Loading Events
Find Events

Event Views Navigation

Past Events › IDSS Special Seminars

Monthly talks by academic and industry leaders from around the world.

Events List Navigation

November 2018

Censored: Distraction and Diversion Inside China’s Great Firewall

November 27, 2018 @ 4:00 pm - 5:00 pm

Margaret Roberts (UC San Diego)


Abstract: As authoritarian governments around the world develop sophisticated technologies for controlling information, many observers have predicted that these controls would be ineffective because they are easily thwarted and evaded by savvy Internet users. In Censored, Margaret Roberts demonstrates that even censorship that is easy to circumvent can still be enormously effective. Taking advantage of digital data harvested from the Chinese Internet and leaks from China's Propaganda Department, this book sheds light on how and when censorship influences the Chinese…

Find out more »
October 2018

Local Geometric Analysis and Applications

October 11, 2018 @ 4:00 pm - 5:00 pm

Lizhong Zheng (MIT)


Abstract: Local geometric analysis is a method to define a coordinate system in a small neighborhood in the space of distributions over a given alphabet. It is a powerful technique since the notions of distance, projection, and inner product defined this way are useful in the optimization problems involving distributions, such as regressions. It has been used in many places in the literature such as correlation analysis, correspondence analysis. In this talk, we will go through some of the basic…

Find out more »
September 2018

Text as Data in Social Science: Discovery, Measurement and Causal Inference

September 25, 2018 @ 4:00 pm - 5:00 pm

Brandon Stewart (Princeton University)


Social scientists are increasingly turning to computer-assisted text analysis as a way of understanding the digital footprints left by communities and individuals. Much of the technology that powers these approaches is borrowed from the fields of computer science and statistics; yet, social scientists have substantially different goals. We focus on the development of methods that support three core tasks: discovery, measurement and causal inference with text. We introduce the Structural Topic Model (STM), a bayesian generative model of text which…

Find out more »

Topics in Information and Inference Seminar

September 20, 2018 @ 4:00 pm - 5:00 pm

Yury Polyanskiy (MIT )


Title: Strong data processing inequalities and information percolation Abstract: The data-processing inequality, that is, $I(U;Y) \le I(U;X)$ for a Markov chain $U \to X \to Y$, has been the method of choice for proving impossibility (converse) results in information theory and many other disciplines. A channel-dependent improvement is called the strong data-processing inequality (or SDPI). In this talk we will: a) review SDPIs; b) show how point-to-point SDPIs can be combined into an SDPI for a network; c) show recent…

Find out more »
August 2018

Resource-efficient ML in 2 KB RAM for the Internet of Things

August 21, 2018 @ 2:00 pm - 3:00 pm

Prateek Jain (Microsoft Research)


Abstract: We propose an alternative paradigm for the Internet of Things (IoT) where machine learning algorithms run locally on severely resource-constrained edge and endpoint devices without necessarily needing cloud connectivity. This enables many scenarios beyond the pale of the traditional paradigm including low-latency brain implants, precision agriculture on disconnected farms, privacy-preserving smart spectacles, etc. Towards this end, we develop novel tree and kNN based algorithm, called Bonsai and ProtoNN, for efficient prediction on IoT devices — such as those based…

Find out more »
February 2018

Provably Secure Machine Learning

February 26, 2018 @ 4:00 pm - 5:00 pm

Jacob Steinhardt (Stanford)

32-G449 (Kiva/Patel)

Abstract:  The widespread use of machine learning systems creates a new class of computer security vulnerabilities where, rather than attacking the integrity of the software itself, malicious actors exploit the statistical nature of the learning algorithms. For instance, attackers can add fake data (e.g. by creating fake user accounts), or strategically manipulate inputs to the system once it is deployed. So far, attempts to defend against these attacks have focused on empirical performance against known sets of attacks. I will argue that…

Find out more »
+ Export Events

© MIT Institute for Data, Systems, and Society | 77 Massachusetts Avenue | Cambridge, MA 02139-4307 | 617-253-1764 | Design by Opus