高级算法 (Fall 2018)/Problem Set 5 and Theory@Nanjing 2019: Difference between pages

From TCS Wiki
(Difference between pages)
Jump to navigation Jump to search
imported>TCSseminar
(Created page with " 每道题目的解答都要有<font color="red" >完整的解题过程、分析和证明</font>。中英文不限。 == Problem 1== In the facility location problem, some c...")
 
imported>Etone
 
Line 1: Line 1:
每道题目的解答都要有<font color="red" >完整的解题过程、分析和证明</font>。中英文不限。
==General Information ==
*'''<font size=4>Saturday, May 11, 2019: 9 am--5 pm.</font>'''
:
* <font size=4>'''Venue''': 南京大学 计算机科学与技术系 (南京大学仙林校区常州楼)111报告厅</font>    [http://map.baidu.com/?l=&s=s%26wd%3D南京仙林大道163号++南京大学(仙林校区)计算机系楼 在线地图]


==List of Speakers (in alphabetic order)==
* [https://users.cs.duke.edu/~yucheng/ Yu Cheng] (Duke University)
* [http://iiis.tsinghua.edu.cn/huanglx/ Lingxiao Huang] (EPFL)
* [https://liuexp.github.io/ Jingcheng Liu] (UC Berkeley)
* [https://sites.google.com/site/jiapeng0708/home Jiapeng Zhang] (UCSD)
;local speakers
* [http://tcs.nju.edu.cn/fengwm/ Weiming Feng] (Nanjing University)
* [http://quics.umd.edu/people/penghui-yao Penghui Yao] (Nanjing University)


== Problem 1==
== Guests ==
In the facility location problem, some clients may be far away from all facilities. If we require every client to be connected to at least one open facility, a big portion of the total cost is due to connecting these remote clients. This observation motivates the following variant of the facility location problem: for each client <math>j\in C</math> we associate a penalty <math>p_j>0</math>, and we must pay <math>p_j</math> if client <math>j</math> is not connected to any open facility. The objective is to minimize the sum of the connection costs, facility open costs, and penalties.
* 上海交通大学ACM班部分同学,及[http://chihaozhang.com/ 张驰豪]博士。
* 江苏省青少年信息学与数学奥林匹克竞赛的部分同学。
* 日本国立信息学研究所的[https://sites.google.com/site/bingkai314159/ 林冰凯]博士;他即将加入南京大学任教。
* 复旦大学[https://basics.sjtu.edu.cn/~chen/ 陈翌佳]教授。


'''(a)''' Give the primal integer linear program for this variant of the facility location problem, its LP-relaxation and the dual LP.
== Program ==


'''(b)''' Modify the 3-approximation algorithm for the facility location problem to obtain an algorithm for this variant. Describe your modified algorithm.
:{|border="2" width="100%" cellspacing="4" cellpadding="3" rules="all" style="margin:1em 1em 1em 0; border:solid 1px #AAAAAA; border-collapse:collapse;empty-cells:show;"
|-
|bgcolor="#A7C1F2" align="center" colspan="3" |'''Workshop Program'''
|-
|style="width: 140px;" align="center"|9:00 '''am''' -- 9:50 '''am'''
|style="width: 180px;" align="center"|[https://users.cs.duke.edu/~yucheng/ Yu Cheng] (程宇)<br>
Duke University
|
:<font size=3>'''Title''': Robustness and Strategic Concerns in Machine Learning</font>
:'''Abstract''': Most people interact with machine learning systems on a daily basis.  Such interactions often happen in strategic environments where people have incentives to manipulate the outcome of the learning algorithms.  As machine learning plays a more prominent role in our society, it is important to understand how people's incentives can affect the learning problems, and to design reliable algorithms that perform well in these strategic environments.


'''(c)''' Prove your modified algorithm is a 3-approximation algorithm for this variant.
:In this talk, I will explore the challenges that arise at the interface of machine learning and game theory: selfish agents may interact with machine learning algorithms strategically rather than truthfully, and many existing algorithms are vulnerable to adversarial attacks.  I will discuss two lines of my work that address these challenges: designing fast algorithms that are provably robust for several fundamental problems in machine learning and statistics, when the input data is modified by an adversary; and finding optimal policies for collecting data from selfish agents.
|-
|style="background: silver;" align="center" colspan="3" |'''Coffee Break'''
|-
|align="center"|10:15 '''am''' -- 11:05 '''am'''
|align="center"|[https://liuexp.github.io/ Jingcheng Liu]  (刘景铖)<br>
University of California, Berkeley
|
:<font size=3>'''Title''': Private Selection from Private Candidates</font>


