Analysis of Perturbation Techniques in Online Learning
dc.contributor.author | Lee, Chansoo | |
dc.date.accessioned | 2018-06-07T17:45:29Z | |
dc.date.available | NO_RESTRICTION | |
dc.date.available | 2018-06-07T17:45:29Z | |
dc.date.issued | 2018 | |
dc.date.submitted | 2018 | |
dc.identifier.uri | https://hdl.handle.net/2027.42/143968 | |
dc.description.abstract | The most commonly used regularization technique in machine learning is to directly add a penalty function to the optimization objective. For example, $L_2$ regularization is universally applied to a wide range of models including linear regression and neural networks. The alternative regularization technique, which has become essential in modern applications of machine learning, is implicit regularization by injecting random noise into the training data. In fact, this idea of using random perturbations as regularizer has been one of the first algorithms for online learning, where a learner chooses actions iteratively on a data sequence that may be designed adversarially to thwart learning process. One such classical algorithm is known as Follow The Perturbed Leader (FTPL). This dissertation presents new interpretations of FTPL. In the first part, we show that FTPL is equivalent to playing the gradients of a stochastically smoothed potential function in the dual space. In the second part, we show that FTPL is the extension of a differentially private mechanism that has inherent stability guarantees. These perspectives lead to novel frameworks for FTPL regret analysis, which not only prove strong performance guarantees but also help characterize the optimal choice of noise distributions. Furthermore, they extend to the partial information setting where the learner observes only part of the input data. | |
dc.language.iso | en_US | |
dc.subject | online learning | |
dc.subject | machine learning | |
dc.subject | differential privacy | |
dc.title | Analysis of Perturbation Techniques in Online Learning | |
dc.type | Thesis | en_US |
dc.description.thesisdegreename | PhD | en_US |
dc.description.thesisdegreediscipline | Computer Science & Engineering | |
dc.description.thesisdegreegrantor | University of Michigan, Horace H. Rackham School of Graduate Studies | |
dc.contributor.committeemember | Abernethy, Jacob | |
dc.contributor.committeemember | Tewari, Ambuj | |
dc.contributor.committeemember | Van Hentenryck, Pascal R | |
dc.contributor.committeemember | Baveja, Satinder Singh | |
dc.subject.hlbsecondlevel | Mathematics | |
dc.subject.hlbtoplevel | Science | |
dc.description.bitstreamurl | https://deepblue.lib.umich.edu/bitstream/2027.42/143968/1/chansool_1.pdf | |
dc.identifier.orcid | 0000-0003-0802-5301 | |
dc.identifier.name-orcid | Lee, Chansoo; 0000-0003-0802-5301 | en_US |
dc.owningcollname | Dissertations and Theses (Ph.D. and Master's) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.