# fundamental_convergence_analysis_of_sharpnessaware_minimization__bc1904f3.pdf Fundamental Convergence Analysis of Sharpness-Aware Minimization Pham Duy Khanh Ho Chi Minh City University of Education khanhpd@hcmue.edu.vn Hoang-Chau Luong VNU-HCM University of Science lhchau20@apcs.fitus.edu.vn Boris S. Mordukhovich Wayne State University boris@math.wayne.edu Dat Ba Tran Wayne State University tranbadat@wayne.edu The paper investigates the fundamental convergence properties of Sharpness-Aware Minimization (SAM), a recently proposed gradient-based optimization method [Foret et al., 2021] that significantly improves the generalization of deep neural networks. The convergence properties including the stationarity of accumulation points, the convergence of the sequence of gradients to the origin, the sequence of function values to the optimal value, and the sequence of iterates to the optimal solution are established for the method. The universality of the provided convergence analysis based on inexact gradient descent frameworks [Khanh et al., 2023b] allows its extensions to efficient normalized versions of SAM such as F-SAM [Li et al., 2024], Va SSO [Li and Giannakis, 2023], RSAM [Liu et al., 2022], and to the unnormalized versions of SAM such as USAM [Andriushchenko and Flammarion, 2022]. Numerical experiments are conducted on classification tasks using deep learning models to confirm the practical aspects of our analysis. 1 Introduction This paper concentrates on optimization methods for solving the standard optimization problem minimize f(x) subject to x IRn, (1) where f : IRn IR is a continuously differentiable (C1-smooth) function. We study the convergence behavior of the gradient-based optimization algorithm Sharpness-Aware Minimization [Foret et al., 2021] together with its efficient practical variants [Liu et al., 2022, Li and Giannakis, 2023, Andriushchenko and Flammarion, 2022]. Given an initial point x1 IRn, the original iterative procedure of SAM is designed as follows xk+1 = xk t f xk + ρ f(xk) for all k IN, where t > 0 and ρ > 0 are respectively the stepsize (in other words, the learning rate) and perturbation radius. The main motivation for the construction algorithm is that by making the backward step xk + ρ f(xk) f(xk) , it avoids minimizers with large sharpness, which is usually poor for the generalization of deep neural networks as shown in Keskar et al. [2017]. 1.1 Lack of convergence properties for SAM due to constant stepsize The consistently high efficiency of SAM has driven a recent surge of interest in the analysis of the method. The convergence analysis of SAM is now a primary focus on its theoretical understanding 38th Conference on Neural Information Processing Systems (Neur IPS 2024). with several works being developed recently (e.g., Ahn et al. [2024], Andriushchenko and Flammarion [2022], Dai et al. [2023], Si and Yun [2023]). However, none of the aforementioned studies have addressed the fundamental convergence properties of SAM, which are outlined below where the stationary accumulation point in (2) means that every accumulation point x of the iterative sequence xk satisfies the condition f( x) = 0. (1) lim inf k (2) stationary accumulation point (3) lim k (4) lim k f(xk) = f( x) with f( x) = 0 (5) xk converges to some x with f( x) = 0 Table 1: Fundamental convergence properties of smooth optimization methods The relationship between the properties above is summarized as follows: (1){ xk } = (2) = (3) = (5) = (4). The aforementioned convergence properties are standard and are analyzed by various smooth optimization methods including gradient descent-type methods, Newton-type methods, and their accelerated versions together with nonsmooth optimization methods under the usage of subgradients. The readers are referred to Bertsekas [2016], Nesterov [2018], Polyak [1987] and the references therein for those results. The following recent publications have considered various types of convergence rates for the sequences generated by SAM as outlined below: (i) Dai et al. [2023, Theorem 1] f(xk) f (1 tµ(2 Lt))k(f(x0) f ) + t L2ρ2 where L is the Lipschitz constant of f, and where µ is the constant of strong convexity constant for f. (ii) Si and Yun [2023, Theorems 3.3, 3.4] f(xi) 2 = O 1 f(xi) 2 = O 1 where L is the Lipschitz constant of f. We emphasize that none of the results mentioned above achieve any fundamental convergence properties listed in Table 1. The estimation in (i) only gives us the convergence of the function value sequence to a value close to the optimal one, not the convergence to exactly the optimal value. Additionally, it is evident that the results in (ii) do not imply the convergence of f(xk) to 0. To the best of our knowledge, the only work concerning the fundamental convergence properties listed in Table 1 is Andriushchenko and Flammarion [2022]. However, the method analyzed in that paper is unnormalized SAM (USAM), a variant of SAM with the norm being removed in the iterative procedure (2c). Recently, Dai et al. [2023] suggested that USAM has different effects in comparison with SAM in both practical and theoretical situations, and thus, they should be addressed separately. This observation once again highlights the necessity for a fundamental convergence analysis of SAM and its normalized variants. Note that, using exactly the iterative procedure (2), SAM does not achieve the convergence for either xk , or f(xk) , or f(xk) to the optimal solution, the optimal value, and the origin, respectively. It is illustrated by Example 3.1 below dealing with quadratic functions. This calls for the necessity of employing an alternative stepsize rule for SAM. Scrutinizing the numerical experiments conducted for SAM and its variants (e.g., Foret et al. [2021, Subsection C1], Li and Giannakis [2023, Subsection 4.1]), we can observe that in fact the constant stepsize rule is not a preferred strategy. Instead, the cosine stepsize scheduler from Loshchilov and Hutter [2016], designed to decay to zero and then restart after each fixed cycle, emerges as a more favorable approach. This observation motivates us to analyze the method under diminishing stepsize, which is standard and employed in many optimization methods including the classical gradient descent methods together with its incremental and stochastic counterparts [Bertsekas and Tsitsiklis, 2000]. Diminishing step sizes also converge to zero as the number of iterations increases, a condition satisfied by the practical cosine step size scheduler in each cycle. 1.2 Our Contributions Convergence of SAM and normalized variants We establish fundamental convergence properties of SAM in various settings. In the convex case, we consider the perturbation radii to be variable and bounded. This analysis encompasses the practical implementation of SAM with a constant perturbation radius. The results in this case are summarized in Table 2. Classes of function Results General setting lim inf f(xk) = 0 Bounded minimizer set stationary accumulation point Unique minimizer xk is convergent Table 2: Convergence properties of SAM for convex functions in Theorem 3.2 In the nonconvex case, we present a unified convergence analysis framework that can be applied to most variants of SAM, particularly recent efficient developments such as Va SSO [Li and Giannakis, 2023], F-SAM [Li et al., 2024], and RSAM [Liu et al., 2022]. We observe that all these methods can be viewed as inexact gradient descent (IGD) methods with absolute error. This version of IGD has not been previously considered, and its convergence analysis is significantly more complex than the one in Khanh et al. [2023b, 2024a, 2023a, 2024b], as the function value sequence generated by the new algorithm may not be decreasing. This disrupts the convergence framework for monotone function value sequences used in the aforementioned works. To address this challenge, we adapt the analysis for algorithms with nonmonotone function value sequences from Li et al. [2023], which was originally developed for random reshuffling algorithms, a context entirely different from ours. We establish the convergence of IGD with absolute error when the perturbation radii decrease at an arbitrarily slow rate. Although the analysis of this general framework does not theoretically cover the case of a constant perturbation radius, it poses no issues for the practical implementation of these methods, as discussed in Remark 3.6. A summary of our results in the nonconvex case is provided in the first part of Table 3. Convergence of USAM and unnormalized variants Our last theoretical contribution in this paper involves a refined convergence analysis of USAM in Andriushchenko and Flammarion [2022]. In the general setting, we address functions satisfying the L-descent condition (4), which is even weaker than the Lipschitz continuity of f as considered in Andriushchenko and Flammarion [2022]. The summary of the convergence analysis for USAM is given in the second part of Table 3. As will be discussed in Remark G.4, our convergence properties for USAM use weaker assumptions and cover a broader range of applications in comparison with those analyzed in [Andriushchenko and Flammarion, 2022]. Furthermore, the universality of the conducted analysis allows us to verify all the convergence properties for the extragradient method [Korpelevich, 1976] that has been recently applied in Lin et al. [2020] to large-batch training in deep learning. SAM and normalized variants USAM and unnormalized variants Classes of functions Results Classes of functions Results General setting lim f(xk) = 0 General setting stationary accumulation point General setting lim f(xk) = f General setting lim f(xk) = f KL property xk is convergent f is Lipschitz lim f(xk) = 0 KL property xk is convergent Table 3: Convergence properties of SAM together with normalized variants (Corollary 3.5, Appendix D), and USAM together with unnormalized variants (Theorem 4.2) 1.3 Importance of Our Work Our work develops, for the first time in the literature, a fairly comprehensive analysis of the fundamental convergence properties of SAM and its variants. The developed approach addresses general frameworks while being based on the analysis of the newly proposed inexact gradient descent methods. Such an approach can be applied in various other circumstances and provides useful insights into the convergence understanding of not only SAM and related methods but also many other numerical methods in smooth, nonsmooth, and derivative-free optimization. 