== Problem 2==
:'''Abstract''': Differentially Private algorithms often need to select the best amongst many candidate options. Classical works on this selection problem require that the candidates’ goodness, measured as a real-valued score function, does not change by much when one person’s data changes. In many applications such as hyperparameter optimiza- tion, this stability assumption is much too strong. In this work, we consider the selection problem under a much weaker stability assumption on the candidates, namely that the score functions are differentially private. Under this assumption, we present algorithms that are near-optimal along the three relevant dimensions: privacy, utility and computational efficiency.
Assume we have a set <math>V</math> containing <math>n</math> different images. We are also given two multisets <math>E^+</math> and <math>E^-</math>, each of which is a multiset of pairs of images. Each element <math>(i,j)</math> in <math>E^+</math> means some user has marked image <math>i</math> and image <math>j</math> as \emph{similar}, while each element <math>(i,j)</math> in <math>E^-</math> means some user has marked image <math>i</math> and image <math>j</math> as \emph{dissimilar}. Notice, these ratings were generated by different users and may be inconsistent. That is, some image pair <math>(i,j)</math> may appear in both <math>E^+</math> and <math>E^-</math>. Call elements in <math>E^+</math> as <math>+</math>edges, and elements in <math>E^-</math> as <math>-</math>edges. We wish to partition images into clusters <math>S_1,S_2,\cdots</math> so as to maximize: (number of <math>+</math>edges that lie within clusters) <math>+</math> (number of <math>-</math>edges that lie between clusters).


'''(a)''' Argue that the following SDP gives an upper bound of the above objective, where <math>w^+_{(i,j)}</math> and <math>w^-_{(i,j)}</math> denote the number of times image pair <math>(i,j)</math> has appeared in <math>E^+</math> and <math>E^-</math>, respectively.
:Our result can be seen as a generalization of the exponential mechanism and its existing generalizations. We also develop an on-line version of our algorithm, that can be seen as a generalization of the sparse vector technique to this weaker stability assumption. We show how our results imply better algorithms for hyperparameter selection in differentially private machine learning, as well as for adaptive data analysis.


:::<math>
: Joint work with Kunal Talwar.
\begin{align}
\text{maximize} &&&  \sum_{i\in V, j\in V, i< j}w^+_{(i,j)}\cdot\langle \mathbf{x}_i,\mathbf{x}_j\rangle+w^-_{(i,j)}\cdot\left(1-\langle \mathbf{x}_i,\mathbf{x}_j\rangle\right)\\
\text{subject to} && \lVert \mathbf{x}_i\rVert^2_2&= 1,  & \forall i&\in V,\\
&& \langle \mathbf{x}_i,\mathbf{x}_j\rangle &\ge 0, & \forall i\in V,j\in V, i&\ne j\\
&& \mathbf{x}_i&\in\mathbb{R}^n, & \forall i&\in V.
\end{align}
</math>


'''(b)''' Devise a randomized algorithm that partition images into 4 clusters and in expectation achieves an objective value 0.75 times the optimal SDP value. ''Hint: use Goemans-Williamson style rounding but with two random hyperplanes instead of one.''
|-
|align="center"|11:10 '''am''' -- 12:00 '''pm'''
|align="center"|[http://tcs.nju.edu.cn/fengwm/ Weiming Feng]  (凤维明)<br>
Nanjing University
|
:<font size=3>'''Title''': Dynamic Sampling from Graphical Models</font>


== Problem 3==
:'''Abstract''': We study the problem of sampling from a graphical model when the model itself is changing dynamically with time. This problem derives its interest from a variety of inference, learning, and sampling settings in machine learning, computer vision, statistical physics, and theoretical computer science. While the problem of sampling from a static graphical model has received considerable attention, theoretical works for its dynamic variants have been largely lacking.
A ''<math>k</math>-uniform hypergraph'' is an ordered pair <math>G=(V,E)</math>, where <math>V</math> denotes the set of vertices and <math>E</math> denotes the set of edges. Moreover, each edge in <math>E</math> now contains <math>k</math> distinct vertices, instead of 2. (So a 2-uniform hypergraph is just what we normally call a graph.) A hypergraph is <math>k</math>-regular if all vertices have degree <math>k</math>; that is, each vertex is contained within <math>k</math> hypergraph edges.


