首页 > 最新文献

IEEE Transactions on Information Theory最新文献

英文 中文
IEEE Transactions on Information Theory Information for Authors IEEE信息理论汇刊:作者信息
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-23 DOI: 10.1109/TIT.2025.3643223
{"title":"IEEE Transactions on Information Theory Information for Authors","authors":"","doi":"10.1109/TIT.2025.3643223","DOIUrl":"https://doi.org/10.1109/TIT.2025.3643223","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 1","pages":"C3-C3"},"PeriodicalIF":2.9,"publicationDate":"2025-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11313748","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145808628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TechRxiv: Share Your Preprint Research with the World! techxiv:与世界分享你的预印本研究!
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-23 DOI: 10.1109/TIT.2025.3643249
{"title":"TechRxiv: Share Your Preprint Research with the World!","authors":"","doi":"10.1109/TIT.2025.3643249","DOIUrl":"https://doi.org/10.1109/TIT.2025.3643249","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 1","pages":"810-810"},"PeriodicalIF":2.9,"publicationDate":"2025-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11313722","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145808593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Monotonicity Testing in Sublinear Time 亚线性时间下的自适应单调性检验
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-22 DOI: 10.1109/TIT.2025.3646887
Housen Li;Zhi Liu;Axel Munk
Modern large-scale data analysis increasingly faces the challenge of achieving computational efficiency as well as statistical accuracy, as classical statistically efficient methods often fall short in the first regard. In the context of testing monotonicity of a regression function, we propose FOMT (Fast and Optimal Monotonicity Test), a novel methodology tailored to meet these dual demands. FOMT employs a sparse collection of local tests, strategically generated at random, to detect violations of monotonicity scattered throughout the domain of the regression function. This sparsity enables significant computational efficiency, achieving sublinear runtime in most cases, and quasilinear runtime (i.e. linear up to a log factor) in the worst case. In contrast, existing statistically optimal tests typically require at least quadratic runtime. FOMT’s statistical accuracy is achieved through the precise calibration of these local tests and their effective combination, ensuring both sensitivity to violations and control over false positives. More precisely, we show that FOMT separates the null and alternative hypotheses at minimax optimal rates over Hölder function classes of smoothness order in ( $0,2$ ]. Further, when the smoothness is unknown, we introduce an adaptive version of FOMT, based on a modified Lepskii principle, which attains statistical optimality and meanwhile maintains the same computational complexity as if the intrinsic smoothness were known. Extensive simulations confirm the competitiveness and effectiveness of both FOMT and its adaptive variant.
现代大规模数据分析越来越多地面临着计算效率和统计准确性的挑战,因为经典的统计高效方法往往在第一个方面存在不足。在测试回归函数单调性的背景下,我们提出了fomo(快速和最优单调性测试),这是一种专门为满足这些双重需求而量身定制的新方法。fft采用局部测试的稀疏集合,策略上随机生成,以检测分散在整个回归函数域中的单调性违反。这种稀疏性可以显著提高计算效率,在大多数情况下实现亚线性运行,在最坏的情况下实现拟线性运行(即线性到一个对数因子)。相比之下,现有的统计最优测试通常需要至少二次的运行时间。fomo的统计准确性是通过对这些本地测试的精确校准及其有效组合来实现的,从而确保对违规行为的敏感性和对假阳性的控制。更准确地说,我们证明了fmt在($0,2$]中的平滑阶的Hölder函数类上以最小最大最优速率分离了零假设和备选假设。此外,当平滑度未知时,我们基于改进的Lepskii原理引入了自适应版本的FOMT,该方法实现了统计最优性,同时保持了与固有平滑度已知时相同的计算复杂度。大量的仿真验证了FOMT及其自适应变体的竞争力和有效性。
{"title":"Adaptive Monotonicity Testing in Sublinear Time","authors":"Housen Li;Zhi Liu;Axel Munk","doi":"10.1109/TIT.2025.3646887","DOIUrl":"https://doi.org/10.1109/TIT.2025.3646887","url":null,"abstract":"Modern large-scale data analysis increasingly faces the challenge of achieving computational efficiency as well as statistical accuracy, as classical statistically efficient methods often fall short in the first regard. In the context of testing monotonicity of a regression function, we propose FOMT (Fast and Optimal Monotonicity Test), a novel methodology tailored to meet these dual demands. FOMT employs a sparse collection of <italic>local</i> tests, strategically generated at random, to detect violations of monotonicity scattered throughout the domain of the regression function. This sparsity enables significant computational efficiency, achieving