2022
DOI: 10.1145/3498334
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Adversarially Robust Streaming Algorithms

Abstract: We investigate the adversarial robustness of streaming algorithms. In this context, an algorithm is considered robust if its performance guarantees hold even if the stream is chosen adaptively by an adversary that observes the outputs of the algorithm along the stream and can react in an online manner. While deterministic streaming algorithms are inherently robust, many central problems in the streaming literature do not admit sublinear-space deterministic algorithms; on the other hand, classical space-efficie… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 50 publications
(71 reference statements)
0
0
0
Order By: Relevance
“…In [16], the authors consider adding robustness to streaming algorithms using differential privacy. Meanwhile, Hardt and Woodruff [15], Cohen et al [9] and Ben-Eliezer et al [4] have shown that linear sketches (including CMS but not HK) are not "robust" to well-resourced adaptive attacks, when it comes to various 𝐿 𝑝 -norm estimation tasks, e.g., solving the 𝑘-heavy-hitters problem relative to the 𝐿 2 -norm. These works are mostly of theoretical importance, whereas we aim to give concrete attacks and results that are (more) approachable for practitioners.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…In [16], the authors consider adding robustness to streaming algorithms using differential privacy. Meanwhile, Hardt and Woodruff [15], Cohen et al [9] and Ben-Eliezer et al [4] have shown that linear sketches (including CMS but not HK) are not "robust" to well-resourced adaptive attacks, when it comes to various 𝐿 𝑝 -norm estimation tasks, e.g., solving the 𝑘-heavy-hitters problem relative to the 𝐿 2 -norm. These works are mostly of theoretical importance, whereas we aim to give concrete attacks and results that are (more) approachable for practitioners.…”
Section: Introductionmentioning
confidence: 99%
“…𝑥 can be potentially inserted 𝑞 𝑈 − 𝑞 ′ 𝑈 times, accumulating some additional error4 . Say C is the attack's maximal round candidate cover.…”
mentioning
confidence: 99%
See 1 more Smart Citation