Show that for sufficiently large <math>k</math>, the vertices of a <math>k</math>-uniform, <math>k</math>-regular hypergraph can be 2-colored so that no edge is monochromatic. What’s the smallest value of <math>k</math> you can achieve?
:The main contribution of our work is an algorithm that can sample dynamically from a broad class of graphical models over discrete random variables. Our algorithm is parallel and Las Vegas: it knows when to stop and it outputs samples from the exact distribution. We also provide sufficient conditions under which this algorithm runs in time proportional to the size of the update, on general graphical models as well as well-studied specific spin systems. Our dynamic sampling algorithm relies on a local resampling algorithm and a new equilibrium property that is shown to be satisfied by our algorithm at each step, and enables us to prove its correctness. This equilibrium property is robust enough to guarantee the correctness of our algorithm, helps us improve bounds on fast convergence on specific models, and should be of independent interest.


== Programming Assignment 1==
:Joint work with Nisheeth Vishnoi and Yitong Yin.
Finally, you can get your hands dirty and do some coding! You do not need to hand in solutions or source-code or anything for this programming assignment, but you should find some time to actually ''do'' this, so as to better understand the algorithmic Lovász Local Lemma.


More specifically, you will implement Moser's algorithm introduced in class for the following scenario. Consider a 9-SAT formula where each variable appears in 8 clauses. Set up a formula with 112,500 variables and 100,000 clauses in the following manner: set up 8 copies of each of the 112,500 variables (900,000 total variables), permute them, and use the ordering to assign the variables to the 100,000 clauses. (If a variable appears in a clause multiple times, try to locally correct for this by swapping one copy to another clause.) Then assign a random ``sign'' to each variable: with probability 1/2, use <math>\overline{x}</math> instead of <math>x</math>. This gives a formula that satisfies the condition <math>d\leq 2^{k-3}-1</math>. (Try verify this!)
|-
|style="background: silver;" align="center" colspan="3" |'''Lunch Break  (12 noon -- 1:30 pm)'''
|-
|align="center"|1:30 '''pm''' -- 2:20 '''pm'''
|align="center"|[http://iiis.tsinghua.edu.cn/huanglx/ Lingxiao Huang]  (黄棱潇)<br>
École polytechnique fédérale de Lausanne (EPFL)
|
:<font size=3>'''Title''': Fairness in Automated Decision-Making Tasks </font>


For each execution of your implementation, you should track how many times the local correction procedure (i.e., <math>\texttt{Fix}</math>) is required before termination. Repeat this experiment with 100 (or more) different formulas derived from the process above, and observe the distribution of the number of local corrections required. Note that you may want to take some care to make the local correction step efficient in order to have your program run effectively.
:'''Abstract''':    Automated decision-making algorithms are increasingly deployed and affect people's lives significantly. Recently, there has been growing concern about systematically discriminate against minority groups of individuals that may exist in such algorithms. Thus, developing algorithms that are "fair" with respect to sensitive attributes has become an important problem.
   
:In this talk, I will first introduce the motivation of "fairness" in real-world applications and how to model "fairness" in theory. Then I will present several recent progress in designing algorithms that maintain fairness requirements for automated decision-making tasks, including multiwinner voting, personalization, classification, and coreset construction.
 
|-
|align="center"|2:25 '''pm''' -- 3:15 '''pm'''
|align="center"|[https://sites.google.com/site/jiapeng0708/home Jiapeng Zhang]  (张家鹏)<br>
University of California, San Diego
|
:<font size=3>'''Title''': Sunflowers: a bridge between complexity, combinatorics and pseudorandomness</font>
 
:'''Abstract''': The Erdos-Rado sunflower conjecture is one of the tantalizing open problems in combinatorics. It has profound a lot of connections with theoretical computer science. In this talk, I will focus on the connection between the sunflower conjecture and DNF sparsification. Specifically, I will cover the following two parts:
 
:# An improved lower approximation of DNF sparsification lemma.
:# A connection between upper approximation of DNF sparsification and sunflower structures.
 
:These two results provide some clue to improve the upper bound of sunflower structures.
 
