# generalization_bounds_via_conditional_finformation__00fad158.pdf Generalization Bounds via Conditional f-Information Ziqiao Wang School of Computer Science and Technology Tongji University Shanghai, China ziqiaowang@tongji.edu.cn Yongyi Mao School of Electrical Engineering and Computer Science University of Ottawa Ottawa, Canada ymao@uottawa.ca In this work, we introduce novel information-theoretic generalization bounds using the conditional f-information framework, an extension of the traditional conditional mutual information (MI) framework. We provide a generic approach to derive generalization bounds via f-information in the supersample setting, applicable to both bounded and unbounded loss functions. Unlike previous MIbased bounds, our proof strategy does not rely on upper bounding the cumulantgenerating function (CGF) in the variational formula of MI. Instead, we set the CGF or its upper bound to zero by carefully selecting the measurable function invoked in the variational formula. Although some of our techniques are partially inspired by recent advances in the coin-betting framework (e.g., Jang et al. (2023)), our results are independent of any previous findings from regret guarantees of online gambling algorithms. Additionally, our newly derived MI-based bound recovers many previous results and improves our understanding of their potential limitations. Finally, we empirically compare various f-information measures for generalization, demonstrating the improvement of our new bounds over the previous bounds. 1 Introduction Understanding generalization is a longstanding topic of machine learning research. Recently, information-theoretic generalization measures, e.g., mutual information (MI) between the input (i.e. data) and output (i.e. hypothesis) of a learning algorithm, have been proposed by [2 4]. While original MI-based information-theoretic generalization bounds have made significant progress in analyzing the generalization of stochastic gradient-based algorithms in nonconvex learning problems (e.g., deep learning) [5 13], they are found to have several limitations. One of the most severe limitations is their unboundedness, where the MI measure can be infinite while the true generalization error is small [14]. To mitigate this issue, various bound-tightening techniques have been proposed [15, 6, 7]. Among them, [16] introduces a conditional mutual information (CMI) framework, which allows for the derivation of a CMI-based bound that is strictly upper-bounded by a constant. In the CMI framework, an additional ghost sample is introduced alongside the original sample drawn from the unknown data distribution. A Bernoulli random variable sequence is then used to determine the membership of training data from these two samples. Ultimately, the CMI between these Bernoulli random variables and the output hypothesis of the learning algorithm, conditioned on these two samples, characterizes generalization. This setup, known as the supersample setting, ensures the 38th Conference on Neural Information Processing Systems (Neur IPS 2024). boundedness of the CMI bound due to the constant entropy of a Bernoulli random variable. Intuitively, this CMI quantity leaks less information between data and the hypothesis, resulting in tighter bounds compared to the original MI quantity, as theoretically justified in [17]. Furthermore, several studies have aimed to further tighten CMI-based bounds. For example, previous tightening techniques in [15, 6, 7] are also applicable to CMI bounds [17 21]. Notably, another way to tighten the CMI bound is by utilizing variants of the original CMI quantity, such as functional CMI (f-CMI) [22], evaluated CMI (e-CMI) [16, 23], and loss-difference CMI (ld-CMI) [24]. As the output hypothesis is replaced by the predictions, loss pairs, and loss differences of the two samples, these CMI quantities are tighter than the original hypothesis-based CMI due to the data-processing inequality. While most information-theoretic bounds in the supersample setting focus on (conditional) mutual information measures, it is natural to ask whether there is a general way to extend this CMI framework to other statistical distance/divergence measures, such as other f-divergences. Using alternative dependence measures to replace MI in information-theoretic generalization bounds has been studied in several existing works [25 30], with some of them considering the supersample setting. In particular, [26] provides some Wasserstein distance-based and total variation-based bounds in the supersample setting. Furthermore, [29] proposes a general convex analysis-based framework that replaces the input-output MI quantity in [2 4] with any strongly convex function. While [29] itself does not discuss the supersample setting, the further extension in [30] indeed considers invoking the supersample setting to strengthen the bounds. In this work, we present a generic approach to derive generalization bounds based on conditional f-information, a natural extension from mutual information to other f-dvergence-based dependence measures. Our proof strategy is significantly different from the original CMI framework [16] and the convex analysis (or regret analysis) based framework [29, 30]. Specifically, our development starts from the variational representation of f-divergence, which involves the convex conjugate of a convex function used to define the f-divergence. While the previous CMI framework focuses on upper-bounding the cumulant generating function (CGF) of a selected measurable function (which relates to the generalization error), we make a particular choice of such a measurable function, namely the inverse of that convex conjugate function. This choice makes CGF equal to (or upper bounded by) zero, hence eliminated from the variational representation. The remaining task is to lower bound this inverse of the convex conjugate function under a joint distribution. In the case of MI (or KL), the expectation of this inverse function is close to the log wealth quantity used in the coin-betting framework for obtaining concentration inequalities [31, 1, 32]. Indeed, the lower bounding techniques here are inspired by some inequalities used in the coin-betting framework [31, 1, 32], and we extend them to the cases of other f-divergence in the supersample setting. Notably, unlike [30, 1], our conditional f-information generalization bounds do not rely on any existing regret guarantees of online learning algorithms. We discuss the connection with the coin-betting framework in Appendix E. Given that f-divergences all obey the data-processing inequality [33], we focus on using loss difference (ld)-based f-information, an extension of ld-CMI in [24], in this work. Specifically, our main contributions are summarized as follows: 1) In the case where the loss difference between a data pair is bounded, we first provide a novel variational formula (cf. Lemma 3.1) for f-information, enabling us to derive conditional f-information-based generalization bounds; 2) For the KL case, we first provide an oracle CMI bound (cf. Theorem 3.1). This bound recovers many previous CMI bounds, including the square-root bound and fast-rate bounds in low empirical risk settings. It also helps us understand the potential looseness of previous square-root CMI bounds, where some quantities that can vanish as the sample size n increases are simply ignored. Additionally, some novel fast-rate bounds are implied (cf. Corollary 3.1-3.2). Particularly, Corollary 3.2 contains a term in the form of the product of total variation and KL divergence, a similar quantity also appearing in a recent PAC-Bayesian bound [34]; 3) We present several other f-information-based bounds, including the looser measure, χ2-information (cf. Theorem B.2) and tighter measures, squared Hellinger (SH)- information (cf. Theorem 3.2) and Jensen-Shannon (JS)-information (cf. Theorem 3.3). Due to the similarity in expressions, most arguments for our CMI bounds are also applicable to these bounds based on f-information measures; 4) We extend our framework to the unbounded loss difference case, where we provide a refined variational formula for f-information (cf. Lemma 4.1), enabling us to provide a novel f-information-based bound (cf. Theorem 4.1 for the case of KL). The obtained bound is no worse than a previous information-theoretic generalization bound in [25] (adapted to the same supersample setting); 5) Empirical results show that the new bounds in our framework, particularly the squared Hellinger-information bound, outperform previous results. 2 Preliminaries Notation Throughout this paper, we adopt a convention where capitalized letters denote random variables, and their corresponding lowercase letters represent specific realizations. Let PX denote the distribution of a random variable X, and PX|Y represent the conditional distribution of X given Y . When conditioning on a specific realization, we use PX|Y =y or simply PX|y. Additionally, we use EX and EP interchangeably to denote the expectation over X P, whenever it is clear from context. Moreover, EX|Y =y (or EX|y) denotes the expectation over X PX|Y =y. Generalization Error Let Z be the domain of the instances, and let W be the domain of the hypotheses. We denote the unknown distribution of the instances by µ, and let S = {Zi}n i=1 i.i.d µ be the training sample. A learning algorithm A, characterized by a conditional distribution PW |S, takes the training sample S as the input and outputs a hypothesis W W, i.e. A : Zn W. To evaluate the quality of the output hypothesis W, we use a loss function ℓ: W Z R+ 0 . For any hypothesis w, the population risk is defined as Lµ(w) EZ [ℓ(w, Z )], where Z µ is an independent testing instance. In practice, since µ is unknown, we use the empirical risk, which is defined as LS(w) 1 n Pn i=1 ℓ(w, Zi), as a proxy for the population risk of w. The expected generalization error is then defined as Eµ(A) EW [Lµ(W)] EW,S [LS(W)]. Supersample Setting We follow the traditional supersample setting introduced by [16]. Let an n 2 matrix e Z Zn 2 be the supersample, where each entry is drawn i.i.d. from the data distribution µ. We index the columns of e Z by {0, 1}, and denote the ith row of e Z as e Zi with entries ( e Zi,0, e Zi,1). We use U = {Ui}n i=1 Unif({0, 1}n), independent of e Z, to determine the training sample membership from e Z. Specifically, when Ui = 0, e Zi,0 in e Z is included in the training set S, and e Zi,1 is used for testing; Ui = 1 dictates the opposite case. Let U i = 1 Ui, the training sample S is then equivalent to e ZU = { e Zi,Ui}n i=1, and the testing sample is e ZU = { e Zi,U i}n i=1. Additionally, we let Li,0 ℓ(W, e Zi,0) and define Li,1 similarly. Let Li = Li,1 Li,0 be the loss difference in the ith row of e Z. To avoid complicated subscripts, we also use superscripts + and to replace the subscripts 0 and 1, respectively, namely, e Z+ i = e Zi,0, e Z i = e Zi,1, L+ i = Li,0 and L i = Li,1. Furthermore, we define Gi ( 1)Ui Li, i.e. the testing loss minus the training loss at position i. Clearly, 1 n Pn i=1 Gi is an unbiased estimator of Eµ(A). In other words, Eµ(A) = 1 n Pn i=1 