0
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Adversarially Robust Optimization with Gaussian Processes

      Preprint
      , , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          In this paper, we consider the problem of Gaussian process (GP) optimization with an added robustness requirement: The returned point may be perturbed by an adversary, and we require the function value to remain as high as possible even after this perturbation. This problem is motivated by settings in which the underlying functions during optimization and implementation stages are different, or when one is interested in finding an entire region of good inputs rather than only a single point. We show that standard GP optimization algorithms do not exhibit the desired robustness properties, and provide a novel confidence-bound based algorithm StableOpt for this purpose. We rigorously establish the required number of samples for StableOpt to find a near-optimal point, and we complement this guarantee with an algorithm-independent lower bound. We experimentally demonstrate several potential applications of interest using real-world data sets, and we show that StableOpt consistently succeeds in finding a stable maximizer where several baseline methods fail.

          Related collections

          Most cited references3

          • Record: found
          • Abstract: not found
          • Article: not found

          Robust Optimization for Unconstrained Simulation-Based Problems

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Nonconvex Robust Optimization for Problems with Constraints

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Explore-exploit in top-N recommender systems via Gaussian processes

                Bookmark

                Author and article information

                Journal
                25 October 2018
                Article
                1810.10775
                a4a4eff0-fd95-4fd1-9060-c0255a371e4d

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                Accepted to NIPS 2018
                stat.ML cs.LG

                Machine learning,Artificial intelligence
                Machine learning, Artificial intelligence

                Comments

                Comment on this article