:The talk is based on joint works with Xin Li, Shachar Lovett and Noam Solomon.
|-
|align="center"|3:20 '''pm''' -- 4:10 '''pm'''
|align="center"|[http://quics.umd.edu/people/penghui-yao Penghui Yao]  (姚鹏晖)<br>
Nanjing University
|
:<font size=3>'''Title''': A doubly exponential upper bound on noisy EPR states for binary games </font>
 
:'''Abstract''': We initiate the study of a class of entangled-games, mono-state games, which is a two-player one-round game  with a given biparite state and the players are only allowed to share arbitrary copies of the given state . This paper provides a doubly exponential upper bound on the copies of the states    for the players to approximate the value of the game to an arbitrarily small constant precision for any mono-state binary game  if the shared state  is a noisy EPR state.
:This work develops a series of new techniques about the Fourier analysis on matrix spaces and proves a quantum invariance principle and a hypercontractive inequality of random operators. The structure of the proofs is built the recent framework about the decidability of the noninteractive simulation of joint distributions, which is completely different from all previous optimization-based approaches or "Tsirelson’s problem"-based approaches. This novel approach provides a new angle to study the decidability of the complexity class MIP*, a longstanding open problem in quantum complexity theory.
|-
|style="background: silver;" align="center" colspan="3" |'''Coffee Break'''
|-
|align="center"|4:30 '''pm''' -- 5:00 '''pm'''
|align="center" colspan="2" |
:
'''<font size=4>Panel Discussion</font>'''
:
|}
 
== Short Bios ==
:{|border="2"  cellspacing="4" cellpadding="3" rules="all" style="margin:1em 1em 1em 0; border:solid 1px #AAAAAA; border-collapse:collapse;empty-cells:show;"
|align="center"|http://tcs.nju.edu.cn/pic/theoryday19/yucheng.jpg
|width="100%"|
:Yu Cheng (程宇) will join the Mathematics (MSCS) Department of University of Illinois at Chicago as Assistant Professor in Fall 2019.  He is currently a postdoctoral researcher in the Department of Computer Science at Duke University, hosted by Vincent Conitzer, Rong Ge, Kamesh Munagala, and Debmalya Panigrahi.  He obtained his Ph.D. in Computer Science from the University of Southern California in 2017, advised by Shang-Hua Teng.  His research interests include machine learning, game theory, and optimization.
 
|-
|align="center"|http://tcs.nju.edu.cn/pic/theoryday19/jingchengliu.jpg
|width="100%"|
:Jingcheng Liu (刘景铖) is in the final year of his PhD in the CS theory group at UC Berkeley, with an anticipated completion of summer 2019, under the supervision of Professor Alistair Sinclair. He is broadly interested in theoretical computer science. His current research focuses on the interplay between phase transitions in statistical physics, locations of zeros of graph polynomials, and algorithmic questions such as the tractable boundaries of approximate counting, sampling and inference. Before attending UC Berkeley, he completed his undergraduate studies in the ACM Honor Class of 2010, at Shanghai Jiao Tong University.
 
|-
|http://tcs.nju.edu.cn/pic/theoryday19/weimingfeng.jpg
|width="100%"|
:Weiming Feng (凤维明) is a third year PhD student in the theoretical computer science group at Nanjing University, under the supervision of Professor Yitong Yin. His research mainly focuses on theory of distributed computing and randomized algorithms. Currently, he is working on distributed sampling and dynamic sampling problems.
 
|-
|http://tcs.nju.edu.cn/pic/theoryday19/lingxiaohuang.jpg
|width="100%"|
:Lingxiao Huang (黄棱潇) is a postdoc of computer science in EPFL, where he is advised by Nisheeth Vishnoi. He joined EPFL in 2017, after received his Ph.D. in IIIS, Tsinghua University. His current research interest is algorithm design and computational social choice. He is passionate about creating novel algorithms that are motivated by existing practical challenges.
 
|-
|http://tcs.nju.edu.cn/pic/theoryday19/jiapengzhang.jpg
|width="100%"|
:Jiapeng Zhang (张家鹏) is a PhD candidate at UC San Diego, under the supervise of Shachar Lovett. He is working on boolean function analysis, computational complexity and foundations of cryptography.
 
|-
|http://tcs.nju.edu.cn/pic/theoryday19/penghuiyao.jpg
|width="100%"|
:Penghui Yao (姚鹏晖) is an associate professor in the Department of Computer Science and Technology, Nanjing University. He obtained his doctoral degree from Centre for Quantum Technology, National University of Singapore. Prior to joining Nanjing Univeristy, He was a postdoctoral researcher at CWI Netherlands;  IQC University of Waterloo and QuICS University of Maryland. His research mainly focuses on quantum information theory, communication complexity and computational complexity.
|}