E Li,Ui [Gi]. f-Divergence and f-Information The family of f-divergence is defined as follows. Definition 2.1 (f-divergence [33]). Let P and Q be two distributions on Θ, and let ϕ : R+ R be a convex function with ϕ(1) = 0. If P Q, then the f-divergence between P and Q is defined as Dϕ(P||Q) EQ d Q is a Radon-Nikodym derivative. A variational representation for f-divergence, as provided below, has been independently investigated in previous works [35, 25, 36, 37, 33]. Recently, this variational representation has also been applied to PAC-Bayesian generalization theory [38] and domain adaptation theory [39, 40]. Lemma 2.1 ([37, Corollary 3.5]). Let ϕ be the convex conjugate1 of ϕ, and G = {g : Θ dom(ϕ )}. The following, known as variational formula of f-divergence, holds: Dϕ(P||Q) = sup g G Eθ P [g(θ)] inf λ R {Eθ Q [ϕ (g(θ) + λ)] λ} . Following [33, Section 7.8], let Iϕ(X; Y ) Dϕ(PX,Y ||PXPY ) be the f-information, which extends the standard mutual information (MI) defined in terms of KL divergence. We now set θ = ( Li, Ui) and g( Li, Ui) = t Gi in Lemma 2.1, where t R, P = P Li,Ui is the joint distribution of ( Li, Ui) and Q = P Li PUi is the product of the marginal distributions. Consequently, Lemma 2.1 directly implies that 1For a function f : X R { , + }, its convex conjugate is f (y) supx dom(f) x, y f(x). EP [Gi] inf t R 1 Iϕ( Li; Ui) + inf λ R n EQ h ϕ (t( 1)U i Li + λ) i λ o (1) Iϕ( Li; Ui) + EQ h ϕ (t( 1)U i Li) i , (2) where we let λ = 0 in Eq. (2). Notice that if ϕ(x) = x log x + c(x 1) for any constant c, then Iϕ(X; Y ) becomes MI. In this case, the optimal λ = log EQ eg(θ) in Lemma 2.1, and Lemma 2.1 recovers the Donsker and Varadhan s variational formula (cf. Lemma A.1). Here, the second term in Eq. (1) represents the cumulant generating function of ( Li, U i). By analyzing the tail behavior of ( Li, U i) and applying Eq. (1), one can derive the final MI-based generalization bound. For example, if the loss is bounded, Eq. (1) recovers [24, Theorem 3.2] by using Hoeffding s Lemma. On one hand, while Eq. (1) is tighter than Eq. (2), the parameter λ may not have an analytic form for divergences beyond KL and χ2. In this sense, Eq. (2) has its own merits. On the other hand, previous MI-based generalization bounds use concentration results to further upper bound the second term in Eq. (1). While this strategy has been successful for the MI case, for instance by using Hoeffding s Lemma, it may be challenging to obtain similar concentration results for other f-information. In this work, we introduce a novel approach to prove generalization bounds for f-information. 3 Conditional f-Information Bounds: Bounded Loss Difference Case We begin by presenting a general lemma that will serve as a main recipe for obtaining generalization bounds in this section. This lemma introduces a new variational formula for f-divergence, which may be of independent interest beyond the context of generalization. Lemma 3.1. Given random variables X, Y , and a measurable function f for (X, Y ). For every t [b1, b2] R, assume that ϕ is invertible within the range of t f , which we denote by Γt. Let ϕ 1 be the inverse of ϕ on t [b1,b2]Γt, and let Y be an independent copy of Y . If EX,Y [f(X, Y )] = 0, then sup t [b1,b2] EX,Y ϕ 1(tf(X, Y )) Iϕ(X; Y ). Although Lemma 3.1 is a simple and straightforward result derived from Lemma 2.1 by setting g = ϕ 1 (tf), it is quite powerful for deriving f-information-based generalization bounds. Specifically, in the supersample setting, due to the symmetric properties of two columns of e Z, we set X = Li, Y = Ui and f( Li, U i) = ( 1)U i Li (where U i is an independent copy of Ui), the condition in Lemma 3.1, namely EX,Y [f(X, Y )] = 0, is clearly met. Then we have sup t E Li,Ui ϕ 1 (t Gi) Iϕ( Li; Ui). After carefully choosing b1, b2 such that ϕ 1 is well defined, the main focus is to find a lower bound for the function ϕ 1 over a certain interval. We will start with the standard MI case. 3.1 Mutual Information (KL-based) Generalization Bound Consider ϕ(x) = x log x + x 1. Its convex conjugate function is ϕ (y) = ey 1 with the inverse ϕ 1(z) = log(1 + z). Building upon Lemma 3.1, we obtain the following bound: Theorem 3.1. Assume the loss difference ℓ(w, z1) ℓ(w, z2) is bounded in [ 1, 1] for any w W and z1, z2 Z, we have 2 (E [ L2 i ] + |E [Gi]|) I( Li; Ui). We remark that a bounded loss difference is a less restrictive assumption than a strictly bounded loss. For example, if ℓis L-Lipschitz in the second argument, then ℓ(w, z1) ℓ(w, z2) L||z1 z2||. Thus, as long as ||z1 z2|| is bounded, the loss difference is bounded even when ℓitself is unbounded. Additionally, we refer to Theorem 3.1 as the oracle CMI bound because the upper bound itself includes the expected generalization error at position i, E [Gi], which is precisely the quantity we aim to bound. From Theorem 3.1, first, if we simply upper bound the loss difference Li (and Gi) by one, Theorem 3.1 recovers [24, Theorem 3.2] up to a constant. More importantly, Theorem 3.1 indicates that in the case of bounded loss difference or bounded loss, solely using I( Li; Ui) as the generalization measure for algorithm A is insufficient to accurately characterize its generalization error. Specifically, when 2 E L2 i + |E [Gi]| vanishes as n increases, relying on the MI-based measure alone, i.e., p I( Li; Ui), will always result in a slow convergence rate for |Eµ(A)|. While similar observations have been made in recent studies [41 43], where it is found that the sub-Gaussian variance proxy in previous MI bounds may also vanish in some examples, our Theorem 3.1 provides a more straightforward understanding of the potential looseness of O( p I( Li; Ui)). Additionally, further discussion comparing our oracle CMI bound with the MI-based results in [29, 30] is provided in Appendix B.4. To highlight the differences in our proof techniques compared to previous information-theoretic generalization bounds, we provide a proof sketch below. Proof Sketch of Theorem 3.1. Lemma 3.1 gives us I( Li; Ui) supt E log 1+t( 1)Ui Li . Let f(x) = log(1+x) x+ax2 and set a = |E[Gi]| 2E[G2 i] + 1 2. By demonstrating that f(x) 0 holds when 2 and |x| 1 1 2a, we have supt> 1 E [log (1 + t Gi)] supt [ 1 2a ] E t Gi at2G2 i . The supremum is attained when t = E[Gi] 2a E[G2 i] = E[Gi] |E[Gi]|+E[G2 i], which is achievable. Therefore, I( Li; Ui) supt ( 1,+ ) E Li,Ui log 1 + t( 1)Ui Li E2[Gi] 4a E[G2 i], which simplifies to E2[Gi] 2 |E [Gi]| + E G2 i I( Li; Ui). (3) The remaining steps are straightforward. See Appendix B.1 for the complete proof. It is also worth noting that by letting g = ϕ 1 and EQ [g] = 0 in the case of KL divergence, we obtain λ = 0 in Lemma 2.1. As a result, Eq. (2) becomes equivalent to Eq. (1). In this sense, starting from Eq. (2) does not compromise the tightness of Eq. (1). Moreover, the proof provides deeper insights into the tightness of Theorem 3.1, which we will now discuss. Small Empirical Risk Case or Realizable Setting Previously, fast-rate information-theoretic generalization bounds in the realizable setting where the square-root function is removed have been derived by demonstrating that the CGF can be negative [16, 44, 23, 24], or by invoking the channel capacity result of the binary channel [44, 24]. Based on Theorem 3.1, the square-root function can be directly removed in the realizable setting. Specifically, if the learning algorithm A is an interpolating algorithm, i.e., the training loss is always minimized to zero, then Gi [0, 1] always holds. In this case, |E [Gi]| = E [Gi] and E G2 i E [Gi], allowing us to obtain E [Gi] 4I( Li; Ui) from Eq. (3). Consequently, Theorem 3.1 simplifies to Eµ(A) 4 n Pn i=1 I( Li; Ui). Note that for this bound to hold, the condition of zero training loss can be relaxed to the training loss being always no larger than the testing loss. 1.0 0.5 0.0 0.5 1.0 1.5 2.0 x 2( x + 1 1) x x + 1 log(2 e x) 0.75 0.50 0.25 0.00 0.25 0.50 0.75 1.00 x (1.00, 0.69) (-0.68, -1.15) Figure 1: Comparison of different ϕ 1 (Left) and examples of x ax2 for lower-bounding log(1 + x) (Right). Furthermore, to achieve a better constant in the bound, observe that the proof of our Theorem 3.1 utilizes the inequality log(1 + x) x ax2 for |x| 1 1 2a. If x [0, 1] always holds, one can use the inequality log(1 + x) x log 2 instead, where equality holds when the loss is zero-one loss (See Figure 1(Right) for a visualized illustration). As a result, we obtain Eµ(A) Pn i=1 I( Li;Ui) n log 2 , which is tighter than the previous bound and will never be vacuous (i.e. the bound is always smaller than 1) since I( Li; Ui) H(Ui) = log 2. In fact, this bound can exactly characterize the generalization error (i.e., equality holds) if the loss is the zero-one loss, as demonstrated in [24, Theorem 3.3]. New Fast-Rate Bounds Theorem 3.1 not only recovers the previous fast-rate ld-CMI bound in the realizable setting but also introduces new fast-rate bounds. By solving Eq. (3) for |E [Gi]|, we obtain the following bound. Corollary 3.1. Under the conditions of Theorem 3.1, we have 2I( Li; Ui) + q 2E [ L2 i ]I( Li; Ui) . This fast-rate bound has not been proved in [24], yet it resembles [24, Eq. (2)] in structure. Specifically, the single-loss MI term, 2I(L+ i ; Ui) in [24, Eq. (2)], is now substituted with I( Li; Ui), and the empirical risk term, E [LS(W)], is replaced by E L2 i . Here, Li = L i L+ i , and notice that both L+ i and L i follow the same marginal distribution due to the symmetric construction of the supersample, so we can obtain that E L2 i = E (L i L+ i )2 4E (L+ i E L+ i )2 = 4Var(L+ i ). Consequently, Corollary 3.1 further implies the following bound: 2I( Li; Ui) + 2 q 2Var L+ i I( Li; Ui) . (4) Notably, Eq. (4) hints that if the variance of the single loss in the supersample is sufficiently small, the bound will decay at the same rate as in the realizable setting, namely O(I( Li; Ui)), as the second term vanishes. Instead of solving Eq. (3), if we directly upper-bound |E [Gi]| in Theorem 3.1, we can also obtain the following bound from Theorem 3.1. Corollary 3.2. Under the conditions of Theorem 3.1, we have 2E [ L2 i ]I( Li; Ui) + q 2EUi DTV P Li|Ui, P Li I( Li; Ui) . Note that Corollary 3.2 is tighter than Corollary 3.1 by Jensen s inequality and Pinsker s inequality. While we focus on the MI-based or KL-based generalization bound in this section, the inclusion of total variation (TV) in the second term of Corollary 3.2 expands the scope of the bound. Notably, in a recent study by [34], a component of the form DTVDKL is also present in their generalization bounds. Specifically, they derive PAC-Bayesian generalization bounds using the Zhang-Cutkosky Paschalidis (ZCP) divergence, initially explored in [45]. Interestingly, the ZCP divergence can be further upper bounded by O( DTVDKL + DTV). Although it remains uncertain whether the first term in Corollary 3.2 is tighter than DTV or not, we demonstrate that the component DTVDKL can emerge directly in the derivation of KL-based bounds, without using the ZCP divergence. Additionally, note that the term E L2 i in Corollary 3.2 can likewise be replaced by 4Var(L+ i ) term. 3.2 Other f Information-based