首页 > 最新文献

IEEE Transactions on Information Theory最新文献

英文 中文
IEEE Transactions on Information Theory Information for Authors IEEE信息理论汇刊:作者信息
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-22 DOI: 10.1109/TIT.2026.3651883
{"title":"IEEE Transactions on Information Theory Information for Authors","authors":"","doi":"10.1109/TIT.2026.3651883","DOIUrl":"https://doi.org/10.1109/TIT.2026.3651883","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 2","pages":"C3-C3"},"PeriodicalIF":2.9,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11361354","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146015946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Minimax Empirical Bayes Predictive Densities 极小极大经验贝叶斯预测密度
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-25 DOI: 10.1109/TIT.2025.3648620
Éric Marchand;William E. Strawderman
For estimating the density of $Y|mu sim N_{d}(mu , nu I_{d})$ based on $X|mu sim N_{d}(mu , sigma ^{2}_{X} I_{d})$ with known $nu , sigma ^{2}_{X}$ , we consider the class $mathcal {P}$ of “extended plug-in” predictive densities $hat {q} sim N_{d}(hat {mu }, hat {nu } I_{d})$ . For a given prior density $pi $ for $mu $ and Kullback–Leibler loss, we investigate the optimal choice $hat {q}_{eb,pi }$ obtained by minimizing the expected posterior loss among $hat {q} in mathcal {P}$ , as initially proposed by Okudo and Komaki (2024). With $hat {q}_{eb,pi }$ having a simple form and a appealing alternative to the exact Bayesian predictive density, we investigate its Kullback–Leibler risk performance. Our main finding consists, for $d geq 3$ and a given superharmonic prior density $pi $ , in the determination of a lower cut-off point $bar {nu }$ such that $hat {q}_{eb,pi }$ dominates the benchmark minimum risk and minimax predictive density for $nu geq bar {nu }$ . Specific analyses are carried out and our results are illustrated for a pseudo-Bayes marginal density and a subclass of Strawderman prior densities.
为了在已知$nu , sigma ^{2}_{X}$的情况下基于$X|mu sim N_{d}(mu , sigma ^{2}_{X} I_{d})$估计$Y|mu sim N_{d}(mu , nu I_{d})$的密度,我们考虑“扩展插件”预测密度$hat {q} sim N_{d}(hat {mu }, hat {nu } I_{d})$的类$mathcal {P}$。对于$mu $和Kullback-Leibler损失的给定先验密度$pi $,我们研究了Okudo和Komaki(2024)最初提出的通过最小化$hat {q} in mathcal {P}$的预期后验损失获得的最优选择$hat {q}_{eb,pi }$。由于$hat {q}_{eb,pi }$具有简单的形式和精确贝叶斯预测密度的一个吸引人的替代方案,我们研究了它的Kullback-Leibler风险性能。我们的主要发现包括,对于$d geq 3$和给定的超谐波先验密度$pi $,在确定较低的截止点$bar {nu }$时,使得$hat {q}_{eb,pi }$在$nu geq bar {nu }$的基准最小风险和最大最小预测密度中占主导地位。具体的分析进行了,我们的结果说明了伪贝叶斯边际密度和一个子类的Strawderman先验密度。
{"title":"On Minimax Empirical Bayes Predictive Densities","authors":"Éric Marchand;William E. Strawderman","doi":"10.1109/TIT.2025.3648620","DOIUrl":"https://doi.org/10.1109/TIT.2025.3648620","url":null,"abstract":"For estimating the density of <inline-formula> <tex-math>$Y|mu sim N_{d}(mu , nu I_{d})$ </tex-math></inline-formula> based on <inline-formula> <tex-math>$X|mu sim N_{d}(mu , sigma ^{2}_{X} I_{d})$ </tex-math></inline-formula> with known <inline-formula> <tex-math>$nu , sigma ^{2}_{X}$ </tex-math></inline-formula>, we consider the class <inline-formula> <tex-math>$mathcal {P}$ </tex-math></inline-formula> of “extended plug-in” predictive densities <inline-formula> <tex-math>$hat {q} sim N_{d}(hat {mu }, hat {nu } I_{d})$ </tex-math></inline-formula>. For a given prior density <inline-formula> <tex-math>$pi $ </tex-math></inline-formula> for <inline-formula> <tex-math>$mu $ </tex-math></inline-formula> and Kullback–Leibler loss, we investigate the optimal choice <inline-formula> <tex-math>$hat {q}_{eb,pi }$ </tex-math></inline-formula> obtained by minimizing the expected posterior loss among <inline-formula> <tex-math>$hat {q} in mathcal {P}$ </tex-math></inline-formula>, as initially proposed by Okudo and Komaki (2024). With <inline-formula> <tex-math>$hat {q}_{eb,pi }$ </tex-math></inline-formula> having a simple form and a appealing alternative to the exact Bayesian predictive density, we investigate