Efficiently computing similarities to private datasets

A Backurs, Z Lin, S Mahabadi, S Silwal… - arxiv preprint arxiv …, 2024 - arxiv.org
Many methods in differentially private model training rely on computing the similarity
between a query point (such as public or synthetic data) and private data. We abstract out …

Vehicle-based secure location clustering for IoT-equipped building and facility management in smart city

H Wu, L Li, Y Liu, X Wu - Building and Environment, 2022 - Elsevier
Vehicles equipped with various sensing devices have the strong ability to generate location
information, which is beneficial to a lot of applications in smart city. In special, it is important …

Multiform evolution for high-dimensional problems with low effective dimensionality

Y Hou, M Sun, A Gupta, Y **, H Piao, H Ge… - arxiv preprint arxiv …, 2023 - arxiv.org
In this paper, we scale evolutionary algorithms to high-dimensional optimization problems
that deceptively possess a low effective dimensionality (certain dimensions do not …

The Johnson-Lindenstrauss lemma for clustering and subspace approximation: From coresets to dimension reduction

M Charika, E Waingarten - Proceedings of the 2025 Annual ACM-SIAM …, 2025 - SIAM
We study the effect of Johnson-Lindenstrauss transforms in various projective clustering
problems, generalizing results which only applied to center-based clustering [40]. We ask …

Moderate Dimension Reduction for -Center Clustering

SHC Jiang, R Krauthgamer, S Sapir - arxiv preprint arxiv:2312.01391, 2023 - arxiv.org
The Johnson-Lindenstrauss (JL) Lemma introduced the concept of dimension reduction via
a random linear map, which has become a fundamental technique in many computational …

A Multilinear Johnson-Lindenstrauss Transform

P Kaski, H Mannila, A Matakos - 2025 Symposium on Simplicity in Algorithms …, 2025 - SIAM
Abstract The Johnson-Lindenstrauss family of transforms constitutes a key algorithmic tool
for reducing the dimensionality of a Euclidean space with low distortion of distances …

Improving Algorithmic Efficiency using Cryptography

V Vaikuntanathan, O Zamir - arxiv preprint arxiv:2502.13065, 2025 - arxiv.org
Cryptographic primitives have been used for various non-cryptographic objectives, such as
eliminating or reducing randomness and interaction. We show how to use cryptography to …

A Bi-metric Framework for Fast Similarity Search

H Xu, S Silwal, P Indyk - arxiv preprint arxiv:2406.02891, 2024 - arxiv.org
We propose a new" bi-metric" framework for designing nearest neighbor data structures. Our
framework assumes two dissimilarity functions: a ground-truth metric that is accurate but …

Near-Optimal Dimension Reduction for Facility Location

L Huang, SHC Jiang, R Krauthgamer, D Yue - arxiv preprint arxiv …, 2024 - arxiv.org
Oblivious dimension reduction,\{a} la the Johnson-Lindenstrauss (JL) Lemma, is a
fundamental approach for processing high-dimensional data. We study this approach for …

Efficient Algorithms for Vector Similarities

SB Silwal - 2024 - dspace.mit.edu
A key cog in machine learning is the humble embedding: vector representations of real
world objects such as text, images, graphs, or molecules whose geometric similarities …