Generalization Bound Based on Lemma 3.1, it is straightforward to apply similar techniques to many well-known fdivergences or f-information measures to obtain generalization bounds. In this section, we discuss several other f-information-based bounds. Before we study the specific f-divergence, we remark that, in Section 3.1, our focus was on the unconditional mutual information I( Li; Ui). As illustrated in [24], using the data-processing inequality (DPI) and the chain rule, we have I( Li; Ui) I(L+ i , L i ; Ui) I(W; Ui| e Zi). This makes it easy to derive other CMI variantbased bounds. While other f-divergences also satisfy DPI, they may not adhere to the chain rule. Accordingly, for these cases, we use the disintegrated conditional f-information, defined as Iz ϕ(X; Y ) Dϕ(PXY |z||PX|z PY |z) (noting that I(X; Y |Z) = EZ h IZ ϕ (X; Y )) i ), instead of the unconditional quantity. In this context, at least Iϕ( Li; Ui| e Zi) Iϕ(W; Ui| e Zi) still holds, ensuring that the hypothesis-based conditional f-information bound can be directly derived. X 2-based Generalization Bound Consider ϕ(x) = (x 1)2. Its convex conjugate is ϕ (y) = y2 4 + y. For y 2, the inverse of conjugate function ϕ 1(z) = 2( z + 1 1) exists. Since 2( z + 1 1) log(1+z), any lower bound that holds for log(1+z) will also hold for 2( z + 1 1). See Figure 1(Left) for a visualization. In other words, all the bounds in Section 3.1 will also hold when using χ2-divergence. This can also be immediately noticed by the inequality DKL (P||Q) χ2(P||Q) [33]. We defer the formal disintegrated χ2-information bound in Appendix B.7. Squared Hellinger (SH) Distance Generalization Bound Consider ϕ(x) = ( x 1)2, and its convex conjugate is ϕ (y) = y 1 y. For y ( , 1), the inverse function ϕ 1(z) = z 1+z exists for z ( 1, + ). We then have the following oracle conditional squared Hellinger (SH)-information bound. Theorem 3.2. Under the same conditions in Theorem 3.1, we have r 4E h L2 i | e Zi i + 2 E h Gi| e Zi i I e Zi H2( Li; Ui), where I zi H2( Li; Ui) = DH2 P Li,Ui| zi||P Li| zi PUi is the (disintegrated) SH-information. Given that DH2 (P||Q) DTV (P, Q), the TV-based bound can be derived as a corollary from above. Jensen-Shannon (JS) Divergence Generalization Bound Consider ϕ(x) = x log 2x 1+x + log 2 1+x, with the convex conjugate ϕ (y) = log(2 ey). For y < log 2, the inverse function ϕ 1(z) = log(2 e z) exists for z > log 2. This leads to the following oracle JS-information bound. Theorem 3.3. Under the same conditions in Theorem 3.1, we have r 4E h L2 i | e Zi i + E h Gi| e Zi i I e Zi JS( Li; Ui), where I zi JS( Li; Ui) = DJSD P Li,Ui| zi||P Li| zi PUi is the (disintegrated) JS-information. Jeffrey s divergence [46], which is defined as DJeffrey(P||Q) DKL (P||Q) + DKL (Q||P), is an f-divergence with the convex function ϕ(x) = (x 1) log x. Since DJSD (P||Q) 1 4DJeffrey(P||Q) [47], a Jeffrey s divergence-based bound can be derived as a corollary from Theorem 3.3 (and clearly, also from Theorem 3.1 due to the non-negativity of KL divergence). Notably, Theorems 3.2-3.3 share similar expressions with Theorem 3.1, and deriving analogous corollaries to Corollaries 3.1-3.2 is feasible (see Appendix B.7). In the proofs of Theorems 3.2 and Theorem 3.3, we continue to use x ax2 to lower bound the inverse of conjugate functions x 1+x and log(2 e x) for SH-information and JS-information, respectively. However, due to the complexity of handling log(2 e x) in the context of JS-information, we opted for a much rougher selection of the parameter a than in the proof of Theorem 3.1 for simplicity. Consequently, the constants in Theorem 3.3 are not optimal and can be refined with a more finegrained analysis. 4 Extension to Unbounded Loss Difference Previous bounds are typically applicable when dealing with bounded loss differences (albeit not necessarily within the range of [ 1, 1]). This limitation arises from the fact that the function ϕ 1 may fail to exist in Lemma 3.1 when f is unbounded, regardless of any non-trivial adjustments made to the range of t. To overcome this limitation, we now extend our analysis to the case of unbounded loss differences by refining Lemma 3.1. One crucial modification to Lemma 3.1 involves defining the measurable function g = tϕ 1 1|f| C for some C 0, where 1 is the indicator function. We present the following lemma tailored for unbounded functions. Lemma 4.1. Let X be an arbitrary random variable, ε be a Rademacher variable, and t ( b, b). Assume that there exists a constant C 0 such that ϕ is invertible in ( b C, b C). If ϕ (0) = 0, then sup t ( b,b) EX,ε ϕ 1(tεX) 1|X| C Iϕ(X; ε). Note that ϕ (0) = 0 is satisfied by all divergences discussed in Section 3. Armed with Lemma 4.1, our proof strategy hinges on separately bounding the truncated terms E Gi 1|X| C and E Gi 1|X|>C . To achieve this, we utilize Lemma 4.1 along with similar lower-bounding techniques as detailed in Section 3 to bound the first term. For the second term, we invoke Hölder s inequality, drawing inspiration from prior works such as [25, 27]. Before presenting the refined bound for unbounded loss difference, we introduce some additional nota- tions. Define the Lp norm of a random variable X P as ||X||p ( (EP |X|p) 1 p for p [1, ), ess sup |X| for p = , where ess sup |X| inf{M : P(|X| > M) = 0} is the essential supremum. Furthermore, let the f- divergence generated by the convex function ϕα(x) = |x 1|α be Dϕα(P||Q) EQ h d P d Q 1 αi . This divergence, which takes χ2-divergence and total variation as special cases (with α = 2 and α = 1, respectively), and it has been utilized in previous information-theoretic generalization bounds [25, 29, 30]. We denote the corresponding f-information of Dϕα(P||Q) as Iϕα. Now, we are ready to present a MI-based bound, with straightforward extensions to other finformation measures. Theorem 4.1. For constants C 0, q 1, and α, β [1, + ] such that 1 β = 1, denote 2 E L2 i 1| Li| C + C E Gi1| Li| C and ζ2 = (P (| Li| > C)) qβ || Li||qβ, we have |Eµ(A)| inf C,q,α,β 1 n I( Li; Ui) + ζ2 Iϕα( Li; Ui)) . Since Ui is a Bernoulli random variable, according to [25, Lemma 1], we know that Iϕα( Li; Ui) < 1 + 2α 1 for α [1, 2] and remains bounded for other values of α as well. Thus, Theorem 4.1 generally preserves the boundedness property of the original CMI bound unless Li has an infinite Lqβ-norm. Additionally, due to truncation, ζ1 2C for any given C, while ζ2 heavily depends on the tail behavior of Li P Li (or Gi PU i P Li equivalently). We now discuss several common cases. Bounded Loss Notably, Theorem 4.1 also covers the bounded loss cases. For instance, if ℓ is bounded in [0, 1] a.s., setting C = 1 in Theorem 4.1 leads to ζ2 = 0, directly recovering Theorem 3.1 for bounded loss. In fact, the choice of C = 1 might not necessarily be the optimal for ℓ [0, 1]. Particularly, for certain C (0, 1), we let α = 1 and β = , then ζ2 = || Li|| and (Iϕα( Li; Ui))1/α = ITV( Li; Ui). Since DTV DKL by Pinsker s inequality, this alternative choice holds potential for even tighter bounds than Theorem 3.1. Almost Bounded Loss When the loss function exhibits sub-Gaussian or sub-Gamma tail behaviors, the probability P(|Gi| > C) decays rapidly. By carefully selecting the threshold C, the dominance of the first term in the bound can be expected. Assume the loss difference Li is sub-Gaussian with certain variance proxy, say, σ. Setting C = σ and q = 2, we have P(| Li| > C) 2e 1 and || Li||qβ qβσ [48]. Consequently, each term in the summation of Theorem 4.1 simpli- fies to O σ p I( Li; Ui) + σ(2e) 1 α Iϕα( Li; Ui) . However, the relationship between I( Li; Ui) and Iϕα( Li; Ui) is not clear beyond the cases of α = 1 and α = 2 (corresponding to total variation and χ2-information, respectively). Studying the overall behavior of the bound represents an intriguing direction for future research. Furthermore, consider the alternative case with C = 0 and q = 1, where the first term in Theorem 4.1 becomes zero. The second term, using || Li||β βσ for sub-gaussian random variables, becomes O(σ q Iϕα( Li; Ui)). Com- pared to existing MI bounds, e.g., O(σ p I( Li; Ui)), we know from DTV (P, Q) p DKL (P||Q) and DKL (P||Q) χ2(P||Q) that Iϕ1( Li; Ui) p I( Li; Ui) p Iϕ2( Li; Ui), suggesting that some α (1, 2) may yield a tighter bound than MI. Heavy-tailed Loss Heavy-tailed losses, although lacking universally agreed definitions, typically refer to the cases where the moment-generating function (MGF) does not exists (away from 0) [49]. Remarkably, our Theorem 4.1 remains meaningful for such losses since it does not rely on the existence of the MGF of the loss function. Specifically, without any additional knowledge about the tail behavior of Li, we have the following result from Theorem 4.1. Corollary 4.1. Under the conditions in Theorem 4.1, let γ = q 1 qβ , we have 2I( Li; Ui) γ γ+1 || Li||γ 1|| Li||qβ Iϕα( Li; Ui) 1 γ+1 . It s worth noting that as γ 0 (i.e. q 1), we can see that γ 1 γ+1 + γ γ γ+1 1. Consequently, in Corollary 4.1, the bound simplifies to 1 n Pn i=1 || Li||β Iϕα( Li; Ui) . This is an extension of [25, Theorem 3], incorporating individual techniques [6] and loss-difference methods [24] in the supersample setting. Notably, our Corollary 4.1 improves upon [25, Theorem 3], as γ 0 may not necessarily be the optimal choice. Furthermore, it is also intriguing to investigate whether our Corollary 4.1 can recover [29, Corollary 5]. 5 Numerical Results In this section, we conduct an empirical comparison between our novel conditional f-information generalization bounds and several existing information-theoretic generalization bounds. Our experimental setup closely aligns with the settings in [24]. In particular, we undertake two distinct prediction tasks as follows: 1) Linear Classifier on Synthetic Gaussian Dataset, where we train a simple linear classifier using a synthetic Gaussian dataset; 2) CNN and Res Net-50 on Real-World Datasets. The second task follows the same deep learning training protocol as in [22], involves training a 4-layer CNN on a binary MNIST dataset ( 4 vs 9 ) [50] and fine-tuning a Res Net-50 model [51], pretrained on Image Net [52], on CIFAR10 [53]. In both tasks, we assess prediction error as our performance metric. That is, we utilize the zero-one loss function to compute generalization error. Note that during training, we use the cross-entropy loss as a surrogate to enable optimization with gradient-based methods. 