its Kullback–Leibler risk performance. Our main finding consists, for <inline-formula> <tex-math>$d geq 3$ </tex-math></inline-formula> and a given superharmonic prior density <inline-formula> <tex-math>$pi $ </tex-math></inline-formula>, in the determination of a lower cut-off point <inline-formula> <tex-math>$bar {nu }$ </tex-math></inline-formula> such that <inline-formula> <tex-math>$hat {q}_{eb,pi }$ </tex-math></inline-formula> dominates the benchmark minimum risk and minimax predictive density for <inline-formula> <tex-math>$nu geq bar {nu }$ </tex-math></inline-formula>. Specific analyses are carried out and our results are illustrated for a pseudo-Bayes marginal density and a subclass of Strawderman prior densities.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 2","pages":"1232-1239"},"PeriodicalIF":2.9,"publicationDate":"2025-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146015950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Transactions on Information Theory Information for Authors IEEE信息理论汇刊:作者信息
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-23 DOI: 10.1109/TIT.2025.3643223
{"title":"IEEE Transactions on Information Theory Information for Authors","authors":"","doi":"10.1109/TIT.2025.3643223","DOIUrl":"https://doi.org/10.1109/TIT.2025.3643223","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 1","pages":"C3-C3"},"PeriodicalIF":2.9,"publicationDate":"2025-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11313748","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145808628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TechRxiv: Share Your Preprint Research with the World! techxiv:与世界分享你的预印本研究!
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-23 DOI: 10.1109/TIT.2025.3643249
{"title":"TechRxiv: Share Your Preprint Research with the World!","authors":"","doi":"10.1109/TIT.2025.3643249","DOIUrl":"https://doi.org/10.1109/TIT.2025.3643249","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 1","pages":"810-810"},"PeriodicalIF":2.9,"publicationDate":"2025-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11313722","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145808593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Monotonicity Testing in Sublinear Time 亚线性时间下的自适应单调性检验
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-22 DOI: 10.1109/TIT.2025.3646887
Housen Li;Zhi Liu;Axel Munk
Modern large-scale data analysis increasingly faces the challenge of achieving computational efficiency as well as statistical accuracy, as classical statistically efficient methods often fall short in the first regard. In the context of testing monotonicity of a regression function, we propose FOMT (Fast and Optimal Monotonicity Test), a novel methodology tailored to meet these dual demands. FOMT employs a sparse collection of local tests, strategically generated at random, to detect violations of monotonicity scattered throughout the domain of the regression function. This sparsity enables significant computational efficiency, achieving sublinear runtime in most cases, and quasilinear runtime (i.e. linear up to a log factor) in the worst case. In contrast, existing statistically optimal tests typically require at least quadratic runtime. FOMT’s statistical accuracy is achieved through the precise calibration of these local tests and their effective combination, ensuring both sensitivity to violations and control over false positives. More precisely, we show that FOMT separates the null and alternative hypotheses at minimax optimal rates over Hölder function classes of smoothness order in ( $0,2$ ]. Further, when the smoothness is unknown, we introduce an adaptive version of FOMT, based on a modified Lepskii principle, which attains statistical optimality and meanwhile maintains the same computational complexity as if the intrinsic smoothness were known. Extensive simulations confirm the competitiveness and effectiveness of both FOMT and its adaptive variant.