sublinear runtime in most cases, and quasilinear runtime (i.e. linear up to a log factor) in the worst case. In contrast, existing statistically optimal tests typically require at least quadratic runtime. FOMT’s statistical accuracy is achieved through the precise calibration of these local tests and their effective combination, ensuring both sensitivity to violations and control over false positives. More precisely, we show that FOMT separates the null and alternative hypotheses at minimax optimal rates over Hölder function classes of smoothness order in (<inline-formula> <tex-math>$0,2$ </tex-math></inline-formula>]. Further, when the smoothness is unknown, we introduce an adaptive version of FOMT, based on a modified Lepskii principle, which attains statistical optimality and meanwhile maintains the same computational complexity as if the intrinsic smoothness were known. Extensive simulations confirm the competitiveness and effectiveness of both FOMT and its adaptive variant.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 2","pages":"1240-1275"},"PeriodicalIF":2.9,"publicationDate":"2025-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146015914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convergence Rates for Softmax Gating Mixture of Experts Softmax门控混合专家的收敛速度
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-22 DOI: 10.1109/TIT.2025.3647061
Huy Nguyen;Nhat Ho;Alessandro Rinaldo
Mixture of experts (MoE) has recently emerged as an effective framework for deploying machine learning models in a scalable and efficient way by softly dividing complex tasks among multiple specialized sub-models termed experts. Central to the success of MoE is an adaptive gating mechanism which determines the relevance of each expert to a given input and then dynamically assigns experts their respective weights. Despite its widespread use in practice, a comprehensive study on the effects of the softmax gating on the MoE has been lacking in the literature. To bridge this gap, we conduct a thorough theoretical analysis of the convergence rates for the problem of parameter estimation and expert estimation. We consider standard softmax gating and several variants, including a dense-to-sparse gating and a hierarchical softmax gating. Our theoretical results provide useful insights into the design of sample-efficient expert structures. In particular, we demonstrate that it requires polynomially many data points to estimate experts satisfying our proposed strong identifiability condition, namely a commonly used two-layer feed-forward network. In stark contrast, estimating linear experts, which violate the strong identifiability condition, necessitates exponentially many data points as a result of intrinsic parameter interactions, which we express in the language of partial differential equations.
混合专家(MoE)最近成为一种有效的框架,通过将复杂的任务轻轻地划分到称为专家的多个专门子模型中,以可扩展和有效的方式部署机器学习模型。MoE成功的核心是一种自适应门控机制,该机制确定每个专家与给定输入的相关性,然后动态地为专家分配各自的权重。尽管软门控在实践中得到了广泛的应用,但文献中缺乏对软门控对MoE影响的全面研究。为了弥补这一差距,我们对参数估计和专家估计问题的收敛速度进行了深入的理论分析。我们考虑了标准软最大门控和几种变体,包括密集到稀疏门控和分层软最大门控。我们的理论结果为样本高效专家结构的设计提供了有用的见解。特别是,我们证明了它需要多项式个数据点来估计满足我们提出的强可识别性条件的专家,即常用的两层前馈网络。与此形成鲜明对比的是,估计线性专家,违反强可辨识性条件,需要指数级多的数据点作为内在参数相互作用的结果,我们用偏微分方程的语言表示。
{"title":"Convergence Rates for Softmax Gating Mixture of Experts","authors":"Huy Nguyen;Nhat Ho;Alessandro Rinaldo","doi":"10.1109/TIT.2025.3647061","DOIUrl":"https://doi.org/10.1109/TIT.2025.3647061","url":null,"abstract":"Mixture of experts (MoE) has recently emerged as an effective framework for deploying machine learning models in a scalable and efficient way by softly dividing complex tasks among multiple specialized sub-models termed experts. Central to the success of MoE is an adaptive gating mechanism which determines the relevance of each expert to a given input and then dynamically assigns experts their respective weights. Despite its widespread use in practice, a comprehensive study on the effects of the softmax gating on the MoE has been lacking in the literature. To bridge this gap, we conduct a thorough theoretical analysis of the convergence rates for the problem of parameter estimation and expert estimation. We consider standard softmax gating and several variants, including a dense-to-sparse gating and a hierarchical softmax gating. Our theoretical results provide useful insights into the design of sample-efficient expert structures. In particular, we demonstrate that it requires polynomially many data points to estimate experts satisfying our proposed <italic>strong identifiability</i> condition, namely a commonly used two-layer feed-forward network. In stark contrast, estimating linear experts, which violate the strong identifiability condition, necessitates exponentially many data points as a result of intrinsic parameter interactions, which we express in the language of partial differential equations.