research interests

My research interests are in probability and its applications to machine learning and high-dimensional statistics. Recent work has focused on:

See also my pages at arXiv and Google Scholar Citations.

mathematics and statistics research

Maximum likelihood for high-noise group orbit estimation and single-particle cryo-EM (with Z. Fan, R. Lederman, T. Wang, and S. Xu), Annals of Statistics 52 (2024), 52-77. (arXiv)
Motivated by applications to single-particle cryo-electron microscopy (cryo-EM), we study several problems of function estimation in a low SNR regime, where samples are observed under random rotations of the function domain. In a general framework of group orbit estimation with linear projection, we describe a stratification of the Fisher information eigenvalues according to a sequence of transcendence degrees in the invariant algebra, and relate critical points of the log-likelihood landscape to a sequence of method-of-moments optimization problems. This extends previous results for a discrete rotation group without projection.

We then compute these transcendence degrees and the forms of these moment optimization problems for several examples of function estimation under SO(2) and SO(3) rotations, including a simplified model of cryo-EM as introduced by Bandeira, Blum-Smith, Kileel, Perry, Weed, and Wein. For several of these examples, we affirmatively resolve numerical conjectures that 3rd-order moments are sufficient to locally identify a generic signal up to its rotational orbit.

For low-dimensional approximations of the electric potential maps of two small protein molecules, we empirically verify that the noise-scalings of the Fisher information eigenvalues conform with these theoretical predictions over a range of SNR, in a model of SO(3) rotations without projection.

Likelihood landscape and maximum likelihood estimation for the discrete orbit recovery model (with Z. Fan, T. Wang, and Y. Wu), Communications on Pure and Applied Mathematics 76 (2023), 1208-1302. (pdf) (arXiv) (video)
We study the non-convex optimization landscape for maximum likelihood estimation in the discrete orbit recovery model with Gaussian noise. This model is motivated by applications in molecular microscopy and image processing, where each measurement of an unknown object is subject to an independent random rotation from a rotational group. Equivalently, it is a Gaussian mixture model where the mixture centers belong to a group orbit.

We show that fundamental properties of the likelihood landscape depend on the signal-to-noise ratio and the group structure. At low noise, this landscape is "benign" for any discrete group, possessing no spurious local optima and only strict saddle points. At high noise, this landscape may develop spurious local optima, depending on the specific group. We discuss several positive and negative examples, and provide a general condition that ensures a globally benign landscape. For cyclic permutations of coordinates on \(\mathbb{R}^d\) (multi-reference alignment), there may be spurious local optima when \(d\geq 6\), and we establish a correspondence between these local optima and those of a surrogate function of the phase variables in the Fourier domain.

We show that the Fisher information matrix transitions from resembling that of a single Gaussian in low noise to having a graded eigenvalue structure in high noise, which is determined by the graded algebra of invariant polynomials under the group action. In a local neighborhood of the true object, the likelihood landscape is strongly convex in a reparametrized system of variables given by a transcendence basis of this polynomial algebra. We discuss implications for optimization algorithms, including slow convergence of expectation-maximization, and possible advantages of momentum-based acceleration and variable reparametrization for first- and second-order descent methods.

Probabilistic conformal blocks for Liouville CFT on the torus (with P. Ghosal, G. Remy, and X. Sun), Duke Math Journal 173 (2024), 1085-1175. (pdf) (arXiv) (video)
Virasoro conformal blocks are a family of important functions defined as power series via the Virasoro algebra. They are a fundamental input to the conformal bootstrap program for 2D conformal field theory (CFT) and are closely related to four dimensional supersymmetric gauge theory through the Alday-Gaiotto-Tachikawa correspondence. The present work provides a probabilistic construction of the 1-point toric Virasoro conformal block for central change greater than 25. More precisely, we construct an analytic function using a probabilistic tool called Gaussian multiplicative chaos (GMC) and prove that its power series expansion coincides with the 1-point toric Virasoro conformal block. The range \((25,\infty)\) of central charges corresponds to Liouville CFT, an important CFT originating from 2D quantum gravity and bosonic string theory. Our work reveals a new integrable structure underlying GMC and opens the door to the study of non-perturbative properties of Virasoro conformal blocks such as their analytic continuation and modular symmetry. Our proof combines an analysis of GMC with tools from CFT such as Belavin-Polyakov-Zamolodchikov differential equations, operator product expansions, and Dotsenko-Fateev type integrals.