现代大规模数据分析越来越多地面临着计算效率和统计准确性的挑战,因为经典的统计高效方法往往在第一个方面存在不足。在测试回归函数单调性的背景下,我们提出了fomo(快速和最优单调性测试),这是一种专门为满足这些双重需求而量身定制的新方法。fft采用局部测试的稀疏集合,策略上随机生成,以检测分散在整个回归函数域中的单调性违反。这种稀疏性可以显著提高计算效率,在大多数情况下实现亚线性运行,在最坏的情况下实现拟线性运行(即线性到一个对数因子)。相比之下,现有的统计最优测试通常需要至少二次的运行时间。fomo的统计准确性是通过对这些本地测试的精确校准及其有效组合来实现的,从而确保对违规行为的敏感性和对假阳性的控制。更准确地说,我们证明了fmt在($0,2$]中的平滑阶的Hölder函数类上以最小最大最优速率分离了零假设和备选假设。此外,当平滑度未知时,我们基于改进的Lepskii原理引入了自适应版本的FOMT,该方法实现了统计最优性,同时保持了与固有平滑度已知时相同的计算复杂度。大量的仿真验证了FOMT及其自适应变体的竞争力和有效性。
{"title":"Adaptive Monotonicity Testing in Sublinear Time","authors":"Housen Li;Zhi Liu;Axel Munk","doi":"10.1109/TIT.2025.3646887","DOIUrl":"https://doi.org/10.1109/TIT.2025.3646887","url":null,"abstract":"Modern large-scale data analysis increasingly faces the challenge of achieving computational efficiency as well as statistical accuracy, as classical statistically efficient methods often fall short in the first regard. In the context of testing monotonicity of a regression function, we propose FOMT (Fast and Optimal Monotonicity Test), a novel methodology tailored to meet these dual demands. FOMT employs a sparse collection of <italic>local</i> tests, strategically generated at random, to detect violations of monotonicity scattered throughout the domain of the regression function. This sparsity enables significant computational efficiency, achieving sublinear runtime in most cases, and quasilinear runtime (i.e. linear up to a log factor) in the worst case. In contrast, existing statistically optimal tests typically require at least quadratic runtime. FOMT’s statistical accuracy is achieved through the precise calibration of these local tests and their effective combination, ensuring both sensitivity to violations and control over false positives. More precisely, we show that FOMT separates the null and alternative hypotheses at minimax optimal rates over Hölder function classes of smoothness order in (<inline-formula> <tex-math>$0,2$ </tex-math></inline-formula>]. Further, when the smoothness is unknown, we introduce an adaptive version of FOMT, based on a modified Lepskii principle, which attains statistical optimality and meanwhile maintains the same computational complexity as if the intrinsic smoothness were known. Extensive simulations confirm the competitiveness and effectiveness of both FOMT and its adaptive variant.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 2","pages":"1240-1275"},"PeriodicalIF":2.9,"publicationDate":"2025-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146015914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convergence Rates for Softmax Gating Mixture of Experts Softmax门控混合专家的收敛速度
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-22 DOI: 10.1109/TIT.2025.3647061
Huy Nguyen;Nhat Ho;Alessandro Rinaldo
Mixture of experts (MoE) has recently emerged as an effective framework for deploying machine learning models in a scalable and efficient way by softly dividing complex tasks among multiple specialized sub-models termed experts. Central to the success of MoE is an adaptive gating mechanism which determines the relevance of each expert to a given input and then dynamically assigns experts their respective weights. Despite its widespread use in practice, a comprehensive study on the effects of the softmax gating on the MoE has been lacking in the literature. To bridge this gap, we conduct a thorough theoretical analysis of the convergence rates for the problem of parameter estimation and expert estimation. We consider standard softmax gating and several variants, including a dense-to-sparse gating and a hierarchical softmax gating. Our theoretical results provide useful insights into the design of sample-efficient expert structures. In particular, we demonstrate that it requires polynomially many data points to estimate experts satisfying our proposed strong identifiability condition, namely a commonly used two-layer feed-forward network. In stark contrast, estimating linear experts, which violate the strong identifiability condition, necessitates exponentially many data points as a result of intrinsic parameter interactions, which we express in the language of partial differential equations.