Revision as of 16:29, 27 April 2019

General Information

  • Saturday, May 11, 2019: 9 am--5 pm.
  • Venue: 南京大学 计算机科学与技术系 (南京大学仙林校区常州楼)111报告厅 在线地图

List of Speakers (in alphabetic order)

local speakers

Guests

  • 上海交通大学ACM班部分同学,及张驰豪博士。
  • 江苏省青少年信息学与数学奥林匹克竞赛的部分同学。
  • 日本国立信息学研究所的林冰凯博士;他即将加入南京大学任教。
  • 复旦大学陈翌佳教授。

Program

Workshop Program
9:00 am -- 9:50 am Yu Cheng (程宇)

Duke University

Title: Robustness and Strategic Concerns in Machine Learning
Abstract: Most people interact with machine learning systems on a daily basis. Such interactions often happen in strategic environments where people have incentives to manipulate the outcome of the learning algorithms. As machine learning plays a more prominent role in our society, it is important to understand how people's incentives can affect the learning problems, and to design reliable algorithms that perform well in these strategic environments.
In this talk, I will explore the challenges that arise at the interface of machine learning and game theory: selfish agents may interact with machine learning algorithms strategically rather than truthfully, and many existing algorithms are vulnerable to adversarial attacks. I will discuss two lines of my work that address these challenges: designing fast algorithms that are provably robust for several fundamental problems in machine learning and statistics, when the input data is modified by an adversary; and finding optimal policies for collecting data from selfish agents.
Coffee Break
10:15 am -- 11:05 am Jingcheng Liu (刘景铖)

University of California, Berkeley

Title: Private Selection from Private Candidates
Abstract: Differentially Private algorithms often need to select the best amongst many candidate options. Classical works on this selection problem require that the candidates’ goodness, measured as a real-valued score function, does not change by much when one person’s data changes. In many applications such as hyperparameter optimiza- tion, this stability assumption is much too strong. In this work, we consider the selection problem under a much weaker stability assumption on the candidates, namely that the score functions are differentially private. Under this assumption, we present algorithms that are near-optimal along the three relevant dimensions: privacy, utility and computational efficiency.
Our result can be seen as a generalization of the exponential mechanism and its existing generalizations. We also develop an on-line version of our algorithm, that can be seen as a generalization of the sparse vector technique to this weaker stability assumption. We show how our results imply better algorithms for hyperparameter selection in differentially private machine learning, as well as for adaptive data analysis.
Joint work with Kunal Talwar.
11:10 am -- 12:00 pm Weiming Feng (凤维明)

Nanjing University

Title: Dynamic Sampling from Graphical Models
Abstract: We study the problem of sampling from a graphical model when the model itself is changing dynamically with time. This problem derives its interest from a variety of inference, learning, and sampling settings in machine learning, computer vision, statistical physics, and theoretical computer science. While the problem of sampling from a static graphical model has received considerable attention, theoretical works for its dynamic variants have been largely lacking.
The main contribution of our work is an algorithm that can sample dynamically from a broad class of graphical models over discrete random variables. Our algorithm is parallel and Las Vegas: it knows when to stop and it outputs samples from the exact distribution. We also provide sufficient conditions under which this algorithm runs in time proportional to the size of the update, on general graphical models as well as well-studied specific spin systems. Our dynamic sampling algorithm relies on a local resampling algorithm and a new equilibrium property that is shown to be satisfied by our algorithm at each step, and enables us to prove its correctness. This equilibrium property is robust enough to guarantee the correctness of our algorithm, helps us improve bounds on fast convergence on specific models, and should be of independent interest.
Joint work with Nisheeth Vishnoi and Yitong Yin.
Lunch Break (12 noon -- 1:30 pm)
1:30 pm -- 2:20 pm Lingxiao Huang (黄棱潇)

École polytechnique fédérale de Lausanne (EPFL)

Title: Fairness in Automated Decision-Making Tasks
Abstract: Automated decision-making algorithms are increasingly deployed and affect people's lives significantly. Recently, there has been growing concern about systematically discriminate against minority groups of individuals that may exist in such algorithms. Thus, developing algorithms that are "fair" with respect to sensitive attributes has become an important problem.
In this talk, I will first introduce the motivation of "fairness" in real-world applications and how to model "fairness" in theory. Then I will present several recent progress in designing algorithms that maintain fairness requirements for automated decision-making tasks, including multiwinner voting, personalization, classification, and coreset construction.
2:25 pm -- 3:15 pm Jiapeng Zhang (张家鹏)