1.4 Related Works Variants of SAM. There have been several publications considering some variants to improve the performance of SAM. Namely, Kwon et al. [2021] developed the Adaptive Sharpness-Aware Minimization (ASAM) method by employing the concept of normalization operator. Du et al. [2022] proposed the Efficient Sharpness-Aware Minimization (ESAM) algorithm by combining stochastic weight perturbation and sharpness-sensitive data selection techniques. Liu et al. [2022] proposed a novel Random Smoothing-Based SAM method called RSAM that improves the approximation quality in the backward step. Quite recently, Li and Giannakis [2023] proposed another approach called Variance Suppressed Sharpness-aware Optimization (Va SSO), which perturbed the backward step by incorporating information from the previous iterations. As Li et al. [2024] identified noise in stochastic gradient as a crucial factor in enhancing SAM s performance, they proposed Friendly Sharpness-Aware Minimization (F-SAM) which perturbed the backward step by extracting noise from the difference between the stochastic gradient and the expected gradient at the current step. Two efficient algorithms, AE-SAM and AE-Look SAM, are also proposed in Jiang et al. [2023], by employing adaptive policy based on the loss landscape geometry. Theoretical Understanding of SAM. Despite the success of SAM in practice, a theoretical understanding of SAM was absent until several recent works. Barlett et al. [2023] analyzed the convergence behavior of SAM for convex quadratic objectives, showing that for most random initialization, it converges to a cycle that oscillates between either side of the minimum in the direction with the largest curvature. Ahn et al. [2024] introduces the notion of ε-approximate flat minima and investigates the iteration complexity of optimization methods to find such approximate flat minima. As discussed in Subsection 1.1, Dai et al. [2023] considers the convergence of SAM with constant stepsize and constant perturbation radius for convex and strongly convex functions, showing that the sequence of iterates stays in a neighborhood of the global minimizer while Si and Yun [2023] considered the properties of the gradient sequence generated by SAM in different settings. Theoretical Understanding of USAM. This method was first proposed by Andriushchenko and Flammarion [2022] with fundamental convergence properties being analyzed under different settings of convex and nonconvex and optimization. Analysis of USAM was further conducted in Behdin and Mazumder [2023] for a linear regression model, and in Agarwala and Dauphin [2023] for a quadratic regression model. Detailed comparison between SAM and USAM, which indicates that they exhibit different behaviors, was presented in the two recent studies by Compagnoni et al. [2023] and Dai et al. [2023]. During the final preparation of the paper, we observed that the convergence of USAM can also be deduced from Mangasarian and Solodov [1994], though under some additional assumptions, including the boundedness of the gradient sequence. 2 Preliminaries First we recall some notions and notations frequently used in the paper. All our considerations are given in the space IRn with the Euclidean norm . As always, IN := {1, 2, . . .} signifies the collections of natural numbers. The symbol xk J x means that xk x as k with k J IN. Recall that x is a stationary point of a C1-smooth function f : IRn IR if f( x) = 0. A function f : IRn IR is said to posses a Lipschitz continuous gradient with the uniform constant L > 0, or equivalently it belongs to the class C1,L, if we have the estimate f(x) f(y) L x y for all x, y IRn. (3) This class of function enjoys the following property called the L-descent condition (see, e.g., Izmailov and Solodov [2014, Lemma A.11] and Bertsekas [2016, Lemma A.24]): f(y) f(x) + f(x), y x + L 2 y x 2 (4) for all x, y IRn. Conditions (3) and (4) are equivalent to each other when f is convex, while the equivalence fails otherwise. A major class of functions satisfying the L-descent condition but not having the Lipschitz continuous gradient is given by Khanh et al. [2023b, Section 2] as 2 Ax, x + b, x + c h(x), where A is an n n matrix, b IRn, c IR and h : IRn IR is a smooth convex function whose gradient is not Lipschitz continuous. There are also circumstances where a function has a Lipschitz continuous gradient and satisfies the descent condition at the same time, but the Lipschitz constant is larger than the one in the descent condition. Our convergence analysis of the methods presented in the subsequent sections benefits from the Kurdyka-Łojasiewicz (KL) property taken from Attouch et al. [2010]. Definition 2.1 (Kurdyka-Łojasiewicz property). We say that a smooth function f : IRn IR enjoys the KL property at x dom f if there exist η (0, ], a neighborhood U of x, and a desingularizing concave continuous function φ : [0, η) [0, ) such that φ(0) = 0, φ is C1-smooth on (0, η), φ > 0 on (0, η), and for all x U with 0 < f(x) f( x) < η, we have φ (f(x) f( x)) f(x) 1. (5) Remark 2.2. It has been realized that the KL property is satisfied in broad settings. In particular, it holds at every nonstationary point of f; see Attouch et al. [2010, Lemma 2.1 and Remark 3.2(b)]. Furthermore, it is proved at the seminal paper [Łojasiewicz, 1965] that any analytic function f : IRn IR satisfies the KL property on IRn with φ(t) = Mt1 q for some q [0, 1). Typical functions that satisfy the KL property are semi-algebraic functions and in general, functions definable in o-minimal structures; see Attouch et al. [2010, 2013], Kurdyka [1998]. We utilize the following assumption on the desingularizing function in Definition 2.1, which is employed in Li et al. [2023]. The satisfaction of this assumption for a general class of desingularizing functions is discussed in Remark G.1. Assumption 2.3. There is some C > 0 such that whenever x, y (0, η) with x+y < η, it holds that C[φ (x + y)] 1 (φ (x)) 1 + (φ (y)) 1. 3 SAM and normalized variants 3.1 Convex case We begin this subsection with an example that illustrates SAM s inability to achieve the convergence of the sequence of iterates to an optimal solution of strongly convex quadratic functions by using a constant stepsize. This emphasizes the necessity of avoiding this type of stepsize in our subsequent analysis. Example 3.1 (SAM with constant stepsize and constant perturbation radius does not converge). Let the sequence xk be generated by SAM in (2) applied to the strongly convex quadratic function f(x) = 1 2 Ax, x b, x , where A is an n n symmetric, positive-definite matrix and b IRn. Then for any fixed small constant perturbation radius and for some small constant stepsize together with an initial point close to the solution, the sequence xk generated by this algorithm does not converge to the optimal solution. The details of the above example are presented in Appendix A.1. Figure 1 gives an empirical illustration for Example 3.1. The graph shows that, while the sequence generated by GD converges to 0, the one generated by SAM gets stuck at a different point. As the constant stepsize does not guarantee the convergence of SAM, we consider another well-known stepsize called diminishing (see (7)). The following result provides the convergence properties of SAM in the convex case for that type of stepsize. Figure 1: SAM with constant stepsize does not converge to optimal solution Theorem 3.2. Let f : IRn IR be a smooth convex function whose gradient is Lipschitz continuous with constant L > 0. Given any initial point x1 IRn, let xk be generated by the SAM method with the iterative procedure xk+1 = xk tk f xk + ρk f(xk) f(xk) for all k IN with nonnegative stepsizes and perturbation radii satisfying the conditions k=1 t2 k < , k=1 tk = , sup k IN ρk < . (7) Assume that f(xk) = 0 for all k IN and that infk IN f(xk) > . Then the following assertions hold: (i) lim inf k f(xk) = 0. (ii) If f has a nonempty bounded level set, then xk is bounded, every accumulation point of xk is a global minimizer of f, and f(xk) converges to the optimal value of f. If in addition f has a unique minimizer, then the sequence xk converges to that minimizer. Due to the space limit, the proof of the theorem is presented in Appendix C.1. 3.2 Nonconvex case In this subsection, we study the convergence of several versions of SAM from the perspective of the inexact gradient descent methods. Algorithm 1 Inexact Gradient Descent (IGD) Methods Step 0. Choose some initial point x0 IRn, sequence of errors {εk} (0, ), and sequence of stepsizes {tk} (0, ). For k = 1, 2, . . . , do the following Step 1. Set xk+1 = xk tkgk with gk f(xk) εk. This algorithm is motivated by while being different from the Inexact Gradient Descent methods proposed in [Khanh et al., 2023a,b, 2024b,a]. The latter constructions consider relative errors in gradient calculation, while Algorithm 1 uses the absolute ones. This approach is particularly suitable for the constructions of SAM and its normalized variants. The convergence properties of Algorithm 1 are presented in the next theorem. Theorem 3.3. Let f : IRn IR be a smooth function whose gradient is Lipschitz continuous with some constant L > 0, and let xk be generated by the IGD method in Algorithm 1 with stepsizes and errors satisfying the conditions k=1 tk = , tk 0, k=1 tkεk < , lim sup εk < 2. (8) Assume that infk IN f(xk) > . Then the following convergence properties hold: (i) f(xk) 0, and thus every accumulation point of xk is stationary for f. (ii) If x is an accumulation point of the sequence xk , then f(xk) f( x). (iii) Suppose that f satisfies the KL property at some accumulation point x of xk with the desingularizing function φ satisfying Assumption 2.3. Assume in addition that and that f(xk) > f( x) for sufficiently large k N. Then xk x as k . In particular, if x is a global minimizer of f, then either f(xk) = f( x) for some k N, or xk x. The proof of the theorem is presented in Appendix C.2. The demonstration that condition (9) is satisfied when φ(t) = Mt1 q with some M > 0 and q (0, 1), and when tk = 1 k and εk = 1 kp with p 0 for all k N, is provided in Remark G.3. The next example discusses the necessity of the last two conditions in (8) in the convergence analysis of IGD while demonstrating that employing a constant error leads to the convergence to a nonstationary point of the method. Example 3.4 (IGD with constant error converges to a nonstationary point). Let f : IR IR be defined by f(x) = x2 for x IR. Given a perturbation radius ρ > 0 and an initial point x1 > ρ, consider the iterative sequence xk+1 = xk 2tk for k IN, (10) where {tk} [0, 1/2], tk 0, and P k=1 tk = . This algorithm is in fact the IGD applied