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 2","pages":"1276-1304"},"PeriodicalIF":2.9,"publicationDate":"2025-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146015927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Minimax Risk in Testing Uniformity Over Large Alphabets Under Missing-Ball Alternatives 在失球选项下测试大字母一致性的最小最大风险
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-22 DOI: 10.1109/TIT.2025.3646804
Alon Kipnis
We study the problem of testing the goodness of fit of categorical count data to a Poisson distribution uniform over the categories, against a class of alternatives defined by excluding an $ell _{p}$ ball, $p leq 2$ , of radius $epsilon $ around the uniform rate sequence. We characterize the minimax risk for this problem as the expected number of samples $n$ and the number of categories $N$ go to infinity. Our result enables constant-factor comparisons among the many estimators previously proposed for this problem, rather than comparisons only at the level of convergence rates or scaling orders of sample complexity. The minimax test relies exclusively on collisions in the small sample limit, but behaves like the chi-squared test otherwise. Empirical studies across a range of parameters show that the asymptotic risk estimate is accurate in finite samples, and that the minimax test outperforms both the chi-squared test and a test based on collisions under the least favorable alternative. Our analysis involves a reduction to a structured subset of alternatives, establishing uniform asymptotic normality for a family of linear test statistics, and solving an optimization problem over $N$ -dimensional sequences akin to classical results from signal detection in Gaussian white noise. Finally, we discuss the connection to the fixed-sample-size multinomial model, arguing that the Poisson minimax risk derived here also characterizes the minimax risk of the multinomial problem.
我们研究了一个问题,检验类别计数数据对类别上均匀泊松分布的拟合优度,该问题是针对一类通过排除均匀率序列周围半径为$epsilon $的$ell _{p}$球$p leq 2$来定义的备选方案。我们将这个问题的最大最小风险描述为样本的期望数量$n$和类别的数量$N$趋于无穷大。我们的结果能够在先前为这个问题提出的许多估计器之间进行常数因子比较,而不是仅在收敛速率或样本复杂性的缩放顺序上进行比较。极大极小检验完全依赖于小样本极限的碰撞,但在其他方面表现得像卡方检验。在一系列参数范围内的实证研究表明,在有限样本中,渐近风险估计是准确的,极小极大检验优于卡方检验和基于最不利选择的碰撞检验。我们的分析涉及到一个可选方案的结构化子集,为一组线性检验统计量建立一致渐近正态性,并在$N$维序列上解决一个优化问题,类似于高斯白噪声中信号检测的经典结果。最后,我们讨论了与固定样本大小多项式模型的联系,认为这里导出的泊松极大极小风险也表征了多项式问题的极大极小风险。
{"title":"The Minimax Risk in Testing Uniformity Over Large Alphabets Under Missing-Ball Alternatives","authors":"Alon Kipnis","doi":"10.1109/TIT.2025.3646804","DOIUrl":"https://doi.org/10.1109/TIT.2025.3646804","url":null,"abstract":"We study the problem of testing the goodness of fit of categorical count data to a Poisson distribution uniform over the categories, against a class of alternatives defined by excluding an <inline-formula> <tex-math>$ell _{p}$ </tex-math></inline-formula> ball, <inline-formula> <tex-math>$p leq 2$ </tex-math></inline-formula>, of radius <inline-formula> <tex-math>$epsilon $ </tex-math></inline-formula> around the uniform rate sequence. We characterize the minimax risk for this problem as the expected number of samples <inline-formula> <tex-math>$n$ </tex-math></inline-formula> and the number of categories <inline-formula> <tex-math>$N$ </tex-math></inline-formula> go to infinity. Our result enables constant-factor comparisons among the many estimators previously proposed for this problem, rather than comparisons only at the level of convergence rates or scaling orders of sample complexity. The minimax test relies exclusively on collisions in the small sample limit, but behaves like the chi-squared test otherwise. Empirical studies across a range of parameters show that the asymptotic risk estimate is accurate in finite samples, and that the minimax test outperforms both the chi-squared test and a test based on collisions under the least favorable alternative. Our analysis involves a reduction to a structured subset of alternatives, establishing uniform asymptotic normality for a family of linear test statistics, and solving an optimization problem over <inline-formula> <tex-math>$N$ </tex-math></inline-formula>-dimensional sequences akin to classical results from signal detection in Gaussian white noise. Finally, we discuss the connection to the fixed-sample-size multinomial model, arguing that the Poisson minimax risk derived here also characterizes the minimax risk of the multinomial problem.