混合专家(MoE)最近成为一种有效的框架,通过将复杂的任务轻轻地划分到称为专家的多个专门子模型中,以可扩展和有效的方式部署机器学习模型。MoE成功的核心是一种自适应门控机制,该机制确定每个专家与给定输入的相关性,然后动态地为专家分配各自的权重。尽管软门控在实践中得到了广泛的应用,但文献中缺乏对软门控对MoE影响的全面研究。为了弥补这一差距,我们对参数估计和专家估计问题的收敛速度进行了深入的理论分析。我们考虑了标准软最大门控和几种变体,包括密集到稀疏门控和分层软最大门控。我们的理论结果为样本高效专家结构的设计提供了有用的见解。特别是,我们证明了它需要多项式个数据点来估计满足我们提出的强可识别性条件的专家,即常用的两层前馈网络。与此形成鲜明对比的是,估计线性专家,违反强可辨识性条件,需要指数级多的数据点作为内在参数相互作用的结果,我们用偏微分方程的语言表示。
{"title":"Convergence Rates for Softmax Gating Mixture of Experts","authors":"Huy Nguyen;Nhat Ho;Alessandro Rinaldo","doi":"10.1109/TIT.2025.3647061","DOIUrl":"https://doi.org/10.1109/TIT.2025.3647061","url":null,"abstract":"Mixture of experts (MoE) has recently emerged as an effective framework for deploying machine learning models in a scalable and efficient way by softly dividing complex tasks among multiple specialized sub-models termed experts. Central to the success of MoE is an adaptive gating mechanism which determines the relevance of each expert to a given input and then dynamically assigns experts their respective weights. Despite its widespread use in practice, a comprehensive study on the effects of the softmax gating on the MoE has been lacking in the literature. To bridge this gap, we conduct a thorough theoretical analysis of the convergence rates for the problem of parameter estimation and expert estimation. We consider standard softmax gating and several variants, including a dense-to-sparse gating and a hierarchical softmax gating. Our theoretical results provide useful insights into the design of sample-efficient expert structures. In particular, we demonstrate that it requires polynomially many data points to estimate experts satisfying our proposed <italic>strong identifiability</i> condition, namely a commonly used two-layer feed-forward network. In stark contrast, estimating linear experts, which violate the strong identifiability condition, necessitates exponentially many data points as a result of intrinsic parameter interactions, which we express in the language of partial differential equations.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 2","pages":"1276-1304"},"PeriodicalIF":2.9,"publicationDate":"2025-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146015927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiset Combinatorial Gray Codes With Application to Proximity Sensor Networks 多集组合灰度码在接近传感器网络中的应用
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-19 DOI: 10.1109/TIT.2025.3646470
Chung Shue Chen;Wing Shing Wong;Yuan-Hsun Lo;Tsai-Lien Wong
We investigate coding schemes that map source symbols into multisets of an alphabet. Such a formulation of source coding is an alternative approach to the traditional framework and is inspired by an object tracking problem over proximity sensor networks. We define a multiset combinatorial Gray code as a multiset code with fixed multiset cardinality that possesses combinatorial Gray code characteristic. For source codes that are organized as a grid, namely an integer lattice, we propose a solution by first constructing a mapping from the grid to the set of symbols, which we referred to as colors. The codes are then defined as the images of rectangular blocks in the grid of fixed dimensions. We refer to the mapping as a color mapping and the code as a color multiset code. We propose the idea of product multiset code that enables us to construct codes for high dimensional grids based on 1-dimensional (1D) grids. We provide a detailed analysis of color multiset codes on 1D grids, focusing on codes that require the minimal number of colors. To illustrate the application of such a coding scheme, we consider an object tracking problem on 2D grids and show its efficiency, which comes from exploiting transmission parallelism. Some numerical results are presented to conclude the paper.