Principal components in linear mixed models with general bulk (with Z. Fan and Z. Wang), Annals of Statistics, 49(2021), 1489-1513. (pdf) (arXiv) (journal)
We study the outlier eigenvalues and eigenvectors in variance components estimates for high-dimensional mixed effects linear models using a free probability approach. We quantify the almost-sure limits of these eigenvalues and their eigenvector alignments, under a general bulk-plus-spikes assumption for the population covariances of the random effects, extending previous results in the identity-plus-spikes setting. Our analysis develops two tools in free probability and random matrix theory which are of independent interest—strong asymptotic freeness of GOE and deterministic matrices, and a method of proving deterministic anisotropic approximations to resolvents using free deterministic equivalents. Statistically, our results quantify bias and aliasing effects for the leading principal components of variance components estimates in modern high-dimensional applications.

Gaussian fluctuations for products of random matrices (with V. Gorin), American Journal of Mathematics 144 (2022), 287-393. (pdf) (arXiv)
We study global fluctuations for singular values of \(M\)-fold products of several right-unitarily invariant \(N \times N\) random matrix ensembles. As \(N \to \infty\), we show the fluctuations of their height functions converge to an explicit Gaussian field, which is log-correlated for \(M\) fixed and has a white noise component for \(M \to \infty\) jointly with \(N\). Our technique centers on the study of the multivariate Bessel generating functions of these spectral measures, for which we prove a central limit theorem for global fluctuations via certain conditions on the generating functions. We apply our approach to a number of ensembles, including rectangular Ginibre matrices, truncated Haar-random unitary matrices, and right-unitarily invariant matrices with fixed singular values, using a detailed asymptotic analysis of multivariate Bessel functions to verify the necessary conditions.

Spiked covariances and principal components analysis in high-dimensional random effects models (with Z. Fan and I. Johnstone), preprint (2018). (arXiv)
We study principal components analyses in multivariate random and mixed effects linear models, assuming a spherical-plus-spikes structure for the covariance matrix of each random effect. We characterize the behavior of outlier sample eigenvalues and eigenvectors of MANOVA variance components estimators in such models under a high-dimensional asymptotic regime. Our results show that an aliasing phenomenon may occur in high dimensions, in which eigenvalues and eigenvectors of the MANOVA estimate for one variance component may be influenced by the other components. We propose an alternative procedure for estimating the true principal eigenvalues and eigenvectors that asymptotically corrects for this aliasing problem.

Affine Macdonald conjectures and special values of Felder-Varchenko functions (with E. Rains and A. Varchenko), Selecta Mathematica N. S. 24 (2018), 1549-1591. (pdf) (arXiv) (journal) (video)
We refine the statement of the denominator and evaluation conjectures for affine Macdonald polynomials proposed by Etingof-Kirillov Jr. and prove the first non-trivial cases of these conjectures. Our results provide a q-deformation of the computation of genus 1 conformal blocks via elliptic Selberg integrals by Felder-Stevens-Varchenko. They allow us to give precise formulations for the affine Macdonald conjectures in the general case which are consistent with computer computations.
Our method applies recent work of the second named author to relate these conjectures in the case of \(U_q(\widehat{\mathfrak{sl}}_2)\) to evaluations of certain theta hypergeometric integrals defined by Felder-Varchenko. We then evaluate the resulting integrals, which may be of independent interest, by well-chosen applications of the elliptic beta integral.

Laguerre and Jacobi analogues of the Warren process (with an appendix by A. Sarantsev), submitted (2016). (pdf) (arXiv) (video 1, video 2)
We define Laguerre and Jacobi analogues of the Warren process. That is, we construct local dynamics on a triangular array of particles so that the projections to each level recover the Laguerre and Jacobi eigenvalue processes of König-O'Connell and Doumerc and the fixed time distributions recover the joint distribution of eigenvalues in multilevel Laguerre and Jacobi random matrix ensembles. Our techniques extend and generalize the framework of intertwining diffusions developed by Pal-Shkolnikov. One consequence is the construction of particle systems with local interactions whose fixed time distribution recovers the hard edge of random matrix theory. An appendix by Andrey Sarantsev establishes strong existence and uniqueness for solutions to SDER's satisfied by these processes.