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 3","pages":"1831-1849"},"PeriodicalIF":2.9,"publicationDate":"2025-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11310811","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146216606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiset Combinatorial Gray Codes With Application to Proximity Sensor Networks 多集组合灰度码在接近传感器网络中的应用
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-19 DOI: 10.1109/TIT.2025.3646470
Chung Shue Chen;Wing Shing Wong;Yuan-Hsun Lo;Tsai-Lien Wong
We investigate coding schemes that map source symbols into multisets of an alphabet. Such a formulation of source coding is an alternative approach to the traditional framework and is inspired by an object tracking problem over proximity sensor networks. We define a multiset combinatorial Gray code as a multiset code with fixed multiset cardinality that possesses combinatorial Gray code characteristic. For source codes that are organized as a grid, namely an integer lattice, we propose a solution by first constructing a mapping from the grid to the set of symbols, which we referred to as colors. The codes are then defined as the images of rectangular blocks in the grid of fixed dimensions. We refer to the mapping as a color mapping and the code as a color multiset code. We propose the idea of product multiset code that enables us to construct codes for high dimensional grids based on 1-dimensional (1D) grids. We provide a detailed analysis of color multiset codes on 1D grids, focusing on codes that require the minimal number of colors. To illustrate the application of such a coding scheme, we consider an object tracking problem on 2D grids and show its efficiency, which comes from exploiting transmission parallelism. Some numerical results are presented to conclude the paper.
我们研究了将源符号映射到字母表的多集的编码方案。这种源编码的表述是传统框架的一种替代方法,其灵感来自于接近传感器网络上的目标跟踪问题。我们将多集组合格雷码定义为具有固定多集基数且具有组合格雷码特征的多集码。对于组织为网格(即整数晶格)的源代码,我们提出一种解决方案,首先构建从网格到符号集的映射,我们将其称为颜色。然后将编码定义为固定尺寸网格中矩形块的图像。我们将映射称为颜色映射,将代码称为颜色多集代码。我们提出了积多集码的思想,使我们能够基于一维(1D)网格构建高维网格的代码。我们对一维网格上的颜色多集代码进行了详细的分析,重点是需要最少颜色数量的代码。为了说明这种编码方案的应用,我们考虑了二维网格上的目标跟踪问题,并展示了它的效率,它来自于利用传输并行性。最后给出了一些数值结果来对本文进行总结。
{"title":"Multiset Combinatorial Gray Codes With Application to Proximity Sensor Networks","authors":"Chung Shue Chen;Wing Shing Wong;Yuan-Hsun Lo;Tsai-Lien Wong","doi":"10.1109/TIT.2025.3646470","DOIUrl":"https://doi.org/10.1109/TIT.2025.3646470","url":null,"abstract":"We investigate coding schemes that map source symbols into multisets of an alphabet. Such a formulation of source coding is an alternative approach to the traditional framework and is inspired by an object tracking problem over proximity sensor networks. We define a <italic>multiset combinatorial Gray code</i> as a multiset code with fixed multiset cardinality that possesses combinatorial Gray code characteristic. For source codes that are organized as a grid, namely an integer lattice, we propose a solution by first constructing a mapping from the grid to the set of symbols, which we referred to as colors. The codes are then defined as the images of rectangular blocks in the grid of fixed dimensions. We refer to the mapping as a <italic>color mapping</i> and the code as a <italic>color multiset code</i>. We propose the idea of product multiset code that enables us to construct codes for high dimensional grids based on 1-dimensional (1D) grids. We provide a detailed analysis of color multiset codes on 1D grids, focusing on codes that require the minimal number of colors. To illustrate the application of such a coding scheme, we consider an object tracking problem on 2D grids and show its efficiency, which comes from exploiting transmission parallelism. Some numerical results are presented to conclude the paper.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 2","pages":"1378-1392"},"PeriodicalIF":2.9,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146015947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sequential Change Detection With Differential Privacy 具有差分隐私的顺序更改检测
