A multi-user private data compression problem is studied. A server has a...
The design of a statistical signal processing privacy problem is studied...
We consider the problem of gridless blind deconvolution and demixing (GB...
Strong secrecy communication over a discrete memoryless state-dependent
...
A private cache-aided compression problem is studied, where a server has...
In this paper, we present new high-probability PAC-Bayes bounds for diff...
We extend the results of Ghourchian et al. [IEEE JSAIT-2021], to joint
s...
Strong secrecy communication over a discrete memoryless state-dependent
...
In this work, we study the performance of the Thompson Sampling algorith...
Pointwise maximal leakage (PML) is an operationally meaningful privacy
m...
We investigate the possibility of guaranteeing inferential privacy for
m...
To date, no "information-theoretic" frameworks for reasoning about
gener...
We study an information theoretic privacy mechanism design problem for t...
A privacy mechanism design problem is studied through the lens of inform...
This paper provides a complete characterization of the information-energ...
In this paper, we develop an efficient training beam sequence design app...
Building on the framework introduced by Xu and Raginksy [1] for supervis...
In this paper, we study a quantized feedback scheme to maximize the good...
We introduce a privacy measure called pointwise maximal leakage, defined...
An information theoretic privacy mechanism design problem for two scenar...
Machine learning (ML) is a key technique for big-data-driven modelling a...
We consider the problem of estimating a continuous-time Gauss-Markov sou...
The design of privacy mechanisms for two scenarios is studied where the
...
In this paper, we consider a privacy signaling game problem for binary
a...
To leverage massive distributed data and computation resources, machine
...
In this paper, we study the connection between entropic optimal transpor...
We study the problem of rate-distortion-equivocation with side-informati...
We introduce fundamental bounds on achievable cumulative rate distributi...
In this paper, we study a hypothesis test to determine the underlying
di...
We study a statistical signal processing privacy problem, where an agent...
Edge computing provides a promising paradigm to support the implementati...
We generalize the problem of controlling the interference created to an
...
Most methods for publishing data with privacy guarantees introduce rando...
In this paper, we study the tradeoffs between complexity and reliability...
Stringent constraints on both reliability and latency must be guaranteed...
In this study, Nash and Stackelberg equilibria of single-stage and
multi...
In this work, we introduce several expected generalization error bounds ...
This paper investigates the problem of synthesizing joint distributions ...
We propose ReDense as a simple and low complexity way to improve the
per...
In this work, we unify several expected generalization error bounds base...
Machine learning models are known to memorize the unique properties of
i...
Big data, including applications with high security requirements, are of...
We design a low complexity decentralized learning algorithm to train a
r...
In this paper, we study a stochastic disclosure control problem using
in...
We consider a network of two nodes separated by a noisy channel, in whic...
We consider a three-node network, in which two agents wish to communicat...
Cell-free networks are considered as a promising distributed network
arc...
The estimation of mutual information (MI) or conditional mutual informat...
In this article, we propose a new variational approach to learn private
...
One of the most important application scenarios in next-generation wirel...