to f with gk = f xk ρ f (xk) |f (xk)| . Then xk converges to ρ, which is not a stationary point of f. The details of the example are presented in Appendix A.2. We now propose a general framework that encompasses SAM and all of its normalized variants including RSAM [Liu et al., 2022], Va SSO [Li and Giannakis, 2023] and F-SAM [Li et al., 2024]. Due to the page limit, we refer readers to Appendix D for the detailed constructions of those methods. Remark D.1 in Appendix D also shows that all of these methods are special cases of Algorithm 1a, and thus all the convergence properties presented in Theorem 3.3 follow. Algorithm 1a General framework for normalized variants of SAM Step 0. Choose x1 IRn, {ρk} , {tk} (0, ), and dk IRn \{0} . For k 1 do the following: Step 1. Set xk+1 = xk tk f xk + ρk dk Corollary 3.5. Let f : IRn IR be a C1,L function, and let xk be generated by Algorithm 1a with the parameters X k=1 tk = , tk 0, k=1 tkρk < , lim sup ρk < 2 Assume that infk IN f(xk) > . Then all convergence properties presented in Theorem 3.3 hold. The proof of this result is presented in Appendix C.5. Remark 3.6. Note that the conditions in (11) do not pose any obstacles to the implementation of a constant perturbation radius for SAM in practical circumstances. This is due to the fact that a possible selection of tk and ρk satisfying (11) is tk = 1 k and ρk = C k0.001 for all k N (almost constant), where C > 0. Then the initial perturbation radius is C, while after C million iterations, it remains greater than 0.99C. This phenomenon is also confirmed by numerical experiments in Appendix E on nonconvex functions. The numerical results show that SAM with almost constant radii ρk = C kp has a similar convergence behavior to SAM with a constant radius ρ = C. As SAM with a constant perturbation radius has sufficient empirical evidence for its efficiency in Foret et al. [2021], this also supports the practicality of our almost constant perturbation radii. 4 USAM and unnormalized variants In this section, we study the convergence of various versions of USAM from the perspective of the following Inexact Gradient Descent method with relative errors. Algorithm 2 IGDr Step 0. Choose some x0 IRn, ν 0, and {tk} [0, ). For k = 1, 2, . . . , do the following: Step 1. Set xk+1 = xk tkgk, where gk f(xk) ν f(xk) . This algorithm was initially introduced in Khanh et al. [2023b] in a different form, considering a different selection of error. The form of IGDr closest to Algorithm 2 was established in Khanh et al. [2024a] and then further studied in Khanh et al. [2024a, 2023a, 2024b]. In this paper, we extend the analysis of the method to a general stepsize rule covering both constant and diminishing cases, which was not considered in Khanh et al. [2024a]. Theorem 4.1. Let f : IRn IR be a smooth function satisfying the descent condition for some constant L > 0, and let xk be the sequence generated by Algorithm 2 with the relative error ν [0, 1), and the stepsizes satisfying k=1 tk = and tk 0, 2 2ν δ for sufficiently large k IN and for some δ > 0. Then either f(xk) , or we have the assertions: (i) Every accumulation point of xk is a stationary point of the cost function f. (ii) If the sequence xk has any accumulation point x, then f(xk) f( x). (iii) If f C1,L, then f(xk) 0. (iv) If f satisfies the KL property at some accumulation point x of f, then xk x. (v) Assume in addition to (iv) that the stepsizes are bounded away from 0, and the KL property in (iv) holds with the desingularizing function φ(t) = Mt1 q with M > 0 and q (0, 1). Then either xk stops finitely at a stationary point, or the following convergence rates are achieved: If q = 1/2, then xk , f(xk) , f(xk) converge linearly as k to x, 0, and f( x). If q (1/2, 1), then xk x = O k 1 q 2q 1 , f(xk) = O k 1 q 2q 1 , f(xk) f( x) = O k 2 2q Although the ideas for proving this result is similar to the one given in Khanh et al. [2024a], we do provide the full proof in the Appendix C.3 for the convenience of the readers. We now show that using this approach, we derive more complete convergence results for USAM in Andriushchenko and Flammarion [2022] and also the extragradient method by Korpelevich [1976], Lin et al. [2020]. Algorithm 2a [Andriushchenko and Flammarion, 2022] Unnormalized Sharpness-Aware Minimization (USAM) Step 0. Choose x0 IRn, {ρk} [0, ), and {tk} [0, ). For k = 1, 2, . . . , do the following: Step 1. Set xk+1 = xk tk f(xk + ρk f(xk)). Algorithm 2b [Korpelevich, 1976] Extragradient Method Step 0. Choose x0 IRn, {ρk} [0, ), and {tk} [0, ). For k = 1, 2, . . . , do the following: Step 1. Set xk+1 = xk tk f(xk ρk f(xk)). We are ready now to derive convergence of the two algorithms above. The proof of the theorem is given in Appendix C.4 Theorem 4.2. Let f : IRn IR be a C1-smooth function satisfying the descent condition with some constant L > 0. Let xk be the sequence generated by either Algorithm 2a, or by Algorithm 2b with ρk ν L for some ν [0, 1) and with the stepsize satisfying (12). Then all the convergence properties in Theorem 4.1 hold. 5 Numerical Experiments To validate the practical aspect of our theory, this section compares the performance of SAM employing constant and diminishing stepsizes in image classification tasks. All the experiments are conducted on a computer with NVIDIA RTX 3090 GPU. The three types of diminishing stepsizes considered in the numerical experiments are η1/n (Diminish 1), η1/n0.5001 (Diminish 2), and η1/m log m (Diminish 3), where η1 is the initial stepsize, n represents the number of epochs performed, and m = n/5 + 2. The constant stepsize in SAM is selected through a grid search over {0.1, 0.01, 0.001} to ensure a fair comparison with the diminishing ones. The algorithms are tested on two widely used image datasets: CIFAR-10 [Krizhevsky et al., 2009] and CIFAR-100 [Krizhevsky et al., 2009]. CIFAR-10. We train well-known deep neural networks including Res Net18 [He et al., 2016], Res Net34 [He et al., 2016], and Wide Res Net28-10 [Zagoruyko and Komodakis, 2016] on this dataset by using 10% of the training set as a validation set. Basic transformations, including random crop, random horizontal flip, normalization, and cutout [De Vries and Taylor, 2017], are employed for data augmentation. All the models are trained by using SAM with SGD Momentum as the base optimizer for 200 epochs and a batch size of 128. This base optimizer is also used in the original paper [Foret et al., 2021] and in the recent works on SAM [Ahn et al., 2024, Li and Giannakis, 2023]. Following the approach by Foret et al. [2021], we set the initial stepsize to 0.1, momentum to 0.9, the ℓ2-regularization parameter to 0.001, and the perturbation radius ρ to 0.05. Setting the perturbation radius to be a constant here does not go against our theory, since by Remark 3.6, SAM with a constant radius and our almost constant radius have the same numerical behavior. We also conduct the numerical experiment with an almost constant radius and got the same results. Therefore, for simplicity of presentation, a constant perturbation radius is chosen. The algorithm with the highest accuracy, corresponding to the best performance, is highlighted in bold. The results in Table 5 report the mean and 95% confidence interval across the three independent runs. The training loss in several tests is presented in Figure 2. CIFAR-100. The training configurations for this dataset are similar to CIFAR10. The accuracy results are presented in Table 5, while the training loss results are illustrated in Figure 2. Figure 2: Training loss on CIFAR-10 (first two graphs) and CIFAR-100 (last two graphs) CIFAR-10 CIFAR-100 Model Res Net18 Res Net34 WRN28-10 Res Net18 Res Net34 WRN28-10 Constant 94.10 0.27 94.38 0.47 95.33 0.23 71.77 0.26 72.49 0.23 74.63 0.84 Diminish 1 93.95 0.34 93.94 0.40 95.18 0.03 74.43 0.12 73.99 0.70 78.59 0.03 Diminish 2 94.60 0.09 95.09 0.16 95.75 0.23 73.40 0.24 74.44 0.89 77.04 0.23 Diminish 3 94.75 0.20 94.47 0.08 95.88 0.10 75.65 0.44 74.92 0.76 79.70 0.12 Table 4: Test accuracy on CIFAR-10 and CIFAR-100 The results on CIFAR-10 and CIFAR-100 indicate that SAM with Diminish 3 stepsize usually achieves the best performance in both accuracy and training loss among all tested stepsizes. In all the architectures used in the experiment, the results consistently show that diminishing stepsizes outperform constant stepsizes in terms of both accuracy and training loss measures. Additional numerical results on a larger data set and without momentum can be found in Appendix F. 6 Discusison 6.1 Conclusion In this paper, we provide a fundamental convergence analysis of SAM and its normalized variants together with a refined convergence analysis of USAM and its unnormalized variants. Our analysis is conducted in deterministic settings under standard assumptions that cover a broad range of applications of the methods in both convex and nonconvex optimization. The conducted analysis is universal and thus can be applied in different contexts other than SAM and its variants. The performed numerical experiments show that our analysis matches the efficient implementations of SAM and its variants that are used in practice. 