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-16 DOI: 10.1109/TIT.2025.3644744
Liyan Xie;Ruizhi Zhang
Sequential change detection is a fundamental problem in statistics and signal processing, with the CUSUM procedure widely used to achieve minimax detection delay under a prescribed false-alarm rate when pre- and post-change distributions are fully known. However, releasing CUSUM statistics and the corresponding stopping time directly can compromise individual data privacy. We therefore introduce a differentially private (DP) variant, called DP-CUSUM, that injects calibrated Laplace noise into both the vanilla CUSUM statistics and the detection threshold, preserving the recursive simplicity of the classical CUSUM statistics while ensuring per-sample differential privacy. We derive closed-form bounds on the average run length to false alarm and on the worst-case average detection delay, explicitly characterizing the trade-off among privacy level, false-alarm rate, and detection efficiency. Our theoretical results imply that under a weak privacy constraint, our proposed DP-CUSUM procedure achieves the same first-order asymptotic optimality as the classical, non-private CUSUM procedure. Numerical simulations are conducted to demonstrate the detection efficiency of our proposed DP-CUSUM under different privacy constraints, and the results are consistent with our theoretical findings.
序列变化检测是统计学和信号处理中的一个基本问题,CUSUM程序被广泛用于在完全知道变化前后分布的情况下,在规定的虚警率下实现最小最大检测延迟。但是,直接发布CUSUM统计数据和相应的停止时间会损害个人数据隐私。因此,我们引入了一种差分私有(DP)变体,称为DP-CUSUM,它将校准的拉普拉斯噪声注入到香草CUSUM统计数据和检测阈值中,在确保每个样本差分隐私的同时保留了经典CUSUM统计数据的递归简单性。我们推导了到虚警的平均运行长度和最坏情况下的平均检测延迟的封闭形式边界,明确地描述了隐私级别、虚警率和检测效率之间的权衡。我们的理论结果表明,在弱隐私约束下,我们提出的DP-CUSUM过程与经典的非隐私CUSUM过程具有相同的一阶渐近最优性。通过数值模拟验证了本文提出的DP-CUSUM在不同隐私约束下的检测效率,结果与理论研究结果一致。
{"title":"Sequential Change Detection With Differential Privacy","authors":"Liyan Xie;Ruizhi Zhang","doi":"10.1109/TIT.2025.3644744","DOIUrl":"https://doi.org/10.1109/TIT.2025.3644744","url":null,"abstract":"Sequential change detection is a fundamental problem in statistics and signal processing, with the CUSUM procedure widely used to achieve minimax detection delay under a prescribed false-alarm rate when pre- and post-change distributions are fully known. However, releasing CUSUM statistics and the corresponding stopping time directly can compromise individual data privacy. We therefore introduce a differentially private (DP) variant, called DP-CUSUM, that injects calibrated Laplace noise into both the vanilla CUSUM statistics and the detection threshold, preserving the recursive simplicity of the classical CUSUM statistics while ensuring per-sample differential privacy. We derive closed-form bounds on the average run length to false alarm and on the worst-case average detection delay, explicitly characterizing the trade-off among privacy level, false-alarm rate, and detection efficiency. Our theoretical results imply that under a weak privacy constraint, our proposed DP-CUSUM procedure achieves the same first-order asymptotic optimality as the classical, non-private CUSUM procedure. Numerical simulations are conducted to demonstrate the detection efficiency of our proposed DP-CUSUM under different privacy constraints, and the results are consistent with our theoretical findings.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 2","pages":"1319-1331"},"PeriodicalIF":2.9,"publicationDate":"2025-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146015937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strong Converse Exponent of Quantum Dichotomies 量子二分类的强逆指数
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-12 DOI: 10.1109/TIT.2025.3643514
Mario Berta;Yongsheng Yao
The quantum dichotomies problem asks at what rate one pair of quantum states can be approximately mapped into another pair of quantum states. In the many copy limit and for vanishing error, the optimal rate is known to be given by the ratio of the respective quantum relative distances. Here, we study the large-deviation behavior of quantum dichotomies and determine the exact strong converse exponent based on the purified distance. This is the first time to establish the exact high-error large-deviation analysis for this task in fully quantum setting.