Traces of intertwiners for quantum affine algebras and difference equations (after Etingof-Schiffmann-Varchenko), Transformation Groups 23 (2018), 1167-1215. (pdf) (arXiv) (journal)
We modify and give complete proofs for the results of Etingof-Schiffmann-Varchenko on traces of intertwiners of untwisted quantum affine algebras in the opposite coproduct and the standard grading. More precisely, we show that certain normalized generalized traces \(F^{V_1, \ldots, V_n}(z_1, \ldots, z_n; \lambda, \omega, \mu, k)\) for \(U_q(\widehat{\mathfrak{g}})\) solve four commuting systems of q-difference equations: the Macdonald-Ruijsenaars, dual Macdonald-Ruijsenaars, q-KZB, and dual q-KZB equations. In addition, we show a symmetry property for these renormalized trace functions. Our modifications are motivated by their appearance in the recent work of the author.

Matrix models for multilevel Heckman-Opdam and multivariate Bessel measures, Annales de l'Instut Henri Poincare (B) Probab. Stat., to appear. (pdf) (arXiv) (video 1, video 2)
We study multilevel matrix ensembles at general beta by identifying them with a class of processes defined via the branching rules for multivariate Bessel and Heckman-Opdam hypergeometric functions. For beta = 1, 2, we express the joint multilevel density of the eigenvalues of a generalized beta-Wishart matrix as a multivariate Bessel ensemble, generalizing a result of Dieker-Warren. In the null case, we prove the conjecture of Borodin-Gorin that the joint multilevel density of the beta-Jacobi ensemble is given by a principally specialized Heckman-Opdam measure.

Traces of intertwiners for quantum affine \(\mathfrak{sl}_2\) and Felder-Varchenko functions, Communications in Mathematical Physics 347 (2016), 573-653. (pdf) (arXiv) (journal)
We show that the traces of \(U_q(\widehat{\mathfrak{sl}}_2)\)-intertwiners of Etingof-Schiffmann-Varchenko valued in the three-dimensional evaluation representation converge in a certain region of parameters and give a representation-theoretic construction of Felder-Varchenko's hypergeometric solutions to the \(q\)-KZB heat equation. This gives the first proof that such a trace function converges and resolves the first case of the Etingof-Varchenko conjecture.

As applications, we prove a symmetry property for traces of intertwiners and prove Felder-Varchenko's conjecture that their elliptic Macdonald polynomials are related to the affine Macdonald polynomials defined as traces over irreducible integrable \(U_q(\widehat{\mathfrak{sl}}_2)\)-modules by Etingof-Kirillov Jr. In the trigonometric and classical limits, we recover results of Etingof-Kirillov Jr. and Etingof-Varchenko. Our method relies on an interplay between the method of coherent states applied to the free field realization of the \(q\)-Wakimoto module of Matsuo, convergence properties given by the theta hypergeometric integrals of Felder-Varchenko, and rationality properties originating from the representation-theoretic definition of the trace function.

The polynomial representation of the type \(A_{n−1}\) rational Cherednik algebra in characteristic \(p\mid n\) (with S. Devadas), Communications in Algebra 45 (2017), 1926-1934. (pdf) (arXiv) (journal)
We study the polynomial representation of the rational Cherednik algebra of type \(A_{n−1}\) with generic parameter in characteristic \(p\) for \(p \mid n\). We give explicit formulas for generators for the maximal proper graded submodule, show that they cut out a complete intersection, and thus compute the Hilbert series of the irreducible quotient. Our methods are motivated by taking characteristic \(p\) analogues of existing characteristic \(0\) results.

A representation-theoretic proof of the branching rule for Macdonald polynomials, Mathematical Research Letters 23 (2016), 887-927. Extended abstract in FPSAC 2015. (pdf) (arXiv) (journal) (proceedings)
We give a new representation-theoretic proof of the branching rule for Macdonald polynomials using the Etingof-Kirillov Jr. expression for Macdonald polynomials as traces of intertwiners of \(U_q(\mathfrak{gl}_n)\). In the Gelfand-Tsetlin basis, we show that diagonal matrix elements of such intertwiners are given by application of Macdonald's operators to a simple kernel. An essential ingredient in the proof is a map between spherical parts of double affine Hecke algebras of different ranks based upon the Dunkl-Kasatani conjecture.

A new integral formula for Heckman-Opdam hypergeometric functions, Advances in Mathematics 289 (2016), 1157-1204. (pdf) (arXiv) (journal)
We provide Harish-Chandra type formulas for the multivariate Bessel functions and Heckman-Opdam hypergeometric functions as representation-valued integrals over dressing orbits. Our expression is the quasi-classical limit of the realization of Macdonald polynomials as traces of intertwiners of quantum groups given by Etingof and Kirillov Jr. Integration over the Liouville tori of the Gelfand-Tsetlin integrable system and adjunction for higher Calogero-Moser Hamiltonians relates our expression to the integral realization over Gelfand-Tsetlin polytopes which appeared in the recent work of Borodin and Gorin on the beta-Jacobi corners ensemble.