6.2 Limitations Our analysis is only conducted in deterministic settings, which leaves the stochastic and random reshuffling developments to our future research. The analysis of SAM coupling with momentum methods is also not considered in this paper. Another limitation pertains to numerical experiments, where only SAM was tested on three different architectures of deep learning. Acknowledgment Pham Duy Khanh, Research of this author is funded by the Ministry of Education and Training Research Funding under the project B2024-SPS-07. Boris S. Mordukhovich, Research of this author was partly supported by the US National Science Foundation under grants DMS-1808978 and DMS2204519, by the Australian Research Council under grant DP-190100555, and by Project 111 of China under grant D21024. Dat Ba Tran, Research of this author was partly supported by the US National Science Foundation under grants DMS-1808978 and DMS-2204519. The authors would like to thank Professor Mikhail V. Solodov for his fruitful discussions on the convergence of variants of SAM. A. Agarwala and Y. N. Dauphin. Sam operates far from home: eigenvalue regularization as a dynamical phenomenon. ar Xiv preprint ar Xiv:2302.08692, 2023. K. Ahn, A. Jadbabaie, and S. Sra. How to escape sharp minima with random perturbations. Proceedings of the 38th International Conference on Machine Learning, 2024. M. Andriushchenko and N. Flammarion. Towards understanding sharpness-aware minimization. Proceedings of International Conference on Machine Learning, 2022. H. Attouch, J. Bolte, P. Redont, and A. Soubeyran. Proximal alternating minimization and projection methods for nonconvex problems. Mathematics of Operations Research, pages 438 457, 2010. H. Attouch, J. Bolte, and B. F. Svaiter. Convergence of descent methods for definable and tame problems: Proximal algorithms, forward-backward splitting, and regularized gauss-seidel methods. Mathematical Programming, 137:91 129, 2013. P. L. Barlett, P. M. Long, and O. Bousquet. The dynamics of sharpness-aware minimization: Bouncing across ravines and drifting towards wide minima. Journal of Machine Learning Research, 24:1 36, 2023. K. Behdin and R. Mazumder. On statistical properties of sharpness-aware minimization: Provable guarantees. ar Xiv preprint ar Xiv:2302.11836, 2023. D. Bertsekas. Nonlinear programming, 3rd edition. Athena Scientific, Belmont, MA, 2016. D. Bertsekas and J. N. Tsitsiklis. Gradient convergence in gradient methods with errors. SIAM Journal on Optimization, 10:627 642, 2000. E. M. Compagnoni, A. Orvieto, L. Biggio, H. Kersting, F. N. Proske, and A. Lucchi. An sde for modeling sam: Theory and insights. Proceedings of International Conference on Machine Learning, 2023. Y. Dai, K. Ahn, and K. Sra. The crucial role of normalization in sharpness-aware minimization. Advances in Neural Information Processing System, 2023. Terrance De Vries and Graham W. Taylor. Improved regularization of convolutional neural networks with cutout. https://arxiv.org/abs/1708.04552, 2017. J. Du, H. Yan, J. Feng, J. T. Zhou, L. Zhen, R. S. M. Goh, and V. Y. F.Tan. Efficient sharpness-aware minimization for improved training of neural networks. Proceedings of International Conference on Learning Representations, 2022. P. Foret, A. Kleiner, H. Mobahi, and B. Neyshabur. Sharpness-aware minimization for efficiently improving generalization. Proceedings of International Conference on Learning Representations, 2021. Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 770 778, 2016. A. F. Izmailov and M. V. Solodov. Newton-type methods for optimization and variational problems. Springer, 2014. W. Jiang, H. Yang, Y. Zhang, and J. Kwok. An adaptive policy to employ sharpness-aware minimization. Proceedings of International Conference on Learning Representations, 2023. N. S. Keskar, D. Mudigere, J. Nocedal, M. Smelyanskiy, and P. T. P. Tang. On large-batch training for deep learning: Generalization gap and sharp mininma. Proceedings of International Conference on Learning Representations, 2017. P. D. Khanh, B. S. Mordukhovich, V. T. Phat, and D. B. Tran. Inexact proximal methods for weakly convex functions. https://arxiv.org/abs/2307.15596, 2023a. P. D. Khanh, B. S. Mordukhovich, and D. B. Tran. Inexact reduced gradient methods in smooth nonconvex optimization. Journal of Optimization Theory and Applications, doi.org/10.1007/s10957023-02319-9, 2023b. P. D. Khanh, B. S. Mordukhovich, and D. B. Tran. A new inexact gradient descent method with applications to nonsmooth convex optimization. Optimization Methods and Software https://doi.org/10.1080/10556788.2024.2322700, pages 1 29, 2024a. P. D. Khanh, B. S. Mordukhovich, and D. B. Tran. Globally convergent derivative-free methods in nonconvex optimization with and without noise. https://optimization-online.org/?p=26889, 2024b. G. M. Korpelevich. An extragradient method for finding saddle points and for other problems. Ekon. Mat. Metod., page 747 756, 1976. Alex Krizhevsky, Geoffrey Hinton, et al. Learning multiple layers of features from tiny images. technical report, 2009. K. Kurdyka. On gradients of functions definable in o-minimal structures. Annales de l institut Fourier, pages 769 783, 1998. J. Kwon, J. Kim, H. Park, and I. K. Choi. Asam: Adaptive sharpness-aware minimization for scale-invariant learning of deep neural networks. Proceedings of the 38th International Conference on Machine Learning, pages 5905 5914, 2021. Ya Le and Xuan S. Yang. Tiny imagenet visual recognition challenge. In CS 231N: Convolutional Neural Networks for Visual Recognition, Stanford, 2015. B. Li and G. B. Giannakis. Enhancing sharpness-aware optimization through variance suppression. Advances in Neural Information Processing System, 2023. Tao Li, Pan Zhou, Zhengbao He, Xinwen Cheng, and Xiaolin Huang. Friendly sharpness-aware minimization. Proceedings of Conference on Computer Vision and Pattern Recognition, 2024. X. Li, A. Milzarek, and J. Qiu. Convergence of random reshuffling under the kurdyka-łojasiewicz inequality. SIAM Journal on Optimization, 33:1092 1120, 2023. T. Lin, L. Kong, S. U. Stich, and M. Jaggi. Extrapolation for large-batch training in deep learning. Proceedings of International Conference on Machine Learning, 2020. Y. Liu, S. Mai, M. Cheng, X. Chen, C-J. Hsieh, and Y. You. Random sharpness-aware minimization. Advances in Neural Information Processing System, 2022. S. Łojasiewicz. Ensembles semi-analytiques. Institut des Hautes Etudes Scientifiques, pages 438 457, 1965. I. Loshchilov and F. Hutter. Sgdr: stochastic gradient descent with warm restarts. Proceedings of International Conference on Learning Representations, 2016. O. Mangasarian and M. V. Solodov. Serial and parallel backpropagation convergence via nonmonotone perturbed minimization. Optimzation Methods and Software, 4, 1994. Y. Nesterov. Lectures on convex optimization, 2nd edition,. Springer, Cham, Switzerland,, 2018. B. Polyak. Introduction to optimization. Optimization Software, New York,, 1987. A. Ruszczynski. Nonlinear optimization. Princeton university press, 2006. D. Si and C. Yun. Practical sharpness-aware minimization cannot converge all the way to optima. Advances in Neural Information Processing System, 2023. Sergey Zagoruyko and Nikos Komodakis. Wide residual networks. ar Xiv preprint ar Xiv:1605.07146, 2016. 1 Introduction 1 1.1 Lack of convergence properties for SAM due to constant stepsize . . . . . . . . . . 1 1.2 Our Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.3 Importance of Our Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.4 Related Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2 Preliminaries 4 3 SAM and normalized variants 5 3.1 Convex case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 3.2 Nonconvex case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 4 USAM and unnormalized variants 8 5 Numerical Experiments 9 6 Discusison 10 6.1 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 6.2 Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 A Counterexamples illustrating the Insufficiency of Fundamental Convergence Properties 14 A.1 Proof of Example 3.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 A.2 Proof of Example 3.4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 B Auxiliary Results for Convergence Analysis 15 C Proof of Convergence Results 17 C.1 Proof of Theorem 3.2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 C.2 Proof of Theorem 3.3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 C.3 Proof of Theorem 4.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 C.4 Proof of Theorem 4.2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 C.5 Proof of Corollary 3.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 D Efficient normalized variants of SAM 24 E Numerical experiments on SAM constant and SAM almost constant 25 F Numerical experiments on SAM with SGD without momentum as base optimizer 27 G Additional Remarks 27 A Counterexamples illustrating the Insufficiency of Fundamental Convergence Properties A.1 Proof of Example 3.1 Proof. Since f(x) = 1 2 Ax, x b, x , the gradient of f and the optimal solution are given by f(x) = Ax b and x = A 1b. Let λmin, λmax > 0 be the minimum, maximum eigenvalues of A, respectively and assume that t 1 λmin 1 λmax + λmin , 1 λmin , ρ > 0, and 0 < x1 x < tρλmin 1 tλmin . (13) The iterative procedure of (6) can be written as xk+1 = xk t f xk + ρ f(xk) = xk t A xk + ρ Axk b Then xk satisfies the inequalities 0 < xk A 1b < tρλmin 1 tλmin for all k IN. (15) It is obvious that (15) holds for k = 1. Assuming that this condition holds for any k IN, let us show that it holds for k + 1. We deduce from the iterative update (14) that xk+1 A 1b = xk t A xk + ρ Axk b = (I t A)(xk A 1b) tρA(Axk b) (I t A)(xk A 1b) tρλmin (1 tλmin) xk A 1b > 0. (16) In addition, we get xk+1 A 1b tρA(Axk b) + (I t A)(xk A 1b) tρλmax + (1 tλmin) xk A 1b tρλmax + tρλmin < tρ λmin 1 tλmin where the last inequality follows from t > 1 λmin 1 λmax+λmin from (13). Thus, (15) is verified. It follows from (16) that xk x . A.2 Proof of Example 3.4 Proof. Observe that xk > ρ for all k IN. Indeed, this follows from x1 > ρ, tk < 1/2, and xk+1 ρ = xk ρ 2tk(xk ρ) = (1 2tk)(xk ρ). In addition, we readily get 0 xk+1 ρ = (1 2tk)(xk ρ) = . . . = (x1 ρ) i=1 (1 2ti). (17) Furthermore, deduce from P k=1 2tk = that Q k=1(1 2tk) = 0. Indeed, we have k=1 (1 2tk) 1 Q k=1(1 + 2tk) 1 1 + P k=1 2tk = 0. This tells us by (17) and the classical squeeze theorem that xk ρ as k . B Auxiliary Results for Convergence Analysis We first establish the new three sequences lemma, which is crucial in the analysis of both SAM, USAM, and their variants. Lemma B.1 (three sequences lemma). Let {αk}, {βk}, {γk} be sequences of nonnegative numbers satisfying the conditions αk+1 αk βkαk + γk for sufficient large k IN, (a) {βk} is bounded, k=1 γk < , and k=1 βkα2 k < . (b) Then we have that αk 0 as k . Proof. First we show that lim infk αk = 0. Supposing the contrary gives us some δ > 0 and N IN such that αk δ for all k N. Combining this with the second and the third condition in (b) yields k=N βkα2 k δ2 X which is a contradiction verifying the claim. Let us now show that in fact limk αk = 0. Indeed, by the boundedness of {βk} define β := supk IN βk and deduce from (a) that there exists K IN such that αk+1 αk βkαk + γk for all k K. (18) Pick ε > 0 and find by lim infk αk = 0 and the two last conditions in (b) some Kε IN with Kε K, αKε ε, k=Kε γk < ε k=Kε βkα2 k < ε2 3 , and ββkα2 k ε2 9 as k Kε. (19) It suffices to show that αk 2ε for all k Kε. Fix k Kε and observe that for αk ε the desired inequality is obviously satisfied. If αk > ε, we use αKε ε and find some k < k such that k Kε and αk ε and αi > ε for i = k, k 1, . . . , k + 1. Then we deduce from (18) and (19) that i=k (αi+1 αi) i=k (βiαi + γi) i=k +1 βiαi + i=k γi + βk αk i=k +1 βiα2 i + i=Kε βiα2 i + i=Kε γi + q As a consequence, we arrive at the estimate αk = αk + αk αk ε + ε = 2ε for all k Kε, which verifies that αk 0 as k sand thus completes the proof of the lemma. Next we recall some auxiliary results from Khanh et