量子二分类问题问的是一对量子态以什么速率可以近似地映射到另一对量子态。在多拷贝极限和误差消失情况下,已知最佳速率由各自量子相对距离之比给出。在此,我们研究了量子二分类的大偏差行为,并基于纯化距离确定了精确的强逆指数。这是首次在全量子环境下建立精确的高误差大偏差分析方法。
{"title":"Strong Converse Exponent of Quantum Dichotomies","authors":"Mario Berta;Yongsheng Yao","doi":"10.1109/TIT.2025.3643514","DOIUrl":"https://doi.org/10.1109/TIT.2025.3643514","url":null,"abstract":"The quantum dichotomies problem asks at what rate one pair of quantum states can be approximately mapped into another pair of quantum states. In the many copy limit and for vanishing error, the optimal rate is known to be given by the ratio of the respective quantum relative distances. Here, we study the large-deviation behavior of quantum dichotomies and determine the exact strong converse exponent based on the purified distance. This is the first time to establish the exact high-error large-deviation analysis for this task in fully quantum setting.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 2","pages":"1212-1219"},"PeriodicalIF":2.9,"publicationDate":"2025-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146015928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network-Agnostic Verifiable Secret Sharing With Cryptographic Security 网络不可知的可验证秘密共享与加密安全
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-11 DOI: 10.1109/TIT.2025.3642814
Nidhish Bhimrajka;Ashish Choudhury;Supreeth Varadarajan
Verifiable Secret-Sharing (VSS) is a fundamental primitive in secure distributed computing that allows a designated dealer to share a secret among n parties in the presence of an adversary controlling at most t of them. We study VSS in the presence of computationally-bounded adversaries. Known VSS protocols tolerate up to $t_{s} lt frac {n}{2}$ corruptions assuming a well-behaved synchronous network but become insecure when the network delay becomes unstable. On the other hand, solutions in the asynchronous model operate under arbitrary network conditions but only tolerate up to $t_{a} lt frac {n}{3}$ corruptions, even when the network is well-behaved. We aim to build a network-agnostic VSS protocol with the optimal threshold conditions. A network-agnostic protocol provides the best possible security guarantees, irrespective of the type of underlying communication network. Previously, network-agnostic VSS is known either with perfect security (Appan et al. IEEE IT 2023) where the threshold conditions are not known to be optimal or with statistical security (Appan et al. TCC 2023) where the threshold conditions are optimal, but the parties need to perform exponential amount of computation and communication. Using our VSS protocol, we design a secure Multi-Party Computation (MPC) protocol in the plain Public Key Infrastructure (PKI) model, i.e., without assuming an expensive trusted setup. Although our proposed MPC protocol incurs higher communication complexity than state-of-the-art network-agnostic MPC protocols, it motivates alternative directions for designing computationally inexpensive MPC protocols based on a plain PKI setup, which has not been explored in the domain of computationally secure network-agnostic MPC and offers valuable insights into designing it.