0 50 100 150 200 250 300 n Error CMI(Oracle) CSHI(Oracle) CSHI(Var) CSHI(Worst) CJSI(Oracle) ld-CMI Sharpness Binary kl (a) Linear (Two) 50 100 150 200 n 1.2 Error CMI(Oracle) CSHI(Oracle) CSHI(Var) CSHI(Worst) CJSI(Oracle) ld-CMI Sharpness Binary kl (b) Linear (Ten) 75 250 1000 4000 n Error CMI(Oracle) CSHI(Oracle) CSHI(Var) CSHI(Worst) CJSI(Oracle) ld-CMI Sharpness Binary kl (c) CNN (MNIST) 1000 5000 20000 n Error CMI(Oracle) CSHI(Oracle) CSHI(Var) CSHI(Worst) CJSI(Oracle) ld-CMI Sharpness Binary kl (d) Res Net (CIFAR10) 10 20 30 40 Epochs 0.10 Error CMI(Oracle) CSHI(Oracle) CSHI(Var) CSHI(Worst) CJSI(Oracle) ld-CMI Sharpness Binary kl (e) SGLD (MNIST) 2.5 5.0 7.5 10.0 12.5 15.0 Epochs (f) SGLD (CIFAR10) Figure 2: Comparison of bounds on synthetic dataset, MNIST ("4 vs 9"), and CIFAR10. (a-b) Linear classification for two-class and ten-class data. (c-d) Dynamics of generalization bounds as dataset size changes. (e-f) Dynamics of generalization bounds during SGLD training. The comparison of generalization bounds mainly focuses on those presented in Section 3. Specifically, we consider the oracle bounds, given in Theorem 3.1, Theorem 3.2, and Theorem 3.3, which we denote as CMI(Oracle), CSHI(Oracle), and CJSI(Oracle), respectively. Given that the squared Hellinger-information is a tighter measure than MI, and the constants in Theorem 3.2 exhibit less pessimism compared to those in the JS-information bound, we introduce two additional squared Hellinger-information bounds for comparison. The first one, akin to Corollary 3.2, is Eµ(A) 1 n Pn i=1 E r 4E[ L2 i ] + 2E h DTV P Li|Ui, e Zi, P Li| e Zi i I e Zi H2( Li; Ui) (cf. Corol- lary B.1 in Appendix B.7), denoted as CSHI(Var). The second one adopts a more pessimistic choice by replacing E[ L2 i ] with the constant 1, labeled as CSHI(Worst). Additionally, we include three previous information-theoretic generalization bounds as baselines: the original ld-CMI bound in [24, Theorem3.1] (ld-CMI), the sharpness-based single-loss MI bound in [24, Theorem 4.5] (Sharpness), and the binary KL-based CMI bound in [23, Theorem 5] (Binary kl). Further details on experimental settings are available in the Appendix D. The final results are shown in Figure 2. First, we observe that for the linear classifier on the two-class data (Figure 2a), most bounds are close to the exact generalization error, with Sharpness being the tightest. Note that the sharpness-based MI bound in [24, Theorem 4.5] is applicable solely for zero-one loss. As the prediction task becomes more complex (Figures 2b-2f), our squared Hellingerinformation-based bounds are the tightest. Specifically, the squared Hellinger-information-based bound is always tighter than the CMI bound in the oracle type. Notably, CSHI(Var) also outperforms all other f-information-based bounds in these cases, and even the pessimistic CSHI(Worst) bound outperforms them, except for Sharpness, in Figures 2c-2d. Additionally, by comparing CMI(Oracle) and ld-CMI, we see significant potential for improving the original ld-CMI bound. Finally, although the JS-information bound contains relatively pessimistic constants, it still outperforms some MI-based bounds in many cases (e.g., Figures 2c-2e). These observations suggest that considering alternative f-information rather than MI is indeed necessary for studying generalization. 6 Other Related Works and Limitations In addition to the studies mentioned previously, there have been recent developments in informationtheoretic generalization bounds in the supersample setting. For example, [54, 44] propose a leaveone-out (LOO) construction of supersamples, reducing the size of the supersample from 2n to n + 1. Additionally, [55] constructs a neighboring-hypothesis matrix, enabling the derivation of a hypothesis-conditioned CMI bound. The key component in this bound is the product of the new CMI term and an algorithmic stability parameter. Furthermore, significant progress has been made in understanding MI or CMI as generalization measures in stochastic convex optimization (SCO) problems. Specifically, [56 58] all point out that MI or CMI bounds can be non-vanishing in some SCO examples, while the exact generalization error is vanishing. Notably, [58] discovers a CMI-accuracy tradeoff phenomenon in certain scenarios: For the generalization error to be upper bounded by a vanishing parameter, the original hypothesis-based CMI must be lower bounded by the reciprocal of this parameter (or even the reciprocal of its square), indicating that the CMI bound cannot characterize the learnability of such problems. Although this limitation is currently only observed for hypothesis-based CMI, it is anticipated to hold in other variants of CMI, such as ld-CMI. Our work also contributes to understanding the potential looseness of previous CMI generalization bounds. However, the current state of our bounds cannot explain or resolve the limitation presented in [58] in a non-trivial way. Nonetheless, our framework provides some intuition that, as long as a gap exists between ϕ 1 and x ax2 (see Figure 1(Right)), there will always be room for constructing counterexamples that challenge information-theoretic measures, although such examples may be rare. Another limitation of this work is the lack of a high-probability generalization guarantee. There are two potential directions to address this: either by applying similar techniques to the framework in [59], which is the PAC-Bayesian counterpart of the CMI bound, or by combining it with recent information-bottleneck generalization bounds [60, 61]. Acknowledgments and Disclosure of Funding This work is supported partly by an NSERC Discovery grant. The authors would like to thank the anonymous AC and reviewers for their careful reading and valuable suggestions. [1] Kyoungseok Jang, Kwang-Sung Jun, Ilja Kuzborskij, and Francesco Orabona. Tighter pac-bayes bounds through coin-betting. In The Thirty Sixth Annual Conference on Learning Theory, pages 2240 2264. PMLR, 2023. [2] Daniel Russo and James Zou. Controlling bias in adaptive data analysis using information theory. In Artificial Intelligence and Statistics. PMLR, 2016. [3] Daniel Russo and James Zou. How much does your data exploration overfit? controlling bias via information usage. IEEE Transactions on Information Theory, 66(1):302 323, 2019. [4] Aolin Xu and Maxim Raginsky. Information-theoretic analysis of generalization capability of learning algorithms. Advances in Neural Information Processing Systems, 2017. [5] Ankit Pensia, Varun Jog, and Po-Ling Loh. Generalization error bounds for noisy, iterative algorithms. In 2018 IEEE International Symposium on Information Theory (ISIT). IEEE, 2018. [6] Yuheng Bu, Shaofeng Zou, and Venugopal V Veeravalli. Tightening mutual information based bounds on generalization error. In 2019 IEEE International Symposium on Information Theory (ISIT), pages 587 591. IEEE, 2019. [7] Jeffrey Negrea, Mahdi Haghifam, Gintare Karolina Dziugaite, Ashish Khisti, and Daniel M Roy. Information-theoretic generalization bounds for sgld via data-dependent estimates. Advances in Neural Information Processing Systems, 2019. [8] Hao Wang, Yizhe Huang, Rui Gao, and Flavio Calmon. Analyzing the generalization capability of sgld using properties of gaussian channels. Advances in Neural Information Processing Systems, 34:24222 24234, 2021. [9] Bohan Wang, Huishuai Zhang, Jieyu Zhang, Qi Meng, Wei Chen, and Tie-Yan Liu. Optimizing information-theoretical generalization bound via anisotropic noise of sgld. Advances in Neural Information Processing Systems, 2021. [10] Gergely Neu, Gintare Karolina Dziugaite, Mahdi Haghifam, and Daniel M Roy. Informationtheoretic generalization bounds for stochastic gradient descent. In Conference on Learning Theory. PMLR, 2021. [11] Ziqiao Wang and Yongyi Mao. On the generalization of models trained with SGD: Informationtheoretic bounds and implications. In International Conference on Learning Representations, 2022. [12] Ziqiao Wang and Yongyi Mao. Two facets of sde under an information-theoretic lens: Generalization of sgd via training trajectories and via terminal states. ar Xiv preprint ar Xiv:2211.10691, 2022. [13] Futoshi Futami and Masahiro Fujisawa. Time-independent information-theoretic generalization bounds for sgld. Advances in Neural Information Processing Systems, 36, 2024. [14] Raef Bassily, Shay Moran, Ido Nachum, Jonathan Shafer, and Amir Yehudayoff. Learners that use little information. In Algorithmic Learning Theory. PMLR, 2018. [15] Amir Asadi, Emmanuel Abbe, and Sergio Verdú. Chaining mutual information and tightening generalization bounds. Advances in Neural Information Processing Systems, 31, 2018. [16] Thomas Steinke and Lydia Zakynthinou. Reasoning about generalization via conditional mutual information. In Conference on Learning Theory. PMLR, 2020. [17] Mahdi Haghifam, Jeffrey Negrea, Ashish Khisti, Daniel M Roy, and Gintare Karolina Dziugaite. Sharpened generalization bounds based on conditional mutual information and an application to noisy, iterative algorithms. Advances in Neural Information Processing Systems, 2020. [18] Hassan Hafez-Kolahi, Zeinab Golgooni, Shohreh Kasaei, and Mahdieh Soleymani. Conditioning and processing: Techniques to improve information-theoretic generalization bounds. Advances in Neural Information Processing Systems, 33:16457 16467, 2020. [19] Borja Rodríguez-Gálvez, Germán Bassi, Ragnar Thobaben, and Mikael Skoglund. On random subset generalization error bounds and the stochastic gradient langevin dynamics algorithm. In 2020 IEEE Information Theory Workshop (ITW), pages 1 5. IEEE, 2021. [20] Ruida Zhou, Chao Tian, and Tie Liu. Individually conditional individual mutual information bound on generalization error. IEEE Transactions on Information Theory, 68(5):3304 3316, 2022. [21] Ruida Zhou, Chao Tian, and Tie Liu. Stochastic chaining and strengthened information-theoretic generalization bounds. In 2022 IEEE International Symposium on Information Theory (ISIT). IEEE, 2022. [22] Hrayr Harutyunyan, Maxim Raginsky, Greg Ver Steeg, and Aram Galstyan. Informationtheoretic generalization bounds for black-box learning algorithms. In Advances in Neural Information Processing Systems, 2021. [23] Fredrik Hellström and Giuseppe Durisi. A new family of generalization bounds using samplewise evaluated CMI. In Advances in Neural Information Processing Systems, 2022. [24] Ziqiao Wang and Yongyi Mao. Tighter information-theoretic generalization bounds from supersamples. In International Conference on Machine Learning. PMLR, 2023. [25] Jiantao Jiao, Yanjun Han, and Tsachy Weissman. Dependence measures bounding the exploration bias for general measurements. In 2017 IEEE International Symposium on Information Theory (ISIT), pages 1475 1479. IEEE, 2017. [26] Borja Rodríguez Gálvez, Germán Bassi, Ragnar Thobaben, and Mikael Skoglund. Tighter expected generalization error bounds via wasserstein distance. Advances in Neural Information Processing Systems, 34, 2021. [27] Amedeo Roberto Esposito, Michael Gastpar, and Ibrahim Issa. Robust generalization via αmutual information. In International Zurich Seminar on Information and Communication (IZS 2020), page 96, 2020. [28] Amedeo Roberto Esposito and Michael Gastpar. From generalisation error to transportation-cost inequalities and back. In 2022 IEEE International Symposium on Information Theory (ISIT), pages 294 299. IEEE, 2022. [29] Gábor Lugosi and Gergely Neu. Generalization bounds via convex analysis. In Conference on Learning Theory, pages 3524 3546. PMLR, 2022. [30] Gábor Lugosi and Gergely Neu. Online-to-pac conversions: Generalization bounds via regret analysis. ar Xiv preprint ar Xiv:2305.19674, 2023. [31] Kwang-Sung Jun and Francesco Orabona. Parameter-free online convex optimization with sub-exponential noise. In Conference on learning theory, pages 1802 1823. PMLR, 2019. [32] Francesco Orabona and Kwang-Sung