no code implementations • 27 Feb 2023 • James Bell
Is the rapid adoption of Artificial Intelligence a sign that creative destruction (a capitalist innovation process first theorised in 1942) is occurring?
no code implementations • 18 May 2022 • Han Wang, Archit Sakhadeo, Adam White, James Bell, Vincent Liu, Xutong Zhao, Puer Liu, Tadashi Kozuno, Alona Fyshe, Martha White
The performance of reinforcement learning (RL) agents is sensitive to the choice of hyperparameters.
no code implementations • NeurIPS 2021 • James Bell, Linda Linsefors, Caspar Oesterheld, Joar Skalse
This gives us a powerful tool for reasoning about the limit behaviour of agents -- for example, it lets us show that there are Newcomblike environments in which a reinforcement learning agent cannot converge to any optimal policy.
no code implementations • 15 Sep 2021 • Nitin Agrawal, James Bell, Adrià Gascón, Matt J. Kusner
We address the problem of efficiently verifying a commitment in a two-party computation.
no code implementations • 23 Mar 2021 • Paul Horton, Hannah R. Kerner, Samantha Jacob, Ernest Cisneros, Kiri L. Wagstaff, James Bell
We address this need by creating products for MSLWEB that use novelty detection to help operations staff identify unusual data that might be diagnostic of new or atypical compositions or mineralogies detected within an imaging scene.
no code implementations • 27 Sep 2020 • James Bell, Ginestra Bianconi, David Butler, Jon Crowcroft, Paul C. W Davies, Chris Hicks, Hyunju Kim, Istvan Z. Kiss, Francesco Di Lauro, Carsten Maple, Ayan Paul, Mikhail Prokopenko, Philip Tee, Sara I. Walker
On May $28^{th}$ and $29^{th}$, a two day workshop was held virtually, facilitated by the Beyond Center at ASU and Moogsoft Inc.
Physics and Society
1 code implementation • 25 Jun 2020 • David Butler, Chris Hicks, James Bell, Carsten Maple, Jon Crowcroft
Our experimental results show that for groups of size 500 or more, the error associated with our method can be as low as 0. 03 on average and thus the aggregated results can be useful in a number of identity-free contexts.
Cryptography and Security Computers and Society
no code implementations • 9 Oct 2019 • James Bell, Aurélien Bellet, Adrià Gascón, tejas kulkarni
In this paper, we study the problem of computing $U$-statistics of degree $2$, i. e., quantities that come in the form of averages over pairs of data points, in the local model of differential privacy (LDP).
1 code implementation • 20 Jun 2019 • Borja Balle, James Bell, Adria Gascon, Kobbi Nissim
In recent work, Cheu et al. (Eurocrypt 2019) proposed a protocol for $n$-party real summation in the shuffle model of differential privacy with $O_{\epsilon, \delta}(1)$ error and $\Theta(\epsilon\sqrt{n})$ one-bit messages per party.
1 code implementation • 7 Mar 2019 • Borja Balle, James Bell, Adria Gascon, Kobbi Nissim
Additionally, Erlingsson et al. (SODA 2019) provide a privacy amplification bound quantifying the level of curator differential privacy achieved by the shuffle model in terms of the local differential privacy of the randomizer used by each user.