Finite dimensional representations of the rational Cherednik algebra for \(G_4\), Journal of Algebra 323 (2010), 2864-2887. (pdf) (arXiv) (journal)
In this paper, we study representations of the rational Cherednik algebra associated to the complex reflection group \(G_4\). In particular, we classify the irreducible finite dimensional representations and compute their characters.

computer science research

S. Waiwitlikhit, I. Stoica, Y. Sun, T. Hashimoto, and D. Kang, Trustless Audits without Revealing Data or Models, ICML 2024. (arXiv)
There is an increasing conflict between business incentives to hide models and data as trade secrets, and the societal need for algorithmic transparency. For example, a rightsholder wishing to know whether their copyrighted works have been used during training must convince the model provider to allow a third party to audit the model and data. Finding a mutually agreeable third party is difficult, and the associated costs often make this approach impractical.

In this work, we show that it is possible to simultaneously allow model providers to keep their model weights (but not architecture) and data secret while allowing other parties to trustlessly audit model and data properties. We do this by designing a protocol called ZkAudit in which model providers publish cryptographic commitments of datasets and model weights, alongside a zero-knowledge proof (ZKP) certifying that published commitments are derived from training the model. Model providers can then respond to audit requests by privately computing any function F of the dataset (or model) and releasing the output of F alongside another ZKP certifying the correct execution of F. To enable ZkAudit, we develop new methods of computing ZKPs for SGD on modern neural nets for simple recommender systems and image classification models capable of high accuracies on ImageNet. Empirically, we show it is possible to provide trustless audits of DNNs, including copyright, censorship, and counterfactual audits with little to no loss in accuracy.

D. Kang, T. Hashimoto, I. Stoica, and Y. Sun, ZK-IMG: Attested Images via Zero-Knowledge Proofs to Fight Disinformation, preprint, 2022. (arXiv)
Over the past few years, AI methods of generating images have been increasing in capabilities, with recent breakthroughs enabling high-resolution, photorealistic "deepfakes" (artificially generated images with the purpose of misinformation or harm). The rise of deepfakes has potential for social disruption. Recent work has proposed using ZK-SNARKs (zero-knowledge succinct non-interactive argument of knowledge) and attested cameras to verify that images were taken by a camera. ZK-SNARKs allow verification of image transformations non-interactively (i.e., post-hoc) with only standard cryptographic hardness assumptions. Unfortunately, this work does not preserve input privacy, is impractically slow (working only on 128×128 images), and/or requires custom cryptographic arguments.

To address these issues, we present zk-img, a library for attesting to image transformations while hiding the pre-transformed image. zk-img allows application developers to specify high level image transformations. Then, zk-img will transparently compile these specifications to ZK-SNARKs. To hide the input or output images, zk-img will compute the hash of the images inside the ZK-SNARK. We further propose methods of chaining image transformations securely and privately, which allows for arbitrarily many transformations. By combining these optimizations, zk-img is the first system to be able to transform HD images on commodity hardware, securely and privately.

D. Kang, T. Hashimoto, I. Stoica, and Y. Sun, Scaling up Trustless DNN Inference with Zero-Knowledge Proofs, preprint, 2022. (arXiv)
As ML models have increased in capabilities and accuracy, so has the complexity of their deployments. Increasingly, ML model consumers are turning to service providers to serve the ML models in the ML-as-a-service (MLaaS) paradigm. As MLaaS proliferates, a critical requirement emerges: how can model consumers verify that the correct predictions were served, in the face of malicious, lazy, or buggy service providers?

In this work, we present the first practical ImageNet-scale method to verify ML model inference non-interactively, i.e., after the inference has been done. To do so, we leverage recent developments in ZK-SNARKs (zero-knowledge succinct non-interactive argument of knowledge), a form of zero-knowledge proofs. ZK-SNARKs allows us to verify ML model execution non-interactively and with only standard cryptographic hardness assumptions. In particular, we provide the first ZK-SNARK proof of valid inference for a full resolution ImageNet model, achieving 79\% top-5 accuracy. We further use these ZK-SNARKs to design protocols to verify ML model execution in a variety of scenarios, including for verifying MLaaS predictions, verifying MLaaS model accuracy, and using ML models for trustless retrieval. Together, our results show that ZK-SNARKs have the promise to make verified ML model inference practical.