Jun. Tight concentrations and confidence sequences from the regret of universal portfolio. IEEE Transactions on Information Theory, 70(1):436 455, 2024. [33] Yury Polyanskiy and Yihong Wu. Information Theory: From Coding to Learning. Cambridge university press, 2023. [34] Ilja Kuzborskij, Kwang-Sung Jun, Yulian Wu, Kyoungseok Jang, and Francesco Orabona. Better-than-kl pac-bayes bounds. ar Xiv preprint ar Xiv:2402.09201, 2024. [35] Aharon Ben-Tal and Marc Teboulle. An old-new concept of convex risk measures: The optimized certainty equivalent. Mathematical Finance, 17(3):449 476, 2007. [36] Jeremiah Birrell, Markos A Katsoulakis, and Yannis Pantazis. Optimizing variational representations of divergences and accelerating their statistical estimation. IEEE Transactions on Information Theory, 68(7):4553 4572, 2022. [37] Rohit Agrawal and Thibaut Horel. Optimal bounds between f-divergences and integral probability metrics. In International Conference on Machine Learning, pages 115 124. PMLR, 2020. [38] Paul Viallard, Maxime Haddouche, Umut Sim sekli, and Benjamin Guedj. Tighter generalisation bounds via interpolation. ar Xiv preprint ar Xiv:2402.05101, 2024. [39] Ziqiao Wang and Yongyi Mao. On f-divergence principled domain adaptation: An improved framework. ar Xiv preprint ar Xiv:2402.01887, 2024. [40] Wenliang Liu, Guanding Yu, Lele Wang, and Renjie Liao. An information-theoretic framework for out-of-distribution generalization. ar Xiv preprint ar Xiv:2403.19895, 2024. [41] Xuetong Wu, Jonathan H Manton, Uwe Aickelin, and Jingge Zhu. Fast rate generalization error bounds: Variations on a theme. In 2022 IEEE Information Theory Workshop (ITW), pages 43 48. IEEE, 2022. [42] Xuetong Wu, Jonathan H Manton, Uwe Aickelin, and Jingge Zhu. On the tightness of information-theoretic bounds on generalization error of learning algorithms. ar Xiv preprint ar Xiv:2303.14658, 2023. [43] Ruida Zhou, Chao Tian, and Tie Liu. Exactly tight information-theoretic generalization error bound for the quadratic gaussian problem. 2023 IEEE International Symposium on Information Theory (ISIT), pages 903 908, 2023. [44] Mahdi Haghifam, Shay Moran, Daniel M Roy, and Gintare Karolina Dziugiate. Understanding generalization via leave-one-out conditional mutual information. In 2022 IEEE International Symposium on Information Theory (ISIT), pages 2487 2492. IEEE, 2022. [45] Zhiyu Zhang, Ashok Cutkosky, and Yannis Paschalidis. Optimal comparator adaptive online learning with switching cost. Advances in Neural Information Processing Systems, 35:23936 23950, 2022. [46] Harold Jeffreys. An invariant form for the prior probability in estimation problems. Proceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences, 186(1007): 453 461, 1946. [47] Gavin E. Crooks. Inequalities between the jenson-shannon and jeffreys divergences. In Tech. Note 004, 2008. [48] Roman Vershynin. High-dimensional probability: An introduction with applications in data science, volume 47. Cambridge university press, 2018. [49] Fredrik Hellström, Giuseppe Durisi, Benjamin Guedj, and Maxim Raginsky. Generalization bounds: Perspectives from information theory and pac-bayes. ar Xiv preprint ar Xiv:2309.04381, 2023. [50] Yann Le Cun, Corinna Cortes, and CJ Burges. Mnist handwritten digit database. ATT Labs [Online]. Available: http://yann.lecun.com/exdb/mnist, 2, 2010. [51] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 770 778, 2016. [52] Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. Imagenet: A largescale hierarchical image database. In 2009 IEEE conference on computer vision and pattern recognition, pages 248 255, 2009. [53] Alex Krizhevsky. Learning multiple layers of features from tiny images. Technical report, University of Toronto, 2009. [54] Mohamad Rida Rammal, Alessandro Achille, Aditya Golatkar, Suhas Diggavi, and Stefano Soatto. On leave-one-out conditional mutual information for generalization. In Advances in Neural Information Processing Systems, 2022. [55] Ziqiao Wang and Yongyi Mao. Sample-conditioned hypothesis stability sharpens informationtheoretic generalization bounds. In Thirty-seventh Conference on Neural Information Processing Systems, 2023. [56] Mahdi Haghifam, Borja Rodríguez-Gálvez, Ragnar Thobaben, Mikael Skoglund, Daniel M Roy, and Gintare Karolina Dziugaite. Limitations of information-theoretic generalization bounds for gradient descent methods in stochastic convex optimization. In International Conference on Algorithmic Learning Theory, pages 663 706. PMLR, 2023. [57] Roi Livni. Information theoretic lower bounds for information theoretic upper bounds. ar Xiv preprint ar Xiv:2302.04925, 2023. [58] Idan Attias, Gintare Karolina Dziugaite, Mahdi Haghifam, Roi Livni, and Daniel M. Roy. Information complexity of stochastic convex optimization: Applications to generalization, memorization, and tracing. In Forty-first International Conference on Machine Learning, 2024. [59] Peter Grunwald, Thomas Steinke, and Lydia Zakynthinou. Pac-bayes, mac-bayes and conditional mutual information: Fast rate bounds that handle general vc classes. In Conference on Learning Theory. PMLR, 2021. [60] Kenji Kawaguchi, Zhun Deng, Xu Ji, and Jiaoyang Huang. How does information bottleneck help deep learning? In International Conference on Machine Learning, pages 16049 16096. PMLR, 2023. [61] Yuxin Dong, Tieliang Gong, Hong Chen, Shujian Yu, and Chen Li. Rethinking informationtheoretic generalization: Loss entropy induced PAC bounds. In The Twelfth International Conference on Learning Representations, 2024. [62] Mehryar Mohri, Afshin Rostamizadeh, and Ameet Talwalkar. Foundations of machine learning. MIT press, 2018. [63] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12:2825 2830, 2011. [64] Francesco Orabona and Kwang-Sung Jun. Tight concentrations and confidence sequences from the regret of universal portfolio. IEEE Transactions on Information Theory, 2023. A Technical Lemmas Lemma A.1 (Donsker and Varadhan s variational formula). Let Q, P be probability measures on Θ, for any bounded measurable function f : Θ R, we have DKL(Q||P) = supf Eθ Q [f(θ)] log Eθ P [exp f(θ)]. Lemma A.2. Let P and Q be two probability measures on the same metric space X. Let f be some measurable function associated with X. The total variation distance between P and Q can be written as DTV (P, Q) = 1 M sup ||f|| M |EP [f(X)] EQ [f(X)]| . Lemma A.3. The following inequalities hold: log(1 + x) x ax2 for a 1 x 1 + x x ax2 for a 1 and x 1 log(2 e x) x ax2 for a 4 and x [ 1 Proof. We prove these inequalities separately. We first prove Eq. (5) We analyze the function f(x) = log(1 + x) x + ax2. By computing the first derivative f (x): f (x) = 1 1 + x 1 + 2ax = x(2a 1 + 2ax) Let f (x) = 0, we have x(2a 1 + 2ax) = 0, which gives two critical points: x = 0 and x = 1 2a Note that x = 1 2a 2a is within the interval 1 2a . Then computing the second derivative f (x): f (x) = 1 (1 + x)2 + 2a. 2 and 1 < x < 1, we have f (x) 0, indicating that f(x) is either concave upwards or linear at these critical points. It is easy to check that the minimum value f(0) = 0, so f(x) 0 in this interval. Hence, log(1 + x) x ax2 holds for a 1 We then prove Eq. (6) We analyze the function f(x) = x 1+x x + ax2. By simplifying this function, we have: f(x) = x2(a 1 + ax) Notice that a 1 0 and 1 a ax a 1, then it is easy to see that the numerator x2(a 1+ax) is always non-negative for x 1 a and a 1. In addition, the denominator 1 + x is always positive for x 1 a . Therefore, f(x) = x2((a 1)+ax) Consequently, we have shown that x 1+x x ax2 for a 1 and x 1 We then prove Eq. (7) We analyze the function f(x) = log(2 e x) x + ax2. By taking its derivative, we have f (x) = 1 2ex 1 1 + 2ax. We now demonstrate that the function f (x) > 0 for x 0, 1 2 and f (x) 0 for x 1 The second derivative of f(x) is f (x) = 2ex (2ex 1)2 + 2a. Let t = 2ex, since x [ 1 2], we know that t [2e 1 2 , 2e 1 2 ]. Hence, we reformulate f (x) as f (t) = t (t 1)2 + 2a = 1 t + 1 Notice that t + 1 t is monotonically increasing when t > 1, so f (t) is monotonically increasing in t [2e 1 2 , 2e 1 2 ]. Consequently, f (t) f (t = 2e 1 2 ) 26.7 + 2a. Additionally, it is clear that f (x = 0) = f (t = 2e0) = 2 + 2a > 0 for a 4. WWe now consider two cases: Case 1. If a > 13.35, then f (t) f (t = 2e 1 2 ) 0. Hence, f (x) is monotonically increasing in x [ 1 2]. Since f (x = 0) = 0, we demonstrate that f (x) > 0 for x 0, 1 2 and f (x) 0 for x 1 Case 2. If a 13.35, then there exists an x0 such that f (x0) 0. Recall that f (x = 0) = f (t = 2e0) = 2 + 2a > 0 and f (x) is monotonically increasing in x [ 1 2], we know that such x0 [ 1 2, 0] and f (x) 0 for all x 0, 1 2 . Thus, f (x) first decreases in x [ 1 2, x0] then increases in x [x0, 1 Since f (x = 1 2 1 a 3.69 a < 0 for a 4, we conclude that f (x) > 0 2 and f (x) 0 for x 1 Consequently, we know that f(x) decreases in x [ 1 2, 0] and increases in [0, 1 2]. By checking f(x) f(0) = 0, the inequality log(2 e x) x ax2 holds for a 4 and x 1 This completes the proof. B Omitted Proofs in Section 3 and Additional Results B.1 Proof of Theorem 3.1 Proof. Lemma 3.1 indicates that I( Li; Ui) sup t ( 1,+ ) E Li,Ui log 1 + t( 1)Ui Li . Recall that Gi = ( 1)Ui Li, and let a = |E[Gi]| 2E[G2 i] + 1 2. Since a 1 2a 0, we can apply Eq. (5) in Lemma A.3 to have f(x) = log(1 + x) x + ax2 0 for x [ 1 Hence, by Gi [ 1, 1], we restrict t [ 1 2a 1, 1 1 2a] and let x = t Gi to have the following inequality, sup t> 1 E [log (1 + t Gi)] sup t [ 1 2a ] E t Gi at2G2 i = E2[Gi] 4a E [G2 i ], (8) where the last equality holds when t = E[Gi] 2a E[G2 i]. We now show that t can indeed be reached within t [ 1 Substituting a = |E[Gi]| 2E[G2 i] + 1 2, we can see that t = E[Gi] |E[Gi]|+E[G2 i]. In addition, notice that 2a = |E [Gi]| |E [Gi]| + E [G2 i ] and 1 2a 1 = |E [Gi]| |E [Gi]| + E [G2 i ]. Clearly, either E [Gi] = |E [Gi]| or E [Gi] = |E [Gi]| holds. Consequently, t can be achieved at one of the endpoints of [ 1 I( Li; Ui) sup t ( 1,+ ) E Li,Ui log 1 + t( 1)Ui Li E2[Gi] 4a E [G2 i ], which is equivalent to E2[Gi] 4a E G2 i I( Li; Ui) =2 |E [Gi]| + E L2 i I( Li; Ui). (9) Then, by Jensen s inequality, i=1 |E Li,Ui [Gi]| 2 (|E [Gi]| + E [ L2 i ]) I( Li; Ui), where the last inequality is by Eq. (9). This completes the proof. B.2 Proof of Corollary 3.1 Proof. Recall Eq. (3) (or Eq. (9) equivalently), E2[Gi] 2 |E [Gi]| + E G2 i I( Li; Ui). Notice that |E [Gi]| 0, we now solve the inequality above for |E [Gi]|. Let A1 = E G2 i and A2 = I( Li; Ui), then by the quadratic-root formula, the solution to E2[Gi] 2A2 |E [Gi]| 2A1A2 0 is 0 |E [Gi]| 2A2 + p 4A2 2 + 8A1A2 2 = A2 + q A2 2 + 2A1A2. Therefore, we have |E [Gi]| I( Li; Ui) + q (I( Li; Ui))2 + 2E [G2 i ]I( Li; Ui) 2I( Li; Ui) + q 2E [G2 i ]I( Li; Ui), where the second inequality is by x + y x + y. The remaining steps are routine, which will complete the proof. B.3 Proof of Corollary 3.2 Proof. Based on Theorem 3.1, by x + y x + y, we have 2E [G2 i ]I( Li; Ui) + p 2 |E [Gi]| I( Li; Ui) . (10) Let G i = ( 1)Ui L i, where L i is an independent copy of Li. Notice that E [G i] = 0. Then, |E Li,Ui [Gi]| = E Li,Ui [Gi] E L i,Ui [G i] EUi E Li|Ui [Gi] E L i [G i] , where the last inequality is by