首页 > 最新文献

2022 IEEE International Symposium on Information Theory (ISIT)最新文献

英文 中文
Covert Communication in the Presence of an Uninformed, Informed, and Coordinated Jammer 在不知情、知情和协调干扰机存在下的秘密通信
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834682
Hassan ZivariFard, M. Bloch, Aria Nosratinia
This paper is eligible for the Jack Keil Wolf ISIT Student Paper Award. This paper investigates covert communication in the presence of a cooperative jammer. Covert communication refers to the inability of an adversary to distinguish data transmission from a so-called innocent symbol at the input. We consider three related problems: (1) a jammer without direct communication or coordination with the transmitter, (2) a jammer that cribs the output of the transmitter, and (3) a jammer that is able to coordinate with the transmitter via a secret key that is also shared with the legitimate receiver. For each model, we derive inner and outer bounds on the capacity region that are tight in some special cases. Unlike prior results in the literature, the jammer in our model does not have access to unlimited local randomness. In fact, uncovering the fundamental interplay between the covert communication rate, local randomness, and secret key rate, is one of the distinctions and contributions of the present work. In the context of a few specific channels, we calculate achievable covert rates to illuminate our results.
这篇论文有资格获得Jack Keil Wolf ISIT学生论文奖。本文研究了协作干扰存在下的隐蔽通信。秘密通信是指攻击者无法从输入的所谓无害符号中区分数据传输。我们考虑三个相关问题:(1)与发射机没有直接通信或协调的干扰机,(2)窃取发射机输出的干扰机,以及(3)能够通过也与合法接收器共享的密钥与发射机协调的干扰机。对于每个模型,我们推导出在某些特殊情况下容量区域的内界和外界是紧的。与文献中先前的结果不同,我们模型中的干扰器不具有无限的局部随机性。事实上,揭示隐蔽通信速率、局部随机性和秘密密钥速率之间的基本相互作用,是本研究的区别和贡献之一。在一些特定通道的背景下,我们计算可实现的隐蔽率来阐明我们的结果。
{"title":"Covert Communication in the Presence of an Uninformed, Informed, and Coordinated Jammer","authors":"Hassan ZivariFard, M. Bloch, Aria Nosratinia","doi":"10.1109/ISIT50566.2022.9834682","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834682","url":null,"abstract":"This paper is eligible for the Jack Keil Wolf ISIT Student Paper Award. This paper investigates covert communication in the presence of a cooperative jammer. Covert communication refers to the inability of an adversary to distinguish data transmission from