al. [2023b]. Lemma B.2. Let xk and dk be sequences in IRn satisfying the condition xk+1 xk dk < . If x is an accumulation point of the sequence xk and 0 is an accumulation points of the sequence dk , then there exists an infinite set J IN such that we have xk J x and dk J 0. (20) Proposition B.3. Let f : IRn IR be a C1-smooth function, and let the sequence xk IRn satisfy the conditions: (H1) (primary descent condition). There exists σ > 0 such that for sufficiently large k IN we have f(xk) f(xk+1) σ f(xk) xk+1 xk . (H2) (complementary descent condition). For sufficiently large k IN, we have f(xk+1) = f(xk) = [xk+1 = xk]. If x is an accumulation point of xk and f satisfies the KL property at x, then xk x as k . When the sequence under consideration is generated by a linesearch method and satisfies some conditions stronger than (H1) and (H2) in Proposition B.3, its convergence rates are established in Khanh et al. [2023b, Proposition 2.4] under the KL property with ψ(t) = Mt1 q as given below. Proposition B.4. Let f : IRn IR be a C1-smooth function, and let the sequences xk IRn, {τk} [0, ), dk IRn satisfy the iterative condition xk+1 = xk + τkdk for all k IN. Assume that for all sufficiently large k IN we have xk+1 = xk and the estimates f(xk) f(xk+1) βτk dk 2 and f(xk) α dk , (21) where α, β > 0. Suppose in addition that the sequence {τk} is bounded away from 0 (i.e., there is some τ > 0 such that τk τ for large k IN), that x is an accumulation point of xk , and that f satisfies the KL property at x with ψ(t) = Mt1 q for some M > 0 and q (0, 1). Then the following convergence rates are guaranteed: (i) If q (0, 1/2], then the sequence xk converges linearly to x. (ii) If q (1/2, 1), then we have the estimate xk x = O k 1 q Yet another auxiliary result needed below is as follows. Proposition B.5. Let f : IRn IR be a C1-smooth function satisfying the descent condition (4) with some constant L > 0. Let xk be a sequence in IRn that converges to x, and let α > 0 be such that α f(xk) 2 f(xk) f(xk+1) for sufficiently large IN. (22) Consider the following convergence rates of xk : (i) xk x linearly. xk x = O(m(k)), where m(k) 0 as k . Then (i) ensures the linear convergences of f(xk) to f( x), and f(xk) to 0, while (ii) yields f(xk) f( x) = O(m2(k)) and f(xk) = O(m(k)) as k . Proof. Condition (22) tells us that there exists some N IN such that f(xk+1) f(xk) for all k IN. As xk x, we deduce that f(xk) f( x) with f(xk) f( x) for k N. Letting k in (22) and using the squeeze theorem together with the convergence of xk to x and the continuity of f lead us to f( x) = 0. It follows from the descent condition of f with constant L > 0 and from (4) that 0 f(xk) f( x) f( x), xk x + L This verifies the desired convergence rates of f(xk) . Employing finally (22) and f(xk+1) f( x), we also get that α f(xk) 2 f(xk) f( x) for all k N. This immediately gives us the desired convergence rates for f(xk) and completes the proof. C Proof of Convergence Results C.1 Proof of Theorem 3.2 Proof. To verify (i) first, for any k IN define gk := f xk + ρk f(xk) f(xk) and get gk f(xk) = f xk + ρk f(xk) f(xk) L xk + ρk f(xk) f(xk) xk = Lρk Lρ, (23) where ρ := supk IN ρk. Using the monotonicity of f due to the convexity of f ensures that gk, f(xk) = f xk + ρk f(xk) f(xk) f(xk), f(xk) + f(xk) 2 f xk + ρk f(xk) f(xk) f(xk), ρk f(xk) f(xk) + f(xk) 2 f(xk) 2 . With the definition of gk, the iterative procedure (6) can also be rewritten as xk+1 = xk tkgk for all k IN. The first condition in (7) yields tk 0, which gives us some K IN such that Ltk < 1 for all k K. Take some such k. Since f is Lipschitz continuous with constant L > 0, it follows from the descent condition in (4) and the estimates in (23), (24) that f(xk+1) f(xk) + f(xk), xk+1 xk + L = f(xk) tk f(xk), gk + Lt2 k 2 = f(xk) tk(1 Ltk) f(xk), gk + Lt2 k 2 gk f(xk) 2 f(xk) 2 f(xk) tk(1 Ltk) f(xk) 2 Lt2 k 2 f(xk) 2 + L3t2 kρ2 2 (2 Ltk) f(xk) 2 + L3t2 kρ2 f(xk) 2 + L3t2 kρ2 Rearranging the terms above gives us the estimate f(xk) 2 f(xk) f(xk+1) + L3t2 kρ2 Select any M > K, define S := L3ρ2 2 P k=1 t2 k < , and get by taking into account infk IN f(xk) > that k=K tk f(xk) 2 f(xk) f(xk+1) + f(x K) f(x M+1) + S f(x K) inf k IN f(xk) + S. Letting M yields P k=K tk f(xk) 2 < . Let us now show that lim inf f(xk) = 0. Supposing the contrary gives us ε > 0 and N K such that f(xk) ε for all k N, which tells us that k=N tk f(xk) 2 ε2 X This clearly contradicts the second condition in (7) and this justifies (i). To verify (ii), define uk := L3ρ2 2 P i=k t2 i for all k IN and deduce from the first condition in (7) that uk 0 as k . With the usage of {uk} , estimate (26) is written as f(xk+1) + uk+1 f(xk) + uk tk f(xk) 2 for all k K, which means that f(xk) + uk k K is nonincreasing. It follows from infk IN f(xk) > and uk 0 that f(xk) + uk is convergent, which means that the sequence f(xk) is convergent as well. Assume now f has some nonempty and bounded level set. Then every level set of f is bounded by Ruszczynski [2006, Exercise 2.12]. By (26), we get that f(xk+1) f(xk) + L3ρ2 f(xk) 2 f(xk) + L3ρ2 2 t2 k for all k K. Proceeding by induction leads us to f(xk+1) f(x1) + L3ρ2 i=1 t2 i f(x1) + S for all k K, which means that xk+1 x IRn | f(x) f(x1) + S for all k K and thus justifies the boundedness of xk . Taking lim inf f(xk) = 0 into account gives us an infinite set J IN such that f(xk) J 0. As xk is bounded, the sequence xk k J is also bounded, which gives us another infinite set I J and x IRn such that xk I x. By f(xk) = lim k J and the continuity of f, we get that f( x) = 0 ensuring that x is a global minimizer of f with the optimal value f := f( x). Since the sequence f(xk) is convergent and since x is an accumulation point of xk , we conclude that f = f( x) is the limit of f(xk) . Now take any accumulation point ex of xk and find an infinite set J IN with xk J ex. As f(xk) converges to f , we deduce that f(ex) = lim k J f(xk) = lim k IN f(xk) = f , which implies that ex is also a global minimizer of f. Assuming in addition that f has a unique minimizer x and taking any accumulation point ex of xk , we get that ex is a minimizer of f, i.e., ex = x. This means that x is the unique accumulation point of xk , and therefore xk x as k . C.2 Proof of Theorem 3.3 Proof. By (8), we find some c1 > 0, c2 (0, 1), and K IN such that 1 2(2 Ltk εk + Ltkεk) c1, 1 2(1 Ltk) + Ltkεk 2 c2, and Ltk < 1 for all k K. Let us first verify the estimate f(xk+1) f(xk) c1tk f(xk) 2 + c2tkεk whenever k K. (28) To proceed, fix k IN and deduce from the Cauchy-Schwarz inequality that gk, f(xk) = gk f(xk), f(xk) + f(xk) 2 gk f(xk) f(xk) + f(xk) 2 εk f(xk) + f(xk) 2 . (29) Since f is Lipschitz continuous with constant L, it follows from the descent condition in (4) and the estimate (29) that f(xk+1) f(xk) + f(xk), xk+1 xk + L = f(xk) tk f(xk), gk + Lt2 k 2 = f(xk) tk(1 Ltk) f(xk), gk + Lt2 k 2 ( gk f(xk) 2 f(xk) 2) f(xk) tk(1 Ltk) εk f(xk) + f(xk) 2 + Lt2 kε2 k 2 Lt2 k 2 2 (2 Ltk) f(xk) 2 + tk(1 Ltk)εk f(xk) + Lt2 kε2 k 2 2 (2 Ltk) f(xk) 2 + 1 2tk(1 Ltk)εk 1 + f(xk) 2 + Lt2 kε2 k 2 2 (2 Ltk εk + Ltkεk) f(xk) 2 + 1 2tkεk(1 Ltk) + Lt2 kε2 k 2 2 (2 Ltk εk + Ltkεk) f(xk) 2 + tkεk 2(1 Ltk) + Ltkεk Combining this with (27) gives us (28). Defining uk := c2 P i=k tiεi for k IN, we get that uk 0 as k and uk uk+1 = tkεk for all k IN. Then (28) can be rewritten as f(xk+1) + uk+1 f(xk) + uk c1tk f(xk) 2 , k K. (30) To proceed now with the proof of (i), we deduce from (30) combined with inf f(xk) > and uk 0 as k that k=K tk f(xk) 2 k=K (f(xk) f(xk+1) + uk uk+1) f(x K) inf k IN f(xk) + u K < . Next we employ Lemma B.1 with αk := f(xk) , βk := Ltk, and γk := Ltkεk for all k IN to derive f(xk) 0. Observe first that condition (a) is satisfied due to the the estimates αk+1 αk = f(xk+1) f(xk) f(xk+1) f(xk) L xk+1 xk = Ltk gk Ltk( f(xk) + gk f(xk) ) Ltk( f(xk) + εk) = βkαk + γk for all k IN. Further, the conditions in (b) hold by (8) and P k=1 tk f(xk) 2 < . As all the assumptions (a), (b) are satisfied, Lemma B.1 tells us that f(xk) = αk 0 as k . To verify (ii), deduce from (30) that f(xk) + uk is nonincreasing. As infk IN f(xk) > and uk 0, we get that f(xk) + uk is bounded from below, and thus is convergent. Taking into account that uk 0, it follows that f(xk) is convergent as well. Since x is an accumulation point of xk , the continuity of f tells us that f( x) is also an accumulation point of f(xk) , which immediately yields f(xk) f( x) due to the convergence of f(xk) . It remains to verify (iii). By the KL property of f at x, we find some η > 0, a neighborhood U of x, and a desingularizing concave continuous function φ : [0, η) [0, ) such that φ(0) = 0, φ is C1-smooth on (0, η), φ > 0 on (0, η), and we have for all x U with 0 < f(x) f( x) < η that φ (f(x) f( x)) f(x) 1. (31) Let K > K be natural number such that f(xk) > f( x) for all k K. Define k := φ(f(xk) f( x) + uk) for all k K, and let R > 0 be such that B( x, R) U. Taking the number C from Assumption 2.3, remembering that x is an accumulation point of xk , and using f(xk)+uk f( x), k 0 as k together with condition (9), we get by choosing a larger K that f(x K) + u K < f( x) + η and x K x + 1 Cc1 K + k= K tkεk < R. (32) Let us now show by induction that xk B( x, R) for all k K. The assertion obviously holds for k = K due to (32). Take some b K K and suppose that xk U for all k = K, . . . , b K. We intend to show that x b K+1 B( x, R) as well. To proceed, fix some k n K, . . . , b K o and get by f( x) < f(xk) < f(xk) + uk < f( x) + η that φ (f(xk) f( x)) f(xk) 1. (33) Combining this with uk > 0 and f(xk) f( x) > 0 gives us k k+1 φ (f(xk) f( x) + uk)(f(xk) + uk f(xk+1) uk+1) (34a) φ (f(xk) f( x) + uk)c1tk f(xk) 2 (34b) (φ (f(xk) f( x))) 1 + (φ (uk)) 1 c1tk f(xk) 2 (34c) f(xk) + (φ (uk)) 1 c1tk f(xk) 2 , (34d) where (34a) follows from the concavity of φ, (34b) follows from (30), (34c) follows from Assumption 2.3, and (34d) follows from (33). Taking the square root of both sides in (34d) and employing the AM-GM inequality yield tk f(xk) = tk q tk f(xk) 2 r 1 Cc1 ( k k+1)tk( f(xk) + (φ (uk)) 1) 1 2Cc1 ( k k+1) + 1 2tk (φ (uk)) 1 + f(xk) . Using the nonincreasing property of φ due to the concavity of φ and the choice of c2 (0, 1) ensures that (φ (uk)) 1 = Rearranging terms and taking the sum over k = K, . . . , b K of inequality (35) gives us k= K tk f(xk) 1 Cc1 k= K ( k k+1) + k= K tkφ (uk) 1 = 1 Cc1 ( K b K) + The latter estimate together with the triangle inequality and (32) tells us that x b K+1 x = x K x + k= K tk f(xk) + k= K tk gk f(xk) k= K tk f(xk) + x K x + 1 Cc1 K + k= K tkεk < R. By induction, this means that xk B( x, R) for all k K. Then a similar device brings