Jensen s inequality. Notice that Gi 1, by the dual form of total variation (cf. Lemma A.2), we have EUi E Li|Ui [Gi] E L i [G i] EUi DTV P Li|Ui, P Li . Plugging the above into Eq. (10) will complete the proof. B.4 Comparison with Online-to-PAC Generalization Framework We now discuss the comparison with [29, 30], consider the case of the KL or mutual information. The only explicit expected generalization bound provided in [30] is their Corollary 21, which recovers the square-root bound of O( p I(W; S)/n). This bound is clearly weaker than our fast-rate bound in our Corollary 3.1-3.2, due to the omission of vanishing terms in our oracle bound in Theorem 3.1. In fact, a more refined MI bound is presented in the earlier version of [30], namely [29, Corollary 4]. This bound takes the form 4EZ ℓ( , Z) EZ[ℓ( , Z)] 2 I(W; S) which can indeed be derived from [30] due to the generality of their framework. Recall that our Theorem 3.1 gives the bound (2E[ L2 i ] + 2|E[Gi]|)I( Li; Ui). Notably, because we apply individual and loss-difference techniques, our averaged MI term is always tighter than that of [29, 30], as 1 I( Li; Ui) q n generally holds. To fairly compare our framework with theirs, we ignore the difference between MI terms and only focus on the novel components of each bound, specifically EZ ℓ( , Z) EZ[ℓ( , Z)] 2 in their work and E[ L2 i ] + |E[Gi]| in ours, let s consider the following simple example: Example 1. Let W [ 1, 1], and let the input space be Z = {1, 1}. Assume µ = Unif(Z), i.e. Z is a Rademacher variable. Consider a convex and 1-Lipschitz loss function ℓ(w, z) = w z. Under the ERM algorithm, W = A(S) = 1 n Pn i=1 Zi. Notice that for any w W, EZ[ℓ(w, Z)] = 1 2( w (1 1)) = 0, hence EZ ℓ( , Z) EZ[ℓ( , Z)] 2 = EZ ℓ( , Z) 2 = 1. In contrast, since Li [ 1, 1] in this case, E[ L2 i ] E[| Li|] and |E[Gi]| E[| Li|], we have E[ L2 i ] + |E[Gi]| 2E[| Li|]. Moreover, E[| Li|] = E[|W (Z+ i Z i )|] 2 n E[| Pn i=1 Zi|] 2 n, where the last step is by the Khintchine-Kahane inequality [62, Theorem D.9]. Thus, in this example, EZ ℓ( , Z) EZ[ℓ( , Z)] 2 = 1, while our bound E[ L2 i ] + |E[Gi]| 2E[| Li|] O( 1 n) shows a tighter convergence rate. Consequently, even without using the individual trick and loss-difference technique, our bound (Theorem 3.1) can still be tighter than [29, 30] in terms of convergence rate in this example. This suggests that, MI-based bounds in [29, 30] can still encounter limitations (e.g., slow convergence rate), as with previous MI-based bounds. Finally, to clarify the comparison, we only demonstrate that our oracle CMI bound could be tighter. It is worth noting that the unpublished version of [30] represents an initial exploration of their online-to-PAC generalization framework. As such, the results in their current version may primarily aim to recover previous findings, and their framework likely has room for further advancements. B.5 Proof of Theorem 3.2 Proof. Lemma 3.1 indicates that I z H2( Li; Ui) sup t ( ,1) E Li,Ui| zi t( 1)Ui Li 1 + t( 1)Ui Li Let a = |E[Gi| zi]| 2E[G2 i | zi] + 1. Consider the function f(x) = x 1+x x + ax2. Notice that a 1 and a 1. By Eq. (6) in Lemma A.3, we know that when x [ 1 a], f(x) 0. Hence, recall that Gi [ 1, 1], we restrict t [ 1 a] to have the following inequality, sup t<1 E t Gi 1 + t Gi a ] E t Gi at2G2 i | zi = E2[Gi| zi] 4a E [G2 i | zi], (11) where the last equality holds when t = E[Gi| zi] 2a E[G2 i | zi]. We now show that t can indeed be reached within t [ 1 Substituting a, we can see that t = E [Gi| zi] |E [Gi| zi]| + 2E [G2 i | zi]. In addition, 1 1 a = |E[Gi| zi]| |E[Gi| zi]|+2E[G2 i | zi] and 1 a 1 = |E[Gi| zi]| |E[Gi| zi]|+2E[G2 i | zi]. Clearly, either E [Gi| zi] = |E [Gi| zi]| or E [Gi| zi] = |E [Gi| zi]| holds. Consequently, t can be achieved in [ 1 I z H2( Li; Ui) sup t ( ,1) E Li,Ui| zi t( 1)Ui Li 1 + t( 1)Ui Li E2[Gi| zi] 4a E [G2 i | zi], which is equivalent to |E[Gi| zi]| q 4a E [G2 i | zi]I z H2( Li; Ui) = q (2 |E [Gi| zi]| + 4E [G2 i | zi]) I z H2( Li; Ui). (12) Then, by Jensen s inequality, E Li,Ui, e Zi [Gi] 1 E Li,Ui| e Zi [Gi] . Plugging Eq. (12) into the above will complete the proof. B.6 Proof of Theorem 3.3 Proof. Lemma 3.1 indicates that I z JS( Li; Ui) sup t> log 2 E Li,Ui| zi h log(2 e t( 1)Ui Li)| zi i . Let a = |E[Gi| zi]| E[G2 i | zi] + 4. Consider the function f(x) = log(2 e x) x + ax2. Notice that a 4, and by Eq. (7) in Lemma A.3, we know that when x [ 1 2], f(x) 0. Hence, recall that Gi [ 1, 1], we restrict t [ 1 2] to have the following inequality, sup t> log 2 E log(2 e t Gi)| zi sup t [ 1 2 ] E t Gi at2G2 i | zi = E2[Gi| zi] 4a E [G2 i | zi], (13) as the same with the previous proofs, the last equality holds when t = E[Gi| zi] 2a E[G2 i | zi]. We then check the conditions that t [ 1 2 E [Gi| zi] 2a E [G2 i | zi] 1 2 a |E [Gi| zi]| E [G2 i | zi] , which is clearly satisfied by a = |E[Gi| zi]| E[G2 i | zi] + 4. Consequently, t can be achieved in [ 1 I z JS( Li; Ui) sup t> log 2 E Li,Ui| zi h log(2 e t( 1)Ui Li)| zi i E2[Gi| zi] 4a E [G2 i | zi]. With additional arrangements, we have E[Gi| zi] q 4a E [G2 i | zi]I z JS( Li; Ui) = q (4 |E [Gi| zi]| + 16E [G2 i | zi]) I z JS( Li; Ui). (14) Then, by Jensen s inequality, E Li,Ui, e Zi [Gi] 1 E Li,Ui| e Zi [Gi] . Plugging Eq. (14) into the above will complete the proof. B.7 Additional f Information Disintegrated Bounds The following bounds can be derived by first employing a similar approach as in the proof of Theorem 3.1 to upper bound E Li,Ui| e Zi [Gi]. Then, we incorporate this individual bound into n Pn i=1 E Li,Ui, e Zi [Gi] 1 n Pn i=1 E e Zi E Li,Ui| e Zi [Gi] . Theorem B.1. Under the same conditions in Theorem 3.1, we have 2 E h L2 i | e Zi i + E h Gi| e Zi i I e Zi( Li; Ui). Theorem B.2. Under the same conditions in Theorem 3.1, we have 2 E h L2 i | e Zi i + E h Gi| e Zi i I e Zi χ2 ( Li; Ui), where I zi χ2( Li; Ui) = Dχ2 P Li,Ui| zi||P Li| zi PUi is the (disintegrated) χ2-information. The following bound is a corollary from Theorem 3.2, which is used in our experiments in Section 5. Corollary B.1. Under the same conditions in Theorem 3.1, we have r 4E h L2 i | e Zi i + 2EUi h DTV P Li|Ui, e Zi, P Li| e Zi i I e Zi H2( Li; Ui). The proof is nearly the same to Corollary 3.2 except that we do not apply x + y x + y to unpack the terms. C Omitted Proof in Section 4 C.1 Proof of Lemma 4.1 Proof. By the variational representation of f-divergence, we have Iϕ(X; ε) sup g EX,ε [g(X, ε)] EX,ε [ϕ (g(X, ε ))] sup t EX,ε ϕ 1(tεX) 1|X| C EX,ε ϕ ϕ 1(tε X) 1|X| C . For the second term above, we have EX,ε ϕ ϕ 1(tε X) 1|X| C = Z Ξ tε Xd PX,ε + ϕ (0) = Z 2 d PX = 0, where Ξ = {x X, ε { 1, 1}| |x| C}. Putting everything together will conclude the proof. C.2 Proof of Theorem 4.1 Proof. Since ( 1)Ui is a Rademacher variable and ϕ (0) = e0 1 = 0 for KL divergence, we can apply Lemma 4.1 first then follow the similar developments in Theorem 3.1 by controlling t Gi [ 1, 1]. In particular, for any C 0, I( Li; Ui) sup t [ 1/C,1/C] E Li,Ui log(1 + t Gi) 1|Gi| C sup t [ 1 2a 2a C , 2a 1 2a C ] E Li,Ui (t Gi at2G2 i ) 1|Gi| C = E2[Gi1|Gi| C] 4a E G2 i 1|Gi| C , where a = C E h Gi1|Gi| C i 2E h G2 i 1|Gi| C i + 1 2. Notice that t = E h Gi1|Gi| C i 2a E h G2 i 1|Gi| C i = E h Gi1|Gi| C i CE h Gi1|Gi| C i +E h G2 i 1|Gi| C i and it is easy to verify t [ 1 2a 2a C , 2a 1 2a C ], so the last equality can be achieved. Consequently, E Gi1|Gi| C q 2(C E Gi1|Gi| C + E G2 i 1|Gi| C )I( Li; Ui). (15) Furthermore, let P = P Li,Ui and Q = P Li PU i E Gi1|Gi|>C = Z Gi1|Gi|>C d P d Qd Q Z Gi1|Gi|>C d Q 1 d Q , where we use the fact that E Li,U i Gi1| Li|>C = E Li h Li1| Li|>C Li1| Li|>C i Then, by using Hölder s inequality twice, E Gi1|Gi|>C Z |Gi|β 1|Gi|>Cd Q 1 d Q 1 α d Q 1 Z 1| Li|>Cd Q q 1 qβ Z | Li|qβ d Q 1 qβ (Iϕα( Li; Ui))1/α = (P (| Li| > C)) qβ || Li||qβ (Iϕα( Li; Ui))1/α . (16) Moreover, notice that i=1 |E [Gi]| = 1 E Gi1|Gi|>C + Gi1|Gi| C E Gi1|Gi|>C + E Gi1|Gi| C . Plugging Eq. (15) and Eq. (16) into the above will complete the proof. C.3 Proof of Corollary 4.1 Proof. First, by Markov s inequality, we have γ || Li||qβ = || Li||γ 1|| Li||qβ In addition, recall that ζ1 2I( Li; Ui) and A2 = || Li||γ 1|| Li||qβ Iϕα( Li; Ui). Then, define f(C) = A1C + A2 Cγ . Solving min C>0 f(C), we have Plugging C into f(C), we have f(C ) = γ 1 γ+1 + γ From the proof of Theorem 4.1, we notice that E Gi1|Gi|>C + E Gi1|Gi| C f(C ). Substituting A1 and A2 into the expression of f(C ), we will finally obtain 2I( Li; Ui) γ γ+1 || Li||γ 1|| Li||qβ Iϕα( Li; Ui) 1 γ+1 . This completes the proof. D Experimental Details Our experimental setup largely follows [24], and the code of our experiments can be found at https://github.com/Ziqiao Wang Geothe/Conditional-f-Information-Bound. Linear Classifier on Synthetic Gaussian Dataset In this experiment, similar to [24], we use the popular Python package scikit-learn [63] to generate synthetic Gaussian data. Each feature of data is drawn independently from a Gaussian distribution, ensuring that all features are informative for the class labels. Specifically, we set the dimension of feature vector to 5 and create different classes of points, which are normally distributed. We train the linear classifier using full-batch gradient descent with a fixed learning rate of 0.01 for a total of 300 epochs, employing early stopping when the training error falls below a threshold (e.g., < 0.5%). To ensure robustness and statistical significance, we generate 50 different supersamples for each experiment. Within each supersample, we create 100 different mask random variables, resulting in a total of 5, 000 runs for each experimental setting. This thorough setup allows us to compare and the disintegrated f-information-based bounds. CNN and Res Net-50 on Real-World Datasets In these experiments, the same setup is initially given in [22], and is also used in [23, 24, 61]. Specifically, we draw k1 samples of e Z and k2 samples of U for each given z. For the CNN on the binary MNIST dataset, we set k1 = 5 and k2 = 30. The 4-layer CNN model is trained using the Adam optimizer with a learning rate of 0.001 and a momentum coefficient of β1 = 0.9. The training process spans 200 epochs with a batch size of 128. For Res Net-50 on CIFAR10, we set k1 = 2 and k2 = 40. The Res Net model is trained using stochastic gradient descent (SGD) with a learning rate of 0.01 and a momentum coefficient of 0.9 for a total of 40 epochs. The batch size for this experiment is set to 64. In the SGLD experiment, we train a 4-layer CNN on the binary MNIST dataset with a batch size of 100 for 40 epochs. The initial learning rate is 0.01 and decays by a factor of 0.9 after every 100 iterations. Let t be the iteration index; the inverse temperature of SGLD is given by min{4000, max{100, 10et/100}}. We set the training sample size to n = 4000, and k1 = 5 and k2 = 30. Checkpoints are saved every 4 epochs. All these experiments are conducted using NVIDIA A100 GPUs with 40 GB of memory. For more comprehensive details, including model architectures, we recommend referring to [22 24]. E CMI Framework from the Perspective of Coin-Betting Sequences Deriving generalization bounds from a coin-betting perspective is inspired by [64, 