B. Hanin\(^*\) and Y. Sun\(^*\), How Data Augmentation affects Optimization for Linear Regression, NeurIPS 2021. (arXiv)
Though data augmentation has rapidly emerged as a key tool for optimization in modern machine learning, a clear picture of how augmentation schedules affect optimization and interact with optimization hyperparameters such as learning rate is nascent. In the spirit of classical convex optimization and recent work on implicit bias, the present work analyzes the effect of augmentation on optimization in the simple convex setting of linear regression with MSE loss.

We find joint schedules for learning rate and data augmentation scheme under which augmented gradient descent provably converges and characterize the resulting minimum. Our results apply to arbitrary augmentation schemes, revealing complex interactions between learning rates and augmentations even in the convex setting. Our approach interprets augmented (S)GD as a stochastic optimization method for a time-varying sequence of proxy losses. This gives a unified way to analyze learning rate, batch size, and augmentations ranging from additive noise to random projections. From this perspective, our results, which also give rates of convergence, can be viewed as Monro-Robbins type conditions for augmented (S)GD.

D. Kang\(^*\), J. Guibas\(^*\), P. Bailis, T. Hashimoto, Y. Sun, M. Zaharia, Accelerating Approximate Aggregation Queries with Expensive Predicates, VLDB 2021. (proceedings) (arXiv)
Researchers and industry analysts are increasingly interested in computing aggregation queries over large, unstructured datasets with selective predicates that are computed using expensive deep neural networks (DNNs). As these DNNs are expensive and because many applications can tolerate approximate answers, analysts are interested in accelerating these queries via approximations. Unfortunately, standard approximate query processing techniques to accelerate such queries are not applicable because they assume the result of the predicates are available ahead of time. Furthermore, recent work using cheap approximations (i.e., proxies) do not support aggregation queries with predicates.

To accelerate aggregation queries with expensive predicates, we develop and analyze a query processing algorithm that leverages proxies (ABae). ABae must account for the key challenge that it may sample records that do not satisfy the predicate. To address this challenge, we first use the proxy to group records into strata so that records satisfying the predicate are ideally grouped into few strata. Given these strata, ABae uses pilot sampling and plugin estimates to sample according to the optimal allocation. We show that ABae converges at an optimal rate in a novel analysis of stratified sampling with draws that may not satisfy the predicate. We further show that ABae outperforms on baselines on six real-world datasets, reducing labeling costs by up to 2.3x.

D. Kang\(^*\), Y. Sun\(^*\), D. Hendrycks, T. Brown, and J. Steinhardt, Testing robustness against unforeseen adversaries. (arXiv) (blog) (code) (workshop)
Considerable work on adversarial defense has studied robustness to a fixed, known family of adversarial distortions, most frequently L_p-bounded distortions. In reality, the specific form of attack will rarely be known and adversaries are free to employ distortions outside of any fixed set. The present work advocates measuring robustness against this much broader range of unforeseen attacks---attacks whose precise form is not known when designing a defense.

We propose a methodology for evaluating a defense against a diverse range of distortion types together with a summary metric UAR that measures the Unforeseen Attack Robustness against a distortion. We construct novel JPEG, Fog, Gabor, and Snow adversarial attacks to simulate unforeseen adversaries and perform a careful study of adversarial robustness against these and existing distortion types. We find that evaluation against existing L_p attacks yields highly correlated information that may not generalize to other attacks and identify a set of 4 attacks that yields more diverse information. We further find that adversarial training against either one or multiple distortions, including our novel ones, does not confer robustness to unforeseen distortions. These results underscore the need to study robustness against unforeseen distortions and provide a starting point for doing so.

T. Hashimoto, Y. Sun, and T. Jaakkola, From random walks to distances on unweighted graphs, NIPS 2015. (pdf) (arXiv) (supplement and code) (poster) (proceedings)
Large unweighted directed graphs are commonly used to capture relations between entities. A fundamental problem in the analysis of such networks is to properly define the similarity or dissimilarity between any two vertices. Despite the significance of this problem, statistical characterization of the proposed metrics has been limited.

We introduce and develop a class of techniques for analyzing random walks on graphs using stochastic calculus. Using these techniques we generalize results on the degeneracy of hitting times and analyze a metric based on the Laplace transformed hitting time (LTHT). The metric serves as a natural, provably well-behaved alternative to the expected hitting time. We establish a general correspondence between hitting times of the Brownian motion and analogous hitting times on the graph. We show that the LTHT is consistent with respect to the underlying metric of a geometric graph, preserves clustering tendency, and remains robust against random addition of non-geometric edges. Tests on simulated and real-world data show that the LTHT matches theoretical predictions and outperforms alternatives.

T. Hashimoto, Y. Sun, and T. Jaakkola, Metric recovery from directed unweighted graphs, AISTATS 2015. NIPS Networks Workshop 2014. (pdf) (arXiv) (supplement and code) (workshop) (poster) (proceedings)
We analyze directed, unweighted graphs obtained from \(x_i \in \mathbb{R}^d\) by connecting vertex \(i\) to \(j\) iff \(|x_i−x_j| < \varepsilon(x_i)\). Examples of such graphs include \(k\)-nearest neighbor graphs, where \(\varepsilon(x_i)\) varies from point to point, and, arguably, many real world graphs such as co-purchasing graphs. We ask whether we can recover the underlying Euclidean metric \(\varepsilon(x_i)\) and the associated density \(p(x_i)\) given only the directed graph and \(d\). We show that consistent recovery is possible up to isometric scaling when the vertex degree is at least \(\omega(n^{2/(2+d)}\log(n)^{d/(d+2)})\). Our estimator is based on a careful characterization of a random walk over the directed graph and the associated continuum limit. As an algorithm, it resembles the PageRank centrality metric. We demonstrate empirically that the estimator performs well on simulated examples as well as on real-world co-purchasing graphs even with a small number of points and degree scaling as low as \(\log(n)\).

Y. Sun and M. Sundararajan, Axiomatic attribution for multilinear functions, Electronic Commerce 2011, 177-178. (pdf) (arXiv) (extended abstract) (proceedings)
We study the attribution problem, that is, the problem of attributing a change in the value of a characteristic function to its independent variables. We make three contributions. First, we propose a formalization of the problem based on a standard cost sharing model. Second, we show that there is a unique attribution method that satisfies Dummy, Additivity, Conditional Nonnegativity, Affine Scale Invariance, and Anonymity for all characteristic functions that are the sum of a multilinear function and an additive function. We term this the Aumann-Shapley-Shubik method. Conversely, we show that such a uniqueness result does not hold for characteristic functions outside this class. Third, we study multilinear characteristic functions in detail; we describe a computationally efficient implementation of the Aumann-Shapley-Shubik method and discuss practical applications to pay-per-click advertising and portfolio analysis.

other research

P. Y. Wang, Y. Sun, R. Axel, L. F. Abbott, and G. R. Yang, Evolving the olfactory system with machine learning, Neuron 109 (23), 3879-3892. (journal)
The convergent evolution of the fly and mouse olfactory system led us to ask whether the anatomic connectivity and functional logic of olfactory circuits would evolve in artificial neural networks trained to perform olfactory tasks. Artificial networks trained to classify odor identity recapitulate the connectivity inherent in the olfactory system. Input units are driven by a single receptor type, and units driven by the same receptor converge to form a glomerulus. Glomeruli exhibit sparse, unstructured connectivity onto a larger expansion layer of Kenyon cells. When trained to both classify odor identity and to impart innate valence onto odors, the network develops independent pathways for identity and valence classification. Thus, the defining features of fly and mouse olfactory systems also evolved in artificial neural networks trained to perform olfactory tasks. This implies that convergent evolution reflects an underlying logic rather than shared developmental principles.

presentations

2022: IAS

2021: UChicago (x2), Integrability in Conformal Probability (online), Simons Foundation, Luminy, Princeton, NeurIPS

2020: UChicago, UW Madison, Google X, Bernoulli-IMS One World Symposium, DeepMath 2020, NeurIPS OPT 2020 Workshop

2019: UCSD, Virginia, OpenAI, ICML Workshop on Uncertainty and Robustness in Deep Learning, AMS Western Sectional Meeting

2018: Simons Society of Fellows Retreat, Yale

2017: ESI, Columbia-Princeton Probability Day, Rutgers, Perimeter Institute (video), Rochester, PCMI (video 1, video 2)

2016: HCM, MIT (x2), IESC, Columbia (x2)

2015: ICERM, AISTATS, CMI, FPSAC, Yale, Columbia, Northeastern, ETH Zurich (x2), UC Berkeley, NIPS

2014: MIT, IHP, UC Berkeley, NIPS Workshop on Networks