us to k= K tk f(xk) 1 Cc1 K + for all b K K, which yields P k=1 tk f(xk) < . Therefore, k=1 tk f(xk) + k=1 tk gk f(xk) k=1 tk f(xk) + which justifies the convergence of xk and thus completes the proof of the theorem. C.3 Proof of Theorem 4.1 Proof. Using f(xk) gk ν f(xk) gives us the estimates gk 2 = f(xk) gk 2 f(xk) 2 + 2 f(xk), gk ν2 f(xk) 2 f(xk) 2 + 2 f(xk), gk = (1 ν2) f(xk) 2 + 2 f(xk), gk , (36) f(xk), gk = f(xk), gk f(xk) + f(xk) 2 f(xk) gk f(xk) + f(xk) 2 (1 + ν) f(xk) 2 , (37) f(xk), gk = f(xk), gk f(xk) f(xk) 2 f(xk) gk f(xk) f(xk) 2 (1 ν) f(xk) 2 , (38) f(xk) gk f(xk) gk f(xk) + gk f(xk) , which in turn imply that (1 ν) f(xk) gk (1 + ν) f(xk) for all k IN. (39) Using condition (12), we find N IN so that 2 2ν Ltk(1 + ν)2 δ for all k N. Select such a natural number k and use the Lipschitz continuity of f with constant L to deduce from the descent condition (4), the relationship xk+1 = xk tkgk, and the estimates (36) (38) that f(xk+1) f(xk) + f(xk), xk+1 xk + L = f(xk) tk f(xk), gk + Lt2 k 2 f(xk) tk f(xk), gk + Lt2 k f(xk), gk Lt2 k(1 ν2) f(xk) tk(1 ν) f(xk) 2 + Lt2 k(1 + ν) f(xk) 2 Lt2 k(1 ν2) 2 2 2ν Ltk(1 + ν)2 f(xk) 2 f(xk) 2 for all k N. (40) It follows from the above that the sequence f(xk) k N is nonincreasing, and hence the condition infk IN f(xk) > ensures the convergence of f(xk) . This allows us to deduce from (40) that k=N tk f(xk) 2 K=N (f(xk) f(xk+1)) f(x K) inf k IN f(xk) < . (41) Combining the latter with (39) and xk+1 = xk tkgk gives us xk+1 xk gk = k=1 tk gk 2 (1 + ν)2 X k=1 tk f(xk) 2 < . (42) Now we are ready to verify all the assertions of the theorem. Let us start with (i) and show that 0 in an accumulation point of gk . Indeed, supposing the contrary gives us ε > 0 and K IN such that gk ε for all k K, and therefore k=K tk gk 2 which is a contradiction justifying that 0 is an accumulation point of gk . If x is an accumulation point of xk , then by Lemma B.2 and (42), we find an infinite set J N such that xk J x and gk J 0. The latter being combined with (39) gives us f(xk) J 0, which yields the stationary condition f( x) = 0. To verity (ii), let x be an accumulation point of xk and find an infinite set J IN such that xk J x. Combining this with the continuity of f and the fact that f(xk) is convergent, we arrive at the equalities f( x) = lim k J f(xk) = lim k IN f(xk), which therefore justify assertion (ii). To proceed with the proof of the next assertion (iii), assume that f is Lipschitz continuous with constant L > 0 and employ Lemma B.1 with αk := f(xk) , βk := Ltk(1 + ν), and γk := 0 for all k IN to derive that f(xk) 0. Observe first that condition (a) of this lemma is satisfied due to the the estimates αk+1 αk = f(xk+1) f(xk) f(xk+1) f(xk) L xk+1 xk = Ltk gk Ltk(1 + ν) f(xk) = βkαk. The conditions in (b) of the lemma are satisfied since {tk} is bounded, P k=1 tk = by (12), γk = 0, and k=1 βkα2 k = L(1 + ν) k=1 tk f(xk) 2 < , where the inequality follows from (41). Thus applying Lemma B.1 gives us f(xk) 0 as k . To prove (iv), we verify the assumptions of Proposition B.3 for the sequences generated by Algorithm 2. It follows from (40) and xk+1 = xk tkgk that f(xk+1) f(xk) δtk 2(1 + ν) = f(xk) δ 2(1 + ν) f(xk) xk+1 xk , (43) which justify (H1) with σ = δ 2(1+ν). Regarding condition (H2), assume that f(xk+1) = f(xk) and get by (40) that f(xk) = 0, which implies by gk f(xk) ν f(xk) that gk = 0. Combining this with xk+1 = xk tkgk gives us xk+1 = xk, which verifies (H2). Therefore, Proposition B.3 tells us that xk is convergent. Let us now verify the final assertion (v) of the theorem. It is nothing to prove if xk stops at a stationary point after a finite number of iterations. Thus we assume that f(xk) = 0 for all k IN. The assumptions in (v) give us t > 0 and N IN such that tk t for all k N. Let us check that the assumptions of Proposition B.4 hold for the sequences generated by Algorithm 2 with τk := tk and dk := gk for all k IN. The iterative procedure xk+1 = xk tkgk can be rewritten as xk+1 = xk + tkdk. Using the first condition in (39) and taking into account that f(xk) = 0 for all k IN, we get that gk = 0 for all k IN. Combining this with xk+1 = xk tkgk and tk t for all k N, tells us that xk+1 = xk for all k N. It follows from (40) and (39) that f(xk+1) f(xk) δtk 2(1 + ν)2 gk 2 . (44) This estimate together with the second inequality in (39) verifies (21) with β = δ 2(1+ν)2 , α = 1 1 ν . As all the assumptions are verified, Proposition B.4 gives us the assertions: If q (0, 1/2], then the sequence xk converges linearly to x. If q (1/2, 1), then we have the estimate xk x = O k 1 q The convergence rates of f(xk) and f(xk) follow now from Proposition B.5, and thus we are done. C.4 Proof of Theorem 4.2 Proof. Let xk be the sequence generated by Algorithm 2a. Defining gk := f(xk + ρk f(xk)) and utilizing ρk ν L, we obtain gk f(xk) = f(xk + ρk f(xk)) f(xk) L ρk f(xk) ν f(xk) , which verifies the inexact condition in Step 2 of Algorithm 2. Therefore, all the convergence properties in Theorem 4.1 hold for Algorithm 2a. The proof for the convergence properties of Algorithm 2b can be conducted similarly. C.5 Proof of Corollary 3.5 Proof. Considering Algorithm 1a and defining gk = f xk + ρk dk dk , we deduce that gk f(xk) L xk + ρk dk dk xk = Lρk. Therefore, Algorithm 1a is a specialization of Algorithm 1 with εk = Lρk. Combining this with (11) also gives us (8), thereby verifying all the assumptions in Theorem 3.3. Consequently, all the convergence properties outlined in Theorem 3.3 hold for Algorithm 1a. D Efficient normalized variants of SAM In this section, we list several efficient normalized variants of SAM from [Foret et al., 2021, Liu et al., 2022, Li and Giannakis, 2023, Li et al., 2024] that are special cases of Algorithm 1a. As a consequence, all the convergence properties in Theorem 3.3 are satisfied for these methods. Algorithm 2c [Foret et al., 2021] Sharpness-Aware Minimization (SAM) Step 0. Choose x1 IRn, {ρk} [0, ), and {tk} [0, ). For k = 1, 2, . . . , do the following: Step 1. Set xk+1 = xk tk f xk + ρk f(xk) f(xk) . Algorithm 2d [Liu et al., 2022] Random Sharpness-Aware Minimization (RSAM) Step 0. Choose x1 IRn, {ρk} [0, ), and {tk} [0, ). For k = 1, 2, . . . , do the following: Step 1. Construct a random vector k IRn and set gk = f(xk + k). Step 2. Set xk+1 = xk tk f xk + ρk k+λgk Algorithm 2e [Li and Giannakis, 2023] Variance suppressed sharpness aware optimization (Va SSO) Step 0. Choose x1 IRn, d1 IRn, {ρk} [0, ), {tk} [0, ), θ (0, 1). For k 1, do the following: Step 1. Set dk = (1 θ)dk 1 + θ f(xk). Step 2. Set xk+1 = xk tk f xk + ρk dk Algorithm 2f [Li et al., 2024] Friendly Sharpness-Aware Minimization (F-SAM) Step 0. Choose x1 IRn, d1 IRn, m1 IRn, σ IR, {ρk} [0, ), {tk} [0, ), θ > 0. For k 1: Step 1. Set mk = (1 θ)mk 1 + θ f(xk). Step 2. Set dk = f(xk) σmk. Step 3. Set xk+1 = xk tk f xk + ρk dk Remark D.1. It is clear that Algorithms 2c-2f are specializations of Algorithm 1a with dk = f(xk) in Algorithm 2c, dk = k + λgk in Algorithm 2d, and dk constructed inductively for Algorithm 2e and Algorithm 2f. E Numerical experiments on SAM constant and SAM almost constant In this section, we present numerical results to support our claim in Remark 3.6 that SAM with an almost constant perturbation radius ρk = C kp for p close to 0, e.g., p = 0.001, generates similar results to SAM with a constant perturbation radius ρ = C. To do so, we consider the function f(x) = Pn i=1 log(1 + (Ax b)2 i ), where A is an n n matrix, and b is a vector in Rn. In the experiment, we construct A and b randomly with n 2, 20, 50, 100. The methods considered in the experiment are GD with a diminishing step size, SAM with a diminishing step size and a constant perturbation radius of 0.1, and lastly, SAM with a diminishing step size and a variable radius ρk = C kp , for p 1, 0.1, 0.001. We refer to the case p = 0.001 as the "almost constant" case, as ρk = C kp is numerically similar to C when we consider a small number of iterations. The diminishing step size is chosen as tk = (0.1/n)/k at the kth iteration, where n is the dimension of the problem. To make the plots clearer, we choose the initial point x1 near the solution, which is x1 = x + (0.1/n2)1n, where x is a solution of Ax = b, and 1n is the all-ones vector in Rn. All the algorithms are executed for 100n iterations. The results presented in Figure 3 show that SAM with a constant perturbation and SAM with an almost constant perturbation have the same behavior regardless of the dimension of the problem. This is simply because C k0.001 is almost the same as C. This also tells us that the convergence rate of these two versions of SAM is similar. Since SAM with a constant perturbation radius is always preferable in practice [Foret et al., 2021, Dai et al., 2023], this highlights the practicality of our development. (d) n = 100 Figure 3: SAM with constant perturbation and SAM almost constant perturbation F Numerical experiments on SAM with SGD without momentum as base optimizer CIFAR-10, CIFAR-100, and Tiny Image Net. The training configurations for these datasets follow a similar structure to Section 5, excluding momentum, which we set to zero. The results in Table 5 report test accuracy on CIFAR-10 and CIFAR-100. Table 6 shows the performance of SAM on momentum and without momentum settings. Each experiment is run once, and the highest accuracy for each column is highlighted in bold. Table 5: Additional Numerical Results on CIFAR-10, CIFAR-100 for SAM without momentum CIFAR-10 CIFAR-100 Model Res Net18 Res Net34 WRN28-10 Res Net18 Res Net34 WRN28-10 Constant 93.64 94.26 93.04 72.07 72.57 71.11 Diminish 1 88.87 89.79 86.81 65.99 67.04 51.31 Diminish 2 94.56 94.44 93.66 74.24 74.95 74.23 Diminish 3 90.84 91.23 88.70 69.69 70.54 60.64 Table 6: Additional Numerical Results on Tiny Image Net [Le and Yang, 2015] for SAM with and without momentum Tiny Image Net Momentum Without Momentum Model Res Net18 Res Net34 WRN28-10 Res Net18 Res Net34 Constant 48.58 48.34 53.34 54.90 57.36 Diminish 1 50.36 51.24 58.37 55.82 55.96 Diminish 2 48.70 49.06 52.74 57.30 60.00 Diminish 3 51.46 53.98 58.68 57.86 57.82 G Additional Remarks Remark G.1. Assumption 2.3 is satisfied with constant C = 1 for φ(t) = Mt1 q with M > 0 and q [0, 1). Indeed, taking any x, y > 0 with x + y < η, we deduce that (x + y)q xq + yq, and hence [φ (x + y)] 1 = 1 M(1 q)(x + y)q 1 M(1 q)(xq + yq) = (φ (x)) 1 + (φ (y)) 1. Remark G.2. Construct an example to demonstrate that the conditions in (11) do not require that ρk converges to 0. Let L > 0 be a Lipschitz constant of f, let C be a positive constant such that C < 2/L, let P IN be the set of all