1, 34]. We now adapt this strategy to derive CMI bounds, invoking inequalities similar to those in Lemma A.3. Assume ℓ [0, 1]. Let ℓi [ 1, 1] be a sequence of continuous coin outcomes chosen arbitrarily, and at each round i, a player bets ci 0 money on the sign of the outcome εi { 1, 1}. Then, ℓi is revealed, and the bettor wins or loses ciεi ℓi money. Let the initial wealth Wealth0 = 1. The wealth at the end of round n is: Wealthn = Wealthn 1 + cnεn ℓn = 1 + i=1 ciεi ℓi. Notice that ci [0, Wealthi 1]. Now consider a strategy where the player always bets a fixed fraction t [0, 1] of the current money, i.e., ci = t Wealthi 1. Then: Wealthn(t) = Wealthn 1 + tεn ℓn Wealthn 1 = i=1 (1 + tεi ℓi) . It follows that log Wealthn(t) = i=1 log(1 + tεi ℓi). Unlike the traditional online gambling game, we incorporate the individual technique from [6] by analyzing the expected log-wealth of the ith bet2, given by Wi(t) = Eεi, Lilog (1 + tεi Li). There are two kinds of players: those guessing the coin outcome randomly and those with side information. Let ε = ( 1)Ui where Ui Bern(1/2). The average log-wealth of the random guesser is EU i, Lilog(1 + t( 1)U i Li), and the average log-wealth of the informed player is Wi(t) = EUi, Lilog(1 + t( 1)U i Li). Clearly, the value of side information impacts the second player s income. To quantify this impact, by the DV-representation of KL divergence (cf. Lemma A.1), we have I( Li; Ui) sup t (0,1) EUi, Lilog 1 + t( 1)Ui Li log EU i, Li e log 1+t( 1)U i Li = sup t (0,1) EUi, Lilog 1 + t( 1)Ui Li log EU i, Li 1 + t( 1)U i Li = sup t (0,1) EUi, Lilog 1 + t( 1)Ui Li , (17) where the last equality holds because EU i, Lit( 1)U i Li = E Li h EU it( 1)U i Li i = E Li t Li t Li 2 = 0. Notice that the log-wealth of the comparator, i.e. the random-guesser, appears in Eq. (17) in the form of infλ E Li,U i h ϕ log(1 + t( 1)U i Li) + λ i λ. Similar to [1], by the inequality log(1 + x) x x2 for x 0.68 (see Figure 1(Right) for a visualization of this inequality), we have I( Li; Ui) sup t (0,1) EUi, Lilog 1 + t( 1)Ui Li sup t (0,0.68) EUi, Lilog 1 + t( 1)Ui Li sup t (0,0.68) EUi, Li t( 1)Ui Li t2 L2 i sup t (0,0.68) EUi, Li t( 1)Ui Li t2 4E2 Ui, Li ( 1)Ui Li , We then have EUi, Li ( 1)Ui Li 2 p I( Li; Ui). (18) 2This can also be interpreted as having n players each place a single bet with t, so log Wealthn(t) represents their collective log-wealth. Moreover, we now assume that the side information is perfect such that ( 1)Ui Li 0 (i.e. an interpolating or overfitting algorithm) always holds for each i, namely the income is always positive. Under this condition, the players can safely set t = 1, that is, the players all-in their money. Then, by log (1 + x) x (1+x) for x > 1, we have I( i; Ui) EUi, Lilog 1 + ( 1)Ui Li EUi, Li ( 1)Ui Li 1 + ( 1)Ui Li EUi, Li ( 1)Ui Li which gives us EUi, Li( 1)Ui Li 2I( i; Ui). (19) Consequently, recovering several existing ld-CMI bounds (up to a constant) from Eq. (19) and Eq. (18) is straightforward. Neur IPS Paper Checklist Question: Do the main claims made in the abstract and introduction accurately reflect the paper s contributions and scope? Answer: [Yes] Justification: We highlight the motivations and contributions of this work in the abstract and introduction. Guidelines: The answer NA means that the abstract and introduction do not include the claims made in the paper. The abstract and/or introduction should clearly state the claims made, including the contributions made in the paper and important assumptions and limitations. A No or NA answer to this question will not be perceived well by the reviewers. The claims made should match theoretical and experimental results, and reflect how much the results can be expected to generalize to other settings. It is fine to include aspirational goals as motivation as long as it is clear that these goals are not attained by the paper. 2. Limitations Question: Does the paper discuss the limitations of the work performed by the authors? Answer: [Yes] Justification: See Section 6 Guidelines: The answer NA means that the paper has no limitation while the answer No means that the paper has limitations, but those are not discussed in the paper. The authors are encouraged to create a separate "Limitations" section in their paper. The paper should point out any strong assumptions and how robust the results are to violations of these assumptions (e.g., independence assumptions, noiseless settings, model well-specification, asymptotic approximations only holding locally). The authors should reflect on how these assumptions might be violated in practice and what the implications would be. The authors should reflect on the scope of the claims made, e.g., if the approach was only tested on a few datasets or with a few runs. In general, empirical results often depend on implicit assumptions, which should be articulated. The authors should reflect on the factors that influence the performance of the approach. For example, a facial recognition algorithm may perform poorly when image resolution is low or images are taken in low lighting. Or a speech-to-text system might not be used reliably to provide closed captions for online lectures because it fails to handle technical jargon. The authors should discuss the computational efficiency of the proposed algorithms and how they scale with dataset size. If applicable, the authors should discuss possible limitations of their approach to address problems of privacy and fairness. While the authors might fear that complete honesty about limitations might be used by reviewers as grounds for rejection, a worse outcome might be that reviewers discover limitations that aren t acknowledged in the paper. The authors should use their best judgment and recognize that individual actions in favor of transparency play an important role in developing norms that preserve the integrity of the community. Reviewers will be specifically instructed to not penalize honesty concerning limitations. 3. Theory Assumptions and Proofs Question: For each theoretical result, does the paper provide the full set of assumptions and a complete (and correct) proof? Answer: [Yes] Justification: All assumptions are given in the theorem statements or in the preliminary section, and all the technical details are provided in Appendix. Guidelines: The answer NA means that the paper does not include theoretical results. All the theorems, formulas, and proofs in the paper should be numbered and crossreferenced. All assumptions should be clearly stated or referenced in the statement of any theorems. The proofs can either appear in the main paper or the supplemental material, but if they appear in the supplemental material, the authors are encouraged to provide a short proof sketch to provide intuition. Inversely, any informal proof provided in the core of the paper should be complemented by formal proofs provided in appendix or supplemental material. Theorems and Lemmas that the proof relies upon should be properly referenced. 4. Experimental Result Reproducibility Question: Does the paper fully disclose all the information needed to reproduce the main experimental results of the paper to the extent that it affects the main claims and/or conclusions of the paper (regardless of whether the code and data are provided or not)? Answer: [Yes] Justification: Our implementation also follows the previous works, as pointed out in the experiments section, and we explained all the additional details that needed for reproducing our results in the main text and Appendix D. Guidelines: The answer NA means that the paper does not include experiments. If the paper includes experiments, a No answer to this question will not be perceived well by the reviewers: Making the paper reproducible is important, regardless of whether the code and data are provided or not. If the contribution is a dataset and/or model, the authors should describe the steps taken to make their results reproducible or verifiable. Depending on the contribution, reproducibility can be accomplished in various ways. For example, if the contribution is a novel architecture, describing the architecture fully might suffice, or if the contribution is a specific model and empirical evaluation, it may be necessary to either make it possible for others to replicate the model with the same dataset, or provide access to the model. In general. releasing code and data is often one good way to accomplish this, but reproducibility can also be provided via detailed instructions for how to replicate the results, access to a hosted model (e.g., in the case of a large language model), releasing of a model checkpoint, or other means that are appropriate to the research performed. While Neur IPS does not require releasing code, the conference does require all submissions to provide some reasonable avenue for reproducibility, which may depend on the nature of the contribution. For example (a) If the contribution is primarily a new algorithm, the paper should make it clear how to reproduce that algorithm. (b) If the contribution is primarily a new model architecture, the paper should describe the architecture clearly and fully. (c) If the contribution is a new model (e.g., a large language model), then there should either be a way to access this model for reproducing the results or a way to reproduce the model (e.g., with an open-source dataset or instructions for how to construct the dataset). (d) We recognize that reproducibility may be tricky in some cases, in which case authors are welcome to describe the particular way they provide for reproducibility. In the case of closed-source models, it may be that access to the model is limited in some way (e.g., to registered users), but it should be possible for other researchers to have some path to reproducing or verifying the results. 5. Open access to data and code Question: Does the paper provide open access to the data and code, with sufficient instructions to faithfully reproduce the main experimental results, as described in supplemental material? Answer: [Yes] Justification: We only use synthetic dataset and some well-known public image datasets, which can be easily found, and we provide our source code in Appendix D and in the supplementary materials. Guidelines: The answer NA means that paper does not include experiments requiring code. Please see the Neur IPS code and data submission guidelines (https://nips.cc/ public/guides/Code Submission Policy) for more details. While we encourage the release of code and data, we understand that this might not be possible, so No is an acceptable answer. Papers cannot be rejected simply for not including code, unless this is central to the contribution (e.g., for a new open-source benchmark). The instructions should contain the exact command and environment needed to run to reproduce the results. See the Neur IPS code and data submission guidelines (https: //nips.cc/public/guides/Code Submission Policy) for more details. The authors should provide instructions on data access and preparation, including how to access the raw data, preprocessed data, intermediate data, and generated data, etc. The authors should provide scripts to reproduce all experimental results for the new proposed method and baselines. If only a subset of experiments are reproducible, they should state which ones are omitted from the script and why. At submission time, to preserve anonymity, the authors should release anonymized versions (if applicable). Providing as much information as possible in supplemental material (appended to the paper) is recommended, but including URLs to data and code is permitted. 