Tuesday, March 18 @ 4 pm
Mahsa Derakhshan (Northeastern) – Tuesday, March 25 @ 4 pm
Abstract TBA
Bio TBA
TBA (TBA) – Tuesday, April 1 @ 4 pm
Abstract TBA
Bio TBA
Hengjie Zhang (Columbia) – Tuesday, April 8 @ 4 pm
We study graph spanners for point-set in the high-dimensional Euclidean space. On the one hand, we prove that spanners with stretch \(<\sqrt{2}\) and subquadratic size are not possible, even if we add Steiner points. On the other hand, if we add extra nodes to the graph (non-metric Steiner points), then we can obtain \((1+\epsilon)\)-approximate spanners of subquadratic size. We show how to construct a spanner of size \(n^{2-\Omega(\epsilon^3)}\), as well as a directed version of the spanner of size \(n^{2-\Omega(\epsilon^2)}\).
We use our directed spanner to obtain an algorithm for computing \((1+\epsilon)\)-approximation to Earth-Mover Distance (optimal transport) between two sets of size \(n\) in time \(n^{2-\Omega(\epsilon^2)}\).
Brendan Lucier (Microsoft Research) – Tuesday, April 15 @ 4 pm
Abstract TBA
Bio TBA
Ariel Procaccia (Harvard) – Tuesday, April 22 @ 4 pm
Abstract TBA
Bio TBA
Emmanuele Viola (Northeastern) – Tuesday, April 29 @ 4 pm
Abstract TBA
Bio TBA
Nathan Klein (Boston U.) – Tuesday, May 6 @ 4 pm
Abstract TBA
Bio TBA