perfect squares, let tk = 1 k for all k IN, p > 0, and let {ρk} be constructed as follows: ρk = C, k P, C kp , k / P, which yields tkρk = C k , k P, C kp+1 , k / P. It is clear from the construction of {ρk} that lim supk ρk = C > 0, which implies that {ρk} does not convergence to 0. We also immediately deduce that P k=1 tk = , tk 0, and lim sup ρk = C < 2 L, which verifies the first three conditions in (11). The last condition in (11) follows from the estimates k=1 tkρk = X k P tkρk + X k/ P tkρk X Remark G.3 (on Assumption (9)). Supposing that φ(t) = Mt1 q with M > 0, q (0, 1) and letting C = 1/(M(1 q)), we get that (φ (t)) 1 = Ctq for t > 0 is an increasing function. If tk := 1 k and εk := 1 kp with p > 0, we have 1 x1+p dx = 1 pxp k = 1 pkp , which yields the relationships φ 1 p(k + 1)p 1 = C pqkpq . Therefore, we arrive at the claimed conditions 1 k C pqkpq = C pqk1+pq < . Remark G.4. Let us finally compare the results presented in Theorem 4.1 with that in Andriushchenko and Flammarion [2022]. All the convergence properties in Andriushchenko and Flammarion [2022] are considered for the class of C1,L functions, which is more narrow than the class of L-descent functions examined in Theorem 4.1(i). Under the convexity of the objective function, the convergence of the sequences of the function values at averages of iteration is established in [Andriushchenko and Flammarion, 2022, Theorem 11], which does not yield the convergence of either the function values, or the iterates, or the corresponding gradients. In the nonconvex case, we derive the stationarity of accumulation points, the convergence of the function value sequence, and the convergence of the gradient sequence in Theorem 4.1. Under the strong convexity of the objective function, the linear convergence of the sequence of iterate values is established Andriushchenko and Flammarion [2022, Theorem 11]. On the other hand, our Theorem 4.1 derives the convergence rates for the sequence of iterates, sequence of function values, and sequence of gradient under the KL property only, which covers many classes of nonconvex functions. Our convergence results address variable stepsizes and bounded radii, which also cover the case of constant stepsize and constant radii considered in Andriushchenko and Flammarion [2022]. Neur IPS Paper Checklist Question: Do the main claims made in the abstract and introduction accurately reflect the paper s contributions and scope? Answer: [Yes] Justification: The claims made in the abstract and introduction about convergence properties of SAM and its variants are presented in Section 3 and Section 4. Guidelines: The answer NA means that the abstract and introduction do not include the claims made in the paper. The abstract and/or introduction should clearly state the claims made, including the contributions made in the paper and important assumptions and limitations. A No or NA answer to this question will not be perceived well by the reviewers. The claims made should match theoretical and experimental results, and reflect how much the results can be expected to generalize to other settings. It is fine to include aspirational goals as motivation as long as it is clear that these goals are not attained by the paper. 2. Limitations Question: Does the paper discuss the limitations of the work performed by the authors? Answer: [Yes] Justification: See Section 6. Guidelines: The answer NA means that the paper has no limitation while the answer No means that the paper has limitations, but those are not discussed in the paper. The authors are encouraged to create a separate "Limitations" section in their paper. The paper should point out any strong assumptions and how robust the results are to violations of these assumptions (e.g., independence assumptions, noiseless settings, model well-specification, asymptotic approximations only holding locally). The authors should reflect on how these assumptions might be violated in practice and what the implications would be. The authors should reflect on the scope of the claims made, e.g., if the approach was only tested on a few datasets or with a few runs. In general, empirical results often depend on implicit assumptions, which should be articulated. The authors should reflect on the factors that influence the performance of the approach. For example, a facial recognition algorithm may perform poorly when image resolution is low or images are taken in low lighting. Or a speech-to-text system might not be used reliably to provide closed captions for online lectures because it fails to handle technical jargon. The authors should discuss the computational efficiency of the proposed algorithms and how they scale with dataset size. If applicable, the authors should discuss possible limitations of their approach to address problems of privacy and fairness. While the authors might fear that complete honesty about limitations might be used by reviewers as grounds for rejection, a worse outcome might be that reviewers discover limitations that aren t acknowledged in the paper. The authors should use their best judgment and recognize that individual actions in favor of transparency play an important role in developing norms that preserve the integrity of the community. Reviewers will be specifically instructed to not penalize honesty concerning limitations. 3. Theory Assumptions and Proofs Question: For each theoretical result, does the paper provide the full set of assumptions and a complete (and correct) proof? Answer: [Yes] Justification: All the assumptions are given in the main text while the full proofs are provided in the appendices. Guidelines: The answer NA means that the paper does not include theoretical results. All the theorems, formulas, and proofs in the paper should be numbered and crossreferenced. All assumptions should be clearly stated or referenced in the statement of any theorems. The proofs can either appear in the main paper or the supplemental material, but if they appear in the supplemental material, the authors are encouraged to provide a short proof sketch to provide intuition. Inversely, any informal proof provided in the core of the paper should be complemented by formal proofs provided in appendix or supplemental material. Theorems and Lemmas that the proof relies upon should be properly referenced. 4. Experimental Result Reproducibility Question: Does the paper fully disclose all the information needed to reproduce the main experimental results of the paper to the extent that it affects the main claims and/or conclusions of the paper (regardless of whether the code and data are provided or not)? Answer: [Yes] Justification: See Section 5 Guidelines: The answer NA means that the paper does not include experiments. If the paper includes experiments, a No answer to this question will not be perceived well by the reviewers: Making the paper reproducible is important, regardless of whether the code and data are provided or not. If the contribution is a dataset and/or model, the authors should describe the steps taken to make their results reproducible or verifiable. Depending on the contribution, reproducibility can be accomplished in various ways. For example, if the contribution is a novel architecture, describing the architecture fully might suffice, or if the contribution is a specific model and empirical evaluation, it may be necessary to either make it possible for others to replicate the model with the same dataset, or provide access to the model. In general. releasing code and data is often one good way to accomplish this, but reproducibility can also be provided via detailed instructions for how to replicate the results, access to a hosted model (e.g., in the case of a large language model), releasing of a model checkpoint, or other means that are appropriate to the research performed. While Neur IPS does not require releasing code, the conference does require all submissions to provide some reasonable avenue for reproducibility, which may depend on the nature of the contribution. For example (a) If the contribution is primarily a new algorithm, the paper should make it clear how to reproduce that algorithm. (b) If the contribution is primarily a new model architecture, the paper should describe the architecture clearly and fully. (c) If the contribution is a new model (e.g., a large language model), then there should either be a way to access this model for reproducing the results or a way to reproduce the model (e.g., with an open-source dataset or instructions for how to construct the dataset). (d) We recognize that reproducibility may be tricky in some cases, in which case authors are welcome to describe the particular way they provide for reproducibility. In the case of closed-source models, it may be that access to the model is limited in some way (e.g., to registered users), but it should be possible for other researchers to have some path to reproducing or verifying the results. 5. Open access to data and code Question: Does the paper provide open access to the data and code, with sufficient instructions to faithfully reproduce the main experimental results, as described in supplemental material? Answer: [Yes] . Justification: See the supplementary material. Guidelines: The answer NA means that paper does not include experiments requiring code. Please see the Neur IPS code and data submission guidelines (https://nips.cc/ public/guides/Code Submission Policy) for more details. While we encourage the release of code and data, we understand that this might not be possible, so No is an acceptable answer. Papers cannot be rejected simply for not including code, unless this is central to the contribution (e.g., for a new open-source benchmark). The instructions should contain the exact command and environment needed to run to reproduce the results. See the Neur IPS code and data submission guidelines (https: //nips.cc/public/guides/Code Submission Policy) for more details. The authors should provide instructions on data access and preparation, including how to access the raw data, preprocessed data, intermediate data, and generated data, etc. The authors should provide scripts to reproduce all experimental results for the new proposed method and baselines. If only a subset of experiments are reproducible, they should state which ones are omitted from the script and why. At submission time, to preserve anonymity, the authors should release anonymized versions (if applicable). Providing as much information as possible in supplemental material (appended to the paper) is recommended, but including URLs to data and code is permitted. 