University of California, San Diego

Title: Sunflowers: a bridge between complexity, combinatorics and pseudorandomness
Abstract: The Erdos-Rado sunflower conjecture is one of the tantalizing open problems in combinatorics. It has profound a lot of connections with theoretical computer science. In this talk, I will focus on the connection between the sunflower conjecture and DNF sparsification. Specifically, I will cover the following two parts:
  1. An improved lower approximation of DNF sparsification lemma.
  2. A connection between upper approximation of DNF sparsification and sunflower structures.
These two results provide some clue to improve the upper bound of sunflower structures.
The talk is based on joint works with Xin Li, Shachar Lovett and Noam Solomon.
3:20 pm -- 4:10 pm Penghui Yao (姚鹏晖)

Nanjing University

Title: A doubly exponential upper bound on noisy EPR states for binary games
Abstract: We initiate the study of a class of entangled-games, mono-state games, which is a two-player one-round game with a given biparite state and the players are only allowed to share arbitrary copies of the given state . This paper provides a doubly exponential upper bound on the copies of the states for the players to approximate the value of the game to an arbitrarily small constant precision for any mono-state binary game if the shared state is a noisy EPR state.
This work develops a series of new techniques about the Fourier analysis on matrix spaces and proves a quantum invariance principle and a hypercontractive inequality of random operators. The structure of the proofs is built the recent framework about the decidability of the noninteractive simulation of joint distributions, which is completely different from all previous optimization-based approaches or "Tsirelson’s problem"-based approaches. This novel approach provides a new angle to study the decidability of the complexity class MIP*, a longstanding open problem in quantum complexity theory.
Coffee Break
4:30 pm -- 5:00 pm

Panel Discussion

Short Bios

yucheng.jpg
Yu Cheng (程宇) will join the Mathematics (MSCS) Department of University of Illinois at Chicago as Assistant Professor in Fall 2019. He is currently a postdoctoral researcher in the Department of Computer Science at Duke University, hosted by Vincent Conitzer, Rong Ge, Kamesh Munagala, and Debmalya Panigrahi. He obtained his Ph.D. in Computer Science from the University of Southern California in 2017, advised by Shang-Hua Teng. His research interests include machine learning, game theory, and optimization.
jingchengliu.jpg
Jingcheng Liu (刘景铖) is in the final year of his PhD in the CS theory group at UC Berkeley, with an anticipated completion of summer 2019, under the supervision of Professor Alistair Sinclair. He is broadly interested in theoretical computer science. His current research focuses on the interplay between phase transitions in statistical physics, locations of zeros of graph polynomials, and algorithmic questions such as the tractable boundaries of approximate counting, sampling and inference. Before attending UC Berkeley, he completed his undergraduate studies in the ACM Honor Class of 2010, at Shanghai Jiao Tong University.
weimingfeng.jpg
Weiming Feng (凤维明) is a third year PhD student in the theoretical computer science group at Nanjing University, under the supervision of Professor Yitong Yin. His research mainly focuses on theory of distributed computing and randomized algorithms. Currently, he is working on distributed sampling and dynamic sampling problems.
lingxiaohuang.jpg
Lingxiao Huang (黄棱潇) is a postdoc of computer science in EPFL, where he is advised by Nisheeth Vishnoi. He joined EPFL in 2017, after received his Ph.D. in IIIS, Tsinghua University. His current research interest is algorithm design and computational social choice. He is passionate about creating novel algorithms that are motivated by existing practical challenges.
jiapengzhang.jpg
Jiapeng Zhang (张家鹏) is a PhD candidate at UC San Diego, under the supervise of Shachar Lovett. He is working on boolean function analysis, computational complexity and foundations of cryptography.
penghuiyao.jpg
Penghui Yao (姚鹏晖) is an associate professor in the Department of Computer Science and Technology, Nanjing University. He obtained his doctoral degree from Centre for Quantum Technology, National University of Singapore. Prior to joining Nanjing Univeristy, He was a postdoctoral researcher at CWI Netherlands; IQC University of Waterloo and QuICS University of Maryland. His research mainly focuses on quantum information theory, communication complexity and computational complexity.