我们研究了将源符号映射到字母表的多集的编码方案。这种源编码的表述是传统框架的一种替代方法,其灵感来自于接近传感器网络上的目标跟踪问题。我们将多集组合格雷码定义为具有固定多集基数且具有组合格雷码特征的多集码。对于组织为网格(即整数晶格)的源代码,我们提出一种解决方案,首先构建从网格到符号集的映射,我们将其称为颜色。然后将编码定义为固定尺寸网格中矩形块的图像。我们将映射称为颜色映射,将代码称为颜色多集代码。我们提出了积多集码的思想,使我们能够基于一维(1D)网格构建高维网格的代码。我们对一维网格上的颜色多集代码进行了详细的分析,重点是需要最少颜色数量的代码。为了说明这种编码方案的应用,我们考虑了二维网格上的目标跟踪问题,并展示了它的效率,它来自于利用传输并行性。最后给出了一些数值结果来对本文进行总结。
{"title":"Multiset Combinatorial Gray Codes With Application to Proximity Sensor Networks","authors":"Chung Shue Chen;Wing Shing Wong;Yuan-Hsun Lo;Tsai-Lien Wong","doi":"10.1109/TIT.2025.3646470","DOIUrl":"https://doi.org/10.1109/TIT.2025.3646470","url":null,"abstract":"We investigate coding schemes that map source symbols into multisets of an alphabet. Such a formulation of source coding is an alternative approach to the traditional framework and is inspired by an object tracking problem over proximity sensor networks. We define a <italic>multiset combinatorial Gray code</i> as a multiset code with fixed multiset cardinality that possesses combinatorial Gray code characteristic. For source codes that are organized as a grid, namely an integer lattice, we propose a solution by first constructing a mapping from the grid to the set of symbols, which we referred to as colors. The codes are then defined as the images of rectangular blocks in the grid of fixed dimensions. We refer to the mapping as a <italic>color mapping</i> and the code as a <italic>color multiset code</i>. We propose the idea of product multiset code that enables us to construct codes for high dimensional grids based on 1-dimensional (1D) grids. We provide a detailed analysis of color multiset codes on 1D grids, focusing on codes that require the minimal number of colors. To illustrate the application of such a coding scheme, we consider an object tracking problem on 2D grids and show its efficiency, which comes from exploiting transmission parallelism. Some numerical results are presented to conclude the paper.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 2","pages":"1378-1392"},"PeriodicalIF":2.9,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146015947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sequential Change Detection With Differential Privacy 具有差分隐私的顺序更改检测
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-16 DOI: 10.1109/TIT.2025.3644744
Liyan Xie;Ruizhi Zhang
Sequential change detection is a fundamental problem in statistics and signal processing, with the CUSUM procedure widely used to achieve minimax detection delay under a prescribed false-alarm rate when pre- and post-change distributions are fully known. However, releasing CUSUM statistics and the corresponding stopping time directly can compromise individual data privacy. We therefore introduce a differentially private (DP) variant, called DP-CUSUM, that injects calibrated Laplace noise into both the vanilla CUSUM statistics and the detection threshold, preserving the recursive simplicity of the classical CUSUM statistics while ensuring per-sample differential privacy. We derive closed-form bounds on the average run length to false alarm and on the worst-case average detection delay, explicitly characterizing the trade-off among privacy level, false-alarm rate, and detection efficiency. Our theoretical results imply that under a weak privacy constraint, our proposed DP-CUSUM procedure achieves the same first-order asymptotic optimality as the classical, non-private CUSUM procedure. Numerical simulations are conducted to demonstrate the detection efficiency of our proposed DP-CUSUM under different privacy constraints, and the results are consistent with our theoretical findings.
序列变化检测是统计学和信号处理中的一个基本问题,CUSUM程序被广泛用于在完全知道变化前后分布的情况下,在规定的虚警率下实现最小最大检测延迟。但是,直接发布CUSUM统计数据和相应的停止时间会损害个人数据隐私。因此,我们引入了一种差分私有(DP)变体,称为DP-CUSUM,它将校准的拉普拉斯噪声注入到香草CUSUM统计数据和检测阈值中,在确保每个样本差分隐私的同时保留了经典CUSUM统计数据的递归简单性。我们推导了到虚警的平均运行长度和最坏情况下的平均检测延迟的封闭形式边界,明确地描述了隐私级别、虚警率和检测效率之间的权衡。我们的理论结果表明,在弱隐私约束下,我们提出的DP-CUSUM过程与经典的非隐私CUSUM过程具有相同的一阶渐近最优性。通过数值模拟验证了本文提出的DP-CUSUM在不同隐私约束下的检测效率,结果与理论研究结果一致。
{"title":"Sequential Change Detection With Differential Privacy","authors":"Liyan Xie;Ruizhi Zhang","doi":"10.1109/TIT.2025.3644744","DOIUrl":"https://doi.org/10.1109/TIT.2025.3644744","url":null,"abstract":"Sequential change detection is a fundamental problem in statistics and signal processing, with the CUSUM procedure widely used to achieve minimax detection delay under a prescribed false-alarm rate when pre- and post-change distributions are fully known. However, releasing CUSUM statistics and the corresponding stopping time directly can compromise individual data privacy. We therefore introduce a differentially private (DP) variant, called DP-CUSUM, that injects calibrated Laplace noise into both the vanilla CUSUM statistics and the detection threshold, preserving the recursive simplicity of the classical CUSUM statistics while ensuring per-sample differential privacy. We derive closed-form bounds on the average run length to false alarm and on the worst-case average detection delay, explicitly characterizing the trade-off among privacy level, false-alarm rate, and detection efficiency. Our theoretical results imply that under a weak privacy constraint, our proposed DP-CUSUM procedure achieves the same first-order asymptotic optimality as the classical, non-private CUSUM procedure. Numerical simulations are conducted to demonstrate the detection efficiency of our proposed DP-CUSUM under different privacy constraints, and the results are consistent with our theoretical findings.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 2","pages":"1319-1331"},"PeriodicalIF":2.9,"publicationDate":"2025-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146015937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strong Converse Exponent of Quantum Dichotomies 量子二分类的强逆指数
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-12 DOI: 10.1109/TIT.2025.3643514
Mario Berta;Yongsheng Yao
The quantum dichotomies problem asks at what rate one pair of quantum states can be approximately mapped into another pair of quantum states. In the many copy limit and for vanishing error, the optimal rate is known to be given by the ratio of the respective quantum relative distances. Here, we study the large-deviation behavior of quantum dichotomies and determine the exact strong converse exponent based on the purified distance. This is the first time to establish the exact high-error large-deviation analysis for this task in fully quantum setting.
量子二分类问题问的是一对量子态以什么速率可以近似地映射到另一对量子态。在多拷贝极限和误差消失情况下,已知最佳速率由各自量子相对距离之比给出。在此,我们研究了量子二分类的大偏差行为,并基于纯化距离确定了精确的强逆指数。这是首次在全量子环境下建立精确的高误差大偏差分析方法。
{"title":"Strong Converse Exponent of Quantum Dichotomies","authors":"Mario Berta;Yongsheng Yao","doi":"10.1109/TIT.2025.3643514","DOIUrl":"https://doi.org/10.1109/TIT.2025.3643514","url":null,"abstract":"The quantum dichotomies problem asks at what rate one pair of quantum states can be approximately mapped into another pair of quantum states. In the many copy limit and for vanishing error, the optimal rate is known to be given by the ratio of the respective quantum relative distances. Here, we study the large-deviation behavior of quantum dichotomies and determine the exact strong converse exponent based on the purified distance. This is the first time to establish the exact high-error large-deviation analysis for this task in fully quantum setting.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 2","pages":"1212-1219"},"PeriodicalIF":2.9,"publicationDate":"2025-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146015928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network-Agnostic Verifiable Secret Sharing With Cryptographic Security 网络不可知的可验证秘密共享与加密安全
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-11 DOI: 10.1109/TIT.2025.3642814
Nidhish Bhimrajka;Ashish Choudhury;Supreeth Varadarajan
Verifiable Secret-Sharing (VSS) is a fundamental primitive in secure distributed computing that allows a designated dealer to share a secret among n parties in the presence of an adversary controlling at most t of them. We study VSS in the presence of computationally-bounded adversaries. Known VSS protocols tolerate up to $t_{s} lt frac {n}{2}$ corruptions assuming a well-behaved synchronous network but become insecure when the network delay becomes unstable. On the other hand, solutions in the asynchronous model operate under arbitrary network conditions but only tolerate up to $t_{a} lt frac {n}{3}$ corruptions, even when the network is well-behaved. We aim to build a network-agnostic VSS protocol with the optimal threshold conditions. A network-agnostic protocol provides the best possible security guarantees, irrespective of the type of underlying communication network. Previously, network-agnostic VSS is known either with perfect security (Appan et al. IEEE IT 2023) where the threshold conditions are not known to be optimal or with statistical security (Appan et al. TCC 2023) where the threshold conditions are optimal, but the parties need to perform exponential amount of computation and communication. Using our VSS protocol, we design a secure Multi-Party Computation (MPC) protocol in the plain Public Key Infrastructure (PKI) model, i.e., without assuming an expensive trusted setup. Although our proposed MPC protocol incurs higher communication complexity than state-of-the-art network-agnostic MPC protocols, it motivates alternative directions for designing computationally inexpensive MPC protocols based on a plain PKI setup, which has not been explored in the domain of computationally secure network-agnostic MPC and offers valuable insights into designing it.
可验证秘密共享(VSS)是安全分布式计算中的一个基本元素,它允许指定的交易商在对手最多控制其中t方的情况下在n方之间共享秘密。我们在存在计算有界对手的情况下研究VSS。假设一个行为良好的同步网络,已知的VSS协议可以容忍高达$t_{s} lt frac {n}{2}$损坏,但当网络延迟变得不稳定时,它就变得不安全了。另一方面,异步模型中的解决方案在任意网络条件下运行,但只允许最多$t_{a} lt frac {n}{3}$损坏,即使网络运行良好。我们的目标是建立一个具有最优阈值条件的网络不可知VSS协议。无论底层通信网络的类型如何,网络无关协议都提供了最好的安全保证。以前,网络不可知的VSS要么具有完美的安全性(Appan等人);IEEE IT 2023),其中阈值条件不知道是最佳的或具有统计安全性(Appan等人)。TCC 2023),其中阈值条件是最优的,但各方需要执行指数级的计算和通信。使用我们的VSS协议,我们在普通公钥基础设施(PKI)模型中设计了一个安全的多方计算(MPC)协议,即不假设昂贵的可信设置。尽管我们提出的MPC协议比最先进的网络无关MPC协议带来更高的通信复杂性,但它激发了基于普通PKI设置设计计算成本低廉的MPC协议的替代方向,这在计算安全的网络无关MPC领域尚未被探索,并为设计它提供了有价值的见解。
{"title":"Network-Agnostic Verifiable Secret Sharing With Cryptographic Security","authors":"Nidhish Bhimrajka;Ashish Choudhury;Supreeth Varadarajan","doi":"10.1109/TIT.2025.3642814","DOIUrl":"https://doi.org/10.1109/TIT.2025.3642814","url":null,"abstract":"<italic>Verifiable Secret-Sharing</i> (VSS) is a fundamental primitive in secure distributed computing that allows a designated dealer to share a secret among <italic>n</i> parties in the presence of an adversary controlling at most <italic>t</i> of them. We study VSS in the presence of <italic>computationally-bounded</i> adversaries. Known VSS protocols tolerate up to <inline-formula> <tex-math>$t_{s} lt frac {n}{2}$ </tex-math></inline-formula> corruptions assuming a well-behaved synchronous network but become insecure when the network delay becomes unstable. On the other hand, solutions in the asynchronous model operate under arbitrary network conditions but only tolerate up to <inline-formula> <tex-math>$t_{a} lt frac {n}{3}$ </tex-math></inline-formula> corruptions, even when the network is well-behaved. We aim to build a network-agnostic VSS protocol with the <italic>optimal</i> threshold conditions. A network-agnostic protocol provides the best possible security guarantees, irrespective of the type of underlying communication network. Previously, network-agnostic VSS is known either with <italic>perfect</i> security (Appan et al. IEEE IT 2023) where the threshold conditions are <italic>not</i> known to be optimal or with <italic>statistical security</i> (Appan et al. TCC 2023) where the threshold conditions are optimal, but the parties need to perform <italic>exponential</i> amount of computation and communication. Using our VSS protocol, we design a secure <italic>Multi-Party Computation</i> (MPC) protocol in the <italic>plain Public Key Infrastructure (PKI) model</i>, i.e., without assuming an expensive trusted setup. Although our proposed MPC protocol incurs higher communication complexity than state-of-the-art network-agnostic MPC protocols, it motivates alternative directions for designing <italic>computationally inexpensive</i> MPC protocols based on a plain PKI setup, which has not been explored in the domain of computationally secure network-agnostic MPC and offers valuable insights into designing it.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 2","pages":"1332-1363"},"PeriodicalIF":2.9,"publicationDate":"2025-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146015917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1