6. Experimental Setting/Details Question: Does the paper specify all the training and test details (e.g., data splits, hyperparameters, how they were chosen, type of optimizer, etc.) necessary to understand the results? Answer: [Yes] Justification: See Section 5 Guidelines: The answer NA means that the paper does not include experiments. The experimental setting should be presented in the core of the paper to a level of detail that is necessary to appreciate the results and make sense of them. The full details can be provided either with the code, in appendix, or as supplemental material. 7. Experiment Statistical Significance Question: Does the paper report error bars suitably and correctly defined or other appropriate information about the statistical significance of the experiments? Answer: [Yes] Justification: See Section 5 Guidelines: The answer NA means that the paper does not include experiments. The authors should answer "Yes" if the results are accompanied by error bars, confidence intervals, or statistical significance tests, at least for the experiments that support the main claims of the paper. The factors of variability that the error bars are capturing should be clearly stated (for example, train/test split, initialization, random drawing of some parameter, or overall run with given experimental conditions). The method for calculating the error bars should be explained (closed form formula, call to a library function, bootstrap, etc.) The assumptions made should be given (e.g., Normally distributed errors). It should be clear whether the error bar is the standard deviation or the standard error of the mean. It is OK to report 1-sigma error bars, but one should state it. The authors should preferably report a 2-sigma error bar than state that they have a 96% CI, if the hypothesis of Normality of errors is not verified. For asymmetric distributions, the authors should be careful not to show in tables or figures symmetric error bars that would yield results that are out of range (e.g. negative error rates). If error bars are reported in tables or plots, The authors should explain in the text how they were calculated and reference the corresponding figures or tables in the text. 8. Experiments Compute Resources Question: For each experiment, does the paper provide sufficient information on the computer resources (type of compute workers, memory, time of execution) needed to reproduce the experiments? Answer: [Yes] Justification: We mentioned an RTX 3090 computer worker. Guidelines: The answer NA means that the paper does not include experiments. The paper should indicate the type of compute workers CPU or GPU, internal cluster, or cloud provider, including relevant memory and storage. The paper should provide the amount of compute required for each of the individual experimental runs as well as estimate the total compute. The paper should disclose whether the full research project required more compute than the experiments reported in the paper (e.g., preliminary or failed experiments that didn t make it into the paper). 9. Code Of Ethics Question: Does the research conducted in the paper conform, in every respect, with the Neur IPS Code of Ethics https://neurips.cc/public/Ethics Guidelines? Answer: [Yes] Justification: Our paper conform with the Neur IPS Code of Ethics. Guidelines: The answer NA means that the authors have not reviewed the Neur IPS Code of Ethics. If the authors answer No, they should explain the special circumstances that require a deviation from the Code of Ethics. The authors should make sure to preserve anonymity (e.g., if there is a special consideration due to laws or regulations in their jurisdiction). 10. Broader Impacts Question: Does the paper discuss both potential positive societal impacts and negative societal impacts of the work performed? Answer: [NA] Justification: This paper presents work whose goal is to advance the field of Machine Learning. There are many potential societal consequences of our work, none of which are specifically highlighted here. Guidelines: The answer NA means that there is no societal impact of the work performed. If the authors answer NA or No, they should explain why their work has no societal impact or why the paper does not address societal impact. Examples of negative societal impacts include potential malicious or unintended uses (e.g., disinformation, generating fake profiles, surveillance), fairness considerations (e.g., deployment of technologies that could make decisions that unfairly impact specific groups), privacy considerations, and security considerations. The conference expects that many papers will be foundational research and not tied to particular applications, let alone deployments. However, if there is a direct path to any negative applications, the authors should point it out. For example, it is legitimate to point out that an improvement in the quality of generative models could be used to generate deepfakes for disinformation. On the other hand, it is not needed to point out that a generic algorithm for optimizing neural networks could enable people to train models that generate Deepfakes faster. The authors should consider possible harms that could arise when the technology is being used as intended and functioning correctly, harms that could arise when the technology is being used as intended but gives incorrect results, and harms following from (intentional or unintentional) misuse of the technology. If there are negative societal impacts, the authors could also discuss possible mitigation strategies (e.g., gated release of models, providing defenses in addition to attacks, mechanisms for monitoring misuse, mechanisms to monitor how a system learns from feedback over time, improving the efficiency and accessibility of ML). 11. Safeguards Question: Does the paper describe safeguards that have been put in place for responsible release of data or models that have a high risk for misuse (e.g., pretrained language models, image generators, or scraped datasets)? Answer: [NA] Justification: Our paper is a theoretical study. Guidelines: The answer NA means that the paper poses no such risks. Released models that have a high risk for misuse or dual-use should be released with necessary safeguards to allow for controlled use of the model, for example by requiring that users adhere to usage guidelines or restrictions to access the model or implementing safety filters. Datasets that have been scraped from the Internet could pose safety risks. The authors should describe how they avoided releasing unsafe images. We recognize that providing effective safeguards is challenging, and many papers do not require this, but we encourage authors to take this into account and make a best faith effort. 12. Licenses for existing assets Question: Are the creators or original owners of assets (e.g., code, data, models), used in the paper, properly credited and are the license and terms of use explicitly mentioned and properly respected? Answer: [Yes] Justification: See Section 5. Guidelines: The answer NA means that the paper does not use existing assets. The authors should cite the original paper that produced the code package or dataset. The authors should state which version of the asset is used and, if possible, include a URL. The name of the license (e.g., CC-BY 4.0) should be included for each asset. For scraped data from a particular source (e.g., website), the copyright and terms of service of that source should be provided. If assets are released, the license, copyright information, and terms of use in the package should be provided. For popular datasets, paperswithcode.com/datasets has curated licenses for some datasets. Their licensing guide can help determine the license of a dataset. For existing datasets that are re-packaged, both the original license and the license of the derived asset (if it has changed) should be provided. If this information is not available online, the authors are encouraged to reach out to the asset s creators. 13. New Assets Question: Are new assets introduced in the paper well documented and is the documentation provided alongside the assets? Answer: [NA] Justification: Our paper is a theoretical study. Guidelines: The answer NA means that the paper does not release new assets. Researchers should communicate the details of the dataset/code/model as part of their submissions via structured templates. This includes details about training, license, limitations, etc. The paper should discuss whether and how consent was obtained from people whose asset is used. At submission time, remember to anonymize your assets (if applicable). You can either create an anonymized URL or include an anonymized zip file. 14. Crowdsourcing and Research with Human Subjects Question: For crowdsourcing experiments and research with human subjects, does the paper include the full text of instructions given to participants and screenshots, if applicable, as well as details about compensation (if any)? Answer: [NA] Justification: Guidelines: The answer NA means that the paper does not involve crowdsourcing nor research with human subjects. Including this information in the supplemental material is fine, but if the main contribution of the paper involves human subjects, then as much detail as possible should be included in the main paper. According to the Neur IPS Code of Ethics, workers involved in data collection, curation, or other labor should be paid at least the minimum wage in the country of the data collector. 15. Institutional Review Board (IRB) Approvals or Equivalent for Research with Human Subjects Question: Does the paper describe potential risks incurred by study participants, whether such risks were disclosed to the subjects, and whether Institutional Review Board (IRB) approvals (or an equivalent approval/review based on the requirements of your country or institution) were obtained? Answer: [NA] Justification: Guidelines: The answer NA means that the paper does not involve crowdsourcing nor research with human subjects. Depending on the country in which research is conducted, IRB approval (or equivalent) may be required for any human subjects research. If you obtained IRB approval, you should clearly state this in the paper. We recognize that the procedures for this may vary significantly between institutions and locations, and we expect authors to adhere to the Neur IPS Code of Ethics and the guidelines for their institution. For initial submissions, do not include any information that would break anonymity (if applicable), such as the institution conducting the review.