6. Experimental Setting/Details Question: Does the paper specify all the training and test details (e.g., data splits, hyperparameters, how they were chosen, type of optimizer, etc.) necessary to understand the results? Answer: [Yes] Justification: See Appendix D. Guidelines: The answer NA means that the paper does not include experiments. The experimental setting should be presented in the core of the paper to a level of detail that is necessary to appreciate the results and make sense of them. The full details can be provided either with the code, in appendix, or as supplemental material. 7. Experiment Statistical Significance Question: Does the paper report error bars suitably and correctly defined or other appropriate information about the statistical significance of the experiments? Answer: [Yes] Justification: We provide the standard deviations in some figures in Figure 2. Guidelines: The answer NA means that the paper does not include experiments. The authors should answer "Yes" if the results are accompanied by error bars, confidence intervals, or statistical significance tests, at least for the experiments that support the main claims of the paper. The factors of variability that the error bars are capturing should be clearly stated (for example, train/test split, initialization, random drawing of some parameter, or overall run with given experimental conditions). The method for calculating the error bars should be explained (closed form formula, call to a library function, bootstrap, etc.) The assumptions made should be given (e.g., Normally distributed errors). It should be clear whether the error bar is the standard deviation or the standard error of the mean. It is OK to report 1-sigma error bars, but one should state it. The authors should preferably report a 2-sigma error bar than state that they have a 96% CI, if the hypothesis of Normality of errors is not verified. For asymmetric distributions, the authors should be careful not to show in tables or figures symmetric error bars that would yield results that are out of range (e.g. negative error rates). If error bars are reported in tables or plots, The authors should explain in the text how they were calculated and reference the corresponding figures or tables in the text. 8. Experiments Compute Resources Question: For each experiment, does the paper provide sufficient information on the computer resources (type of compute workers, memory, time of execution) needed to reproduce the experiments? Answer: [Yes] Justification: See Appendix D. Guidelines: The answer NA means that the paper does not include experiments. The paper should indicate the type of compute workers CPU or GPU, internal cluster, or cloud provider, including relevant memory and storage. The paper should provide the amount of compute required for each of the individual experimental runs as well as estimate the total compute. The paper should disclose whether the full research project required more compute than the experiments reported in the paper (e.g., preliminary or failed experiments that didn t make it into the paper). 9. Code Of Ethics Question: Does the research conducted in the paper conform, in every respect, with the Neur IPS Code of Ethics https://neurips.cc/public/Ethics Guidelines? Answer: [Yes] Justification: Our work conforms the Neur IPS Code of Ethics. Guidelines: The answer NA means that the authors have not reviewed the Neur IPS Code of Ethics. If the authors answer No, they should explain the special circumstances that require a deviation from the Code of Ethics. The authors should make sure to preserve anonymity (e.g., if there is a special consideration due to laws or regulations in their jurisdiction). 10. Broader Impacts Question: Does the paper discuss both potential positive societal impacts and negative societal impacts of the work performed? Answer: [NA] Justification: We do not see any societal impacts with our paper, as it is purely theoretical in nature. Guidelines: The answer NA means that there is no societal impact of the work performed. If the authors answer NA or No, they should explain why their work has no societal impact or why the paper does not address societal impact. Examples of negative societal impacts include potential malicious or unintended uses (e.g., disinformation, generating fake profiles, surveillance), fairness considerations (e.g., deployment of technologies that could make decisions that unfairly impact specific groups), privacy considerations, and security considerations. The conference expects that many papers will be foundational research and not tied to particular applications, let alone deployments. However, if there is a direct path to any negative applications, the authors should point it out. For example, it is legitimate to point out that an improvement in the quality of generative models could be used to generate deepfakes for disinformation. On the other hand, it is not needed to point out that a generic algorithm for optimizing neural networks could enable people to train models that generate Deepfakes faster. The authors should consider possible harms that could arise when the technology is being used as intended and functioning correctly, harms that could arise when the technology is being used as intended but gives incorrect results, and harms following from (intentional or unintentional) misuse of the technology. If there are negative societal impacts, the authors could also discuss possible mitigation strategies (e.g., gated release of models, providing defenses in addition to attacks, mechanisms for monitoring misuse, mechanisms to monitor how a system learns from feedback over time, improving the efficiency and accessibility of ML). 11. Safeguards Question: Does the paper describe safeguards that have been put in place for responsible release of data or models that have a high risk for misuse (e.g., pretrained language models, image generators, or scraped datasets)? Answer: [NA] Justification: There is no such risk. Guidelines: The answer NA means that the paper poses no such risks. Released models that have a high risk for misuse or dual-use should be released with necessary safeguards to allow for controlled use of the model, for example by requiring that users adhere to usage guidelines or restrictions to access the model or implementing safety filters. Datasets that have been scraped from the Internet could pose safety risks. The authors should describe how they avoided releasing unsafe images. We recognize that providing effective safeguards is challenging, and many papers do not require this, but we encourage authors to take this into account and make a best faith effort. 12. Licenses for existing assets Question: Are the creators or original owners of assets (e.g., code, data, models), used in the paper, properly credited and are the license and terms of use explicitly mentioned and properly respected? Answer: [Yes] Justification: We cite the datasets and models properly. Guidelines: The answer NA means that the paper does not use existing assets. The authors should cite the original paper that produced the code package or dataset. The authors should state which version of the asset is used and, if possible, include a URL. The name of the license (e.g., CC-BY 4.0) should be included for each asset. For scraped data from a particular source (e.g., website), the copyright and terms of service of that source should be provided. If assets are released, the license, copyright information, and terms of use in the package should be provided. For popular datasets, paperswithcode.com/datasets has curated licenses for some datasets. Their licensing guide can help determine the license of a dataset. For existing datasets that are re-packaged, both the original license and the license of the derived asset (if it has changed) should be provided. If this information is not available online, the authors are encouraged to reach out to the asset s creators. 13. New Assets Question: Are new assets introduced in the paper well documented and is the documentation provided alongside the assets? Answer: [NA] Justification: No new asset. Guidelines: The answer NA means that the paper does not release new assets. Researchers should communicate the details of the dataset/code/model as part of their submissions via structured templates. This includes details about training, license, limitations, etc. The paper should discuss whether and how consent was obtained from people whose asset is used. At submission time, remember to anonymize your assets (if applicable). You can either create an anonymized URL or include an anonymized zip file. 14. Crowdsourcing and Research with Human Subjects Question: For crowdsourcing experiments and research with human subjects, does the paper include the full text of instructions given to participants and screenshots, if applicable, as well as details about compensation (if any)? Answer: [NA] Justification: Our paper does not involve crowdsourcing nor research with human subjects. Guidelines: The answer NA means that the paper does not involve crowdsourcing nor research with human subjects. Including this information in the supplemental material is fine, but if the main contribution of the paper involves human subjects, then as much detail as possible should be included in the main paper. According to the Neur IPS Code of Ethics, workers involved in data collection, curation, or other labor should be paid at least the minimum wage in the country of the data collector. 15. Institutional Review Board (IRB) Approvals or Equivalent for Research with Human Subjects Question: Does the paper describe potential risks incurred by study participants, whether such risks were disclosed to the subjects, and whether Institutional Review Board (IRB) approvals (or an equivalent approval/review based on the requirements of your country or institution) were obtained? Answer: [NA] Justification: This paper does not involve crowdsourcing nor research with human subjects. Guidelines: The answer NA means that the paper does not involve crowdsourcing nor research with human subjects. Depending on the country in which research is conducted, IRB approval (or equivalent) may be required for any human subjects research. If you obtained IRB approval, you should clearly state this in the paper. We recognize that the procedures for this may vary significantly between institutions and locations, and we expect authors to adhere to the Neur IPS Code of Ethics and the guidelines for their institution. For initial submissions, do not include any information that would break anonymity (if applicable), such as the institution conducting the review.