可验证秘密共享(VSS)是安全分布式计算中的一个基本元素,它允许指定的交易商在对手最多控制其中t方的情况下在n方之间共享秘密。我们在存在计算有界对手的情况下研究VSS。假设一个行为良好的同步网络,已知的VSS协议可以容忍高达$t_{s} lt frac {n}{2}$损坏,但当网络延迟变得不稳定时,它就变得不安全了。另一方面,异步模型中的解决方案在任意网络条件下运行,但只允许最多$t_{a} lt frac {n}{3}$损坏,即使网络运行良好。我们的目标是建立一个具有最优阈值条件的网络不可知VSS协议。无论底层通信网络的类型如何,网络无关协议都提供了最好的安全保证。以前,网络不可知的VSS要么具有完美的安全性(Appan等人);IEEE IT 2023),其中阈值条件不知道是最佳的或具有统计安全性(Appan等人)。TCC 2023),其中阈值条件是最优的,但各方需要执行指数级的计算和通信。使用我们的VSS协议,我们在普通公钥基础设施(PKI)模型中设计了一个安全的多方计算(MPC)协议,即不假设昂贵的可信设置。尽管我们提出的MPC协议比最先进的网络无关MPC协议带来更高的通信复杂性,但它激发了基于普通PKI设置设计计算成本低廉的MPC协议的替代方向,这在计算安全的网络无关MPC领域尚未被探索,并为设计它提供了有价值的见解。
{"title":"Network-Agnostic Verifiable Secret Sharing With Cryptographic Security","authors":"Nidhish Bhimrajka;Ashish Choudhury;Supreeth Varadarajan","doi":"10.1109/TIT.2025.3642814","DOIUrl":"https://doi.org/10.1109/TIT.2025.3642814","url":null,"abstract":"<italic>Verifiable Secret-Sharing</i> (VSS) is a fundamental primitive in secure distributed computing that allows a designated dealer to share a secret among <italic>n</i> parties in the presence of an adversary controlling at most <italic>t</i> of them. We study VSS in the presence of <italic>computationally-bounded</i> adversaries. Known VSS protocols tolerate up to <inline-formula> <tex-math>$t_{s} lt frac {n}{2}$ </tex-math></inline-formula> corruptions assuming a well-behaved synchronous network but become insecure when the network delay becomes unstable. On the other hand, solutions in the asynchronous model operate under arbitrary network conditions but only tolerate up to <inline-formula> <tex-math>$t_{a} lt frac {n}{3}$ </tex-math></inline-formula> corruptions, even when the network is well-behaved. We aim to build a network-agnostic VSS protocol with the <italic>optimal</i> threshold conditions. A network-agnostic protocol provides the best possible security guarantees, irrespective of the type of underlying communication network. Previously, network-agnostic VSS is known either with <italic>perfect</i> security (Appan et al. IEEE IT 2023) where the threshold conditions are <italic>not</i> known to be optimal or with <italic>statistical security</i> (Appan et al. TCC 2023) where the threshold conditions are optimal, but the parties need to perform <italic>exponential</i> amount of computation and communication. Using our VSS protocol, we design a secure <italic>Multi-Party Computation</i> (MPC) protocol in the <italic>plain Public Key Infrastructure (PKI) model</i>, i.e., without assuming an expensive trusted setup. Although our proposed MPC protocol incurs higher communication complexity than state-of-the-art network-agnostic MPC protocols, it motivates alternative directions for designing <italic>computationally inexpensive</i> MPC protocols based on a plain PKI setup, which has not been explored in the domain of computationally secure network-agnostic MPC and offers valuable insights into designing it.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 2","pages":"1332-1363"},"PeriodicalIF":2.9,"publicationDate":"2025-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146015917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Huber-Robust Likelihood Ratio Tests for Composite Nulls and Alternatives 复合零值和替代值的Huber-Robust似然比检验
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-08 DOI: 10.1109/TIT.2025.3641166
Aytijhya Saha;Aaditya Ramdas
We propose an e-value based framework for testing arbitrary composite nulls against composite alternatives, when an $epsilon $ fraction of the data can be arbitrarily corrupted. Our tests are inherently sequential, being valid at arbitrary data-dependent stopping times, but they are new even for fixed sample sizes, giving type-I error control without any regularity conditions. We first prove that least favourable distribution (LFD) pairs, when they exist, yield optimal e-values for testing arbitrary composite nulls against composite alternatives. Then we show that if an LFD pair exists for some composite null and alternative, then the LFDs of Huber’s $epsilon $ -contamination or total variation (TV) neighborhoods around that specific pair form the optimal LFD pair for the corresponding robustified composite hypotheses. Furthermore, where LFDs do not exist, we develop new robust composite tests for general settings. Our test statistics are a nonnegative supermartingale under the (robust) null, even under a sequentially adaptive (non-i.i.d.) contamination model where the conditional distribution of each observation given the past data lies within an $epsilon $ TV ball of some distribution in the original composite null. When LFDs exist, our supermartingale grows to infinity exponentially fast under any distribution in the ( $epsilon $ TV-corruption of the) alternative at the optimal rate. When LFDs do not exist, we provide an asymptotic growth rate analysis, showing that as $epsilon to 0$ , the exponent converges to the corresponding Kullback–Leibler divergence, recovering the classical optimal non-robust rate. Simulations validate the theory and demonstrate reasonable practical performance.
我们提出了一个基于e值的框架,用于测试任意复合null与复合替代,当数据的$epsilon $分数可以被任意损坏时。我们的测试本质上是顺序的,在任意依赖于数据的停止时间都有效,但即使对于固定的样本量,它们也是新的,在没有任何规则条件的情况下提供i型错误控制。我们首先证明了最不利分布(LFD)对,当它们存在时,可以产生最优的e值,用于测试任意组合空对组合替代。然后,我们证明了如果某个复合零值和可选值存在LFD对,那么围绕该特定对的Huber 's $epsilon $ -污染或总变差(TV)邻域的LFD形成相应鲁棒化复合假设的最优LFD对。此外,在不存在lfd的情况下,我们为一般设置开发了新的健壮的复合测试。我们的检验统计量在(鲁棒)null下是非负的上鞅,即使在顺序自适应(非i.i.d)污染模型下,给定过去数据的每个观测值的条件分布位于原始复合null中某些分布的$epsilon $ TV球内。当lfd存在时,我们的上鞅在($epsilon $ TV-corruption)的任意分布下以最优速率呈指数级快速增长到无穷大。当lfd不存在时,我们给出了渐近增长率分析,表明当$epsilon 到0$时,指数收敛于相应的Kullback-Leibler散度,恢复经典的最优非鲁棒率。仿真验证了理论的正确性,并展示了合理的实际性能。
{"title":"Huber-Robust Likelihood Ratio Tests for Composite Nulls and Alternatives","authors":"Aytijhya Saha;Aaditya Ramdas","doi":"10.1109/TIT.2025.3641166","DOIUrl":"https://doi.org/10.1109/TIT.2025.3641166","url":null,"abstract":"We propose an e-value based framework for testing arbitrary composite nulls against composite alternatives, when an <inline-formula> <tex-math>$epsilon $ </tex-math></inline-formula> fraction of the data can be arbitrarily corrupted. Our tests are inherently sequential, being valid at arbitrary data-dependent stopping times, but they are new even for fixed sample sizes, giving type-I error control without any regularity conditions. We first prove that least favourable distribution (LFD) pairs, when they exist, yield optimal e-values for testing arbitrary composite nulls against composite alternatives. Then we show that if an LFD pair exists for some composite null and alternative, then the LFDs of Huber’s <inline-formula> <tex-math>$epsilon $ </tex-math></inline-formula>-contamination or total variation (TV) neighborhoods around that specific pair form the optimal LFD pair for the corresponding robustified composite hypotheses. Furthermore, where LFDs do not exist, we develop new robust composite tests for general settings. Our test statistics are a nonnegative supermartingale under the (robust) null, even under a sequentially adaptive (non-i.i.d.) contamination model where the conditional distribution of each observation given the past data lies within an <inline-formula> <tex-math>$epsilon $ </tex-math></inline-formula> TV ball of some distribution in the original composite null. When LFDs exist, our supermartingale grows to infinity exponentially fast under any distribution in the (<inline-formula> <tex-math>$epsilon $ </tex-math></inline-formula> TV-corruption of the) alternative at the optimal rate. When LFDs do not exist, we provide an asymptotic growth rate analysis, showing that as <inline-formula> <tex-math>$epsilon to 0$ </tex-math></inline-formula>, the exponent converges to the corresponding Kullback–Leibler divergence, recovering the classical optimal non-robust rate. Simulations validate the theory and demonstrate reasonable practical performance.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 1","pages":"501-520"},"PeriodicalIF":2.9,"publicationDate":"2025-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145808601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1