Periklis A. Papakonstantinou
associate professor at Rutgers
navigate
|
|
|
|
|
contact information
periklis.research@gmail.com periklis.papakonstantinou@rutgers.edu +1-848-445-9225 |
Rutgers University, Rutgers Business School Management Science and Information Systems Lucy Stone Building, Rm# A249 54 Joyce Kilmer Ave Piscataway, NJ 08854   [ map ] |
affiliations
»
Management Science and Information Systems, Rutgers (faculty)
»
Computer Science, Rutgers, New Brunswick (full faculty - courtesy appointment)
»
DIMACS: Center for Discrete Mathematics and Theoretical Computer Science
students
» PhD students
current PhD Students (alphabetic order):
- Songhua He
        foundations of machine learning, information-theoreric lower bounds, computational complexity
I am listing the last thing I heard (or remember or remember to update) where these folks went to
completed PhDs (reverse chronological order):
- Nathaniel Hobbs (9/2017 - 8/2024) co-supervised with Jaideep Vaidya
        assistant professor of professional practice (lecturer) at Rutgers University - Hafiz Asif (1/2016 - 1/2021) co-supervised with Jaideep Vaidya
        assistant professor at Hofstra University - Shiteng Chen (3/2010 - 6/2016)
        associate professor at the Chinese Academy of Sciences (ISCAS) - Guang Yang
(9/2011 - 12/2015)
        CTO at Conflux (previously assistant professor at the Chinese Academy of Sciences) - Hao Song (3/2010 - 6/2014)
        software engineer at Facebook - Bangsheng Tang (3/2010 - 6/2013)
        research scientist at META
» undergraduate student mentorship and supervision
- Justin Kim (5/2024 - now): intern from Rutgers University, through REU DIMACS program
- Brad Bentz (5/2016 - 7/2016): intern from Brown University, through REU DIMACS program
- Sherry Sarkar (5/2018 - 7/2018): intern from Georgia Tech, through REU DIMACS program
-
I am regularly supervising Capstone projects for MSc students
» completed MSc and Undergraduate Thesis supervision
- Yuping Luo (undergraduate thesis, Tsinghua, 2017): PhD student at Princeton
- Lei Zhixian (undergraduate thesis, Tsinghua, 2016): PhD student at Harvard
- Sixue Liu (MSc thesis, Tsinghua, 2016): PhD student at Princeton (initially Cambridge U.)
- Yuanzhi Li (undergraduate thesis, Tsinghua, 2014):   PhD student at Princeton
- Xin Yang (undergraduate thesis, Tsinghua, 2014):   PhD student at the U. Washington
- Mao Jieming (undergraduate thesis, Tsinghua, 2013):   PhD student at Princeton
- Silvio Frischknecht (MSc thesis, ETH, 2012, co-supervised with Roger Wattenhofer)
teaching
At Rutgers I am teaching graduate and undergraduate courses in: cryptography and information security, distributed ledgers and cryptocurrencies, machine learning, and databases. All courses are taught through Canvas.
» past courses at Tsinghua» before Tsinghua
talks & notes
» talks
Email me for a copy of my slides of a talk
» notes
-
A crash course in probability [ pdf ]
-- a mild introduction to measure concentration for Business students -
Advanced algorithms notes [ pdf ]
-- from an undergraduate class I taught regularly in the Elite CS class @ Tsinghua -
Elementary counting [ pdf ]
-- an introduction to combinatorial enumeration (assuming no prerequisites)
about me

» my research
I work in the foundations of computing, with a focus on computational complexity, and the mathematical foundations of cryptography and machine learning. I am a computer scientist and mathematician by training. In the distant past I started as an engineer. Occasionally, I revisit my engineering roots and enjoy solving practical problems. As a result, my research spans both theoretical and applied domains. I strive to keep these two research lives separate from each other —pure theory for its own sake and applications for their own utility. Yet, both originate from the same source. If I had to choose one, I would say my deepest passion lies in theory. These are the kinds of questions that keep me awake at night.
» at Rutgers and before
Since 2015 I am with Rutgers, The State University of New Jersey, where I'm an associate professor. My main affiliation is with the Management Science department (although in the beginning I was trying to figure out what a theorist of computing is doing in a business school, now I believe that every successful business school should have theoretical computer scientists). Before Rutgers I spent six wonderful years as an assistant professor at Tsinghua University, at Andy Yao's Institute, where I had the priviledge to lead the Laboratory for the Study of Randomness, teach bright undergraduates at the "Tsinghua Elite CS class", and supervise several PhD students who today follow successful careers in academia and industry. I did my PhD in Theoretical Computer Science at the University of Toronto, advised by Charles Rackoff. Also, I hold advanced degrees (MSc & MEng) in Mathematics, Computer Science, and Computer Engineering, and have received various academic awards, distinctions, and all that.
Constructions, Lower Bounds, and New Directions in Cryptography and Computational Complexity
Department of Computer Science, University of Toronto, 2010Advisor: Charles Rackoff
[pdf]
Abstract
In the first part of the thesis we show black-box separations in public and private-key cryptography. Our main result answers in the negative the question of whether we can base Identity Based Encryption (IBE) on Trapdoor Permutations. Furthermore, we make progress towards the black-box separation of IBE from the Decisional Diffie-Hellman assumption. We also show the necessity of adaptivity when querying one-way permutations to construct pseudorandom generators la Goldreich-Levin; an issue related to streaming models for cryptography.
In the second part we introduce streaming techniques in understanding randomness in efficient computation, proving lower bounds for efficiently computable problems, and in computing cryptographic primitives.
We observe [Cook'71] that logarithmic space-bounded Turing Machines, equipped with an unbounded stack, henceforth called Stack Machines, together with an external random tape of polynomial length characterize RP; BPP an so on. By parametrizing on the number of passes over the random tape we provide a technical perspective bringing together Streaming, Derandomization, and older works in Stack Machines. Our technical developments relate this new model with previous works in derandomization. For example, we show that to derandomize parts of BPP it is in some sense sufficient to derandomize BPNC (a class believed to be much lower than P subset of BPP). We also obtain a number of results for variants of the main model, regarding e.g. the fooling power of Nisan's pseudorandom generator (PRG) [Nisan'92] for the derandomization of BPNC^1, and the relation of parametrized access to NP-witnesses with width- parametrizations of SAT.
A substantial contribution regards a streaming approach to lower bounds for problems in the NC-hierarchy (and above). We apply Communication Complexity to show a streaming lower bound for a model with an unbounded (free-to-access) pushdown storage. In particular, we obtain a n^O(1) lower bound simultaneously in the space and in the number of passes over the input, for a variant of inner product. This is the first lower bound for machines that correspond to poly-size circuits, can do Parity, Barrington's language, and decide problems in P-NC, assuming EXP not equal PSPACE. Finally, we initiate the study of log-space streaming computation of cryptographic primitives. We observe that the work on Cryptography in NC^0 [Applebaum, Ishai, Kushilevitch '06] yields a non-black-box construction of a one-way function computable in an O(log n)-space bounded streaming model. Also, we show that relying on this work is in some sense necessary.
publications
Remark: author order in all papers is alphabetical (typical in mathematical sciences)
Derandomization and Lower Bounds
-
Depth-reduction for composites [Dick Lipton blogged about this work]
Shiteng Chen, Periklis A. Papakonstantinou
Foundations of Computer Science (FOCS), 2016
journal version: SIAM Journal of Computing (SICOMP), 2019 (invited) -
Correlation lower bounds from correlation upper bounds
Shiteng Chen, Periklis A. Papakonstantinou
Information Processing Letters (IPL), 2016
-
Pseudorandomness for Linear Length Branching Programs and Stack Machines
Andrej Bogdanov, Periklis A. Papakonstantinou, Andrew Wan
RANDOM, 2012
-
Pseudorandomness for Read-Once Formulas [discussed in Dick Lipton's blog]
Andrej Bogdanov, Periklis A. Papakonstantinou, Andrew Wan
Foundations of Computer Science (FOCS), 2011
-
How strong is Nisan's pseudorandom generator? [Dick Lipton blogged about this work]
Matei David, Periklis A. Papakonstantinou, Anastasios Sidiropoulos
Information Procesing Letters (IPL), 2011
-
Computationally Limited Randomness
Matei David, Phuong Nguyen, Periklis A. Papakonstantinou, Anastasios Sidiropoulos
Innovations in Theoretical Computer Science (ITCS), 2011
-
Cryptography and Data Privacy
-
How to Accurately and Privately Identify Anomalies
Hafiz Asif, Periklis A. Papakonstantinou, Jaideep Vaidya
Computer and Communications Security (CCS), 2019
-
Identifying Anomalies while Preserving Privacy
Hafiz Asif, Jaideep Vaidya, Periklis A. Papakonstantinou
IEEE Transactions on Knowledge and Data Engineering, 2021
-
Intelligent Pandemic Surveillance via Privacy-Preserving Crowdsensing
Hafiz Asif, Periklis A. Papakonstantinou, Stephanie Shiau, Vivek Singh, Jaideep Vaidya
IEEE Intelligent Systems, 2022 --- best paper award
-
A guide for Private Outlier Analysis
Hafiz Asif, Periklis A. Papakonstantinou, Jaideep Vaidya
Letters of the Computer Society, 2020
-
Cryptography with Streaming Algorithms
Periklis A. Papakonstantinou, Guang Yang
CRYPTO, 2014
-
A remark on one-wayness vs pseudorandomness
Periklis A. Papakonstantinou, Guang Yang
Computing and Combinatorics Conference (COCOON), 2012
-
Limits on the stretch of non-adaptive constructions of pseudo-random generators
Josh Bronson, Ali Juma, Periklis A. Papakonstantinou
Theory of Cryptography Conference (TCC), 2011
-
On the impossibility of basing identity based encryption on trapdoor permutations
Dan Boneh, Periklis A. Papakonstantinou, Yevgeniy Vahlis, Charles W. Rackoff, Brent Waters
Foundations of Computer Science (FOCS), 2008
-
Randomness
-
True Randomness from Big Data
Periklis A. Papakonstantinou, David Woodruf, Guang Yang
Scientific Reports (Nature's Scientific Reports, NPG), 2016
-
Machine Learning
-
The Effect of Weight Precision on the Neuron Count in Deep ReLU Networks
Songhua He, Periklis A. Papakonstantinou
International Conference on Machine Learning (ICML), 2024
-
Engravings, Secrets, and Interpretability of Neural Networks
Nathaniel Hobbs, Periklis A. Papakonstantinou, Jaideep Vaidya
IEEE Transactions on Emerging Topics in Computing, 2024
-
On the Power and Limits of Distance-based Learning
Periklis A. Papakonstantinou, Jia Xu, Guang Yang
International Conference on Machine Learning (ICML), 2016
-
Bagging by design (on the suboptimality of Bagging) [discussed in Lev Reyzin's blog]
Periklis A. Papakonstantinou, Jia Xu, Zhu Cao
AAAI Conference on Artificial Intelligence (AAAI), 2014
-
SAT-solving and SAT-algorithms
-
Local Search for Hard SAT Formulas: The Strength of the Polynomial Law
Sixue Liu, Periklis A. Papakonstantinou
AAAI Conference on Artificial Intelligence (AAAI), 2016
-
Width parameterized SAT: time-space tradeoffs
Eric Allender, Shiteng Chen, Tiancheng Lou, Periklis A. Papakonstantinou, Bangsheng Tang
Theory of Computing (ToC), 2014
-
A note on width-parameterized SAT: an exact machine model characterization
Periklis A. Papakonstantinou
Information Processing Letters (IPL), 2009
-
Complexity and algorithms for well-structured k-SAT instances
Konstantinos Georgiou, Periklis A. Papakonstantinou
(SAT), 2008
-
Space-bounded Communication Complexity
-
Overlays and Limited Memory Communication Mode(l)s
Periklis A. Papakonstantinou, Dominik Scheder, Hao Song
Conference on Computational Complexity (CCC), 2014
-
Space-bounded Communication Complexity
Joshua Brody, Shiteng Chen, Periklis A. Papakonstantinou, Hao Song, Xiaoming Sun
Innovations in Theoretical Computer Science (ITCS), 2013
-
Restricted models of computation - theory of simple algorithms
-
Characterizing sets of jobs that admit optimal greedy-like algorithms
Periklis A. Papakonstantinou, Charles Rackoff
Journal of Scheduling, 2010
-
On the structure of optimal greedy computation (for Job Scheduling)
Periklis A. Papakonstantinou
Mathematical Foundations of Computer Science (MFCS), 2009
-
Hierarchies for classes of priority algorithms for Job Scheduling
Periklis A. Papakonstantinou
Theoretical Computer Science, 2006
-
Miscellanea
-
On the Complexity of Constructing Golomb Rulers
Christophe Meyer, Periklis A. Papakonstantinou
Discrete Applied Mathematics, 2009
-
Bounded and Ordered Satisfiability: Connecting Recognition with Lambek-style Calculi to Classical Satisfiability Testing
Michail Flouris, Lap Chi Lau, Tsuyoshi Morioka, Periklis A. Papakonstantinou, Gerald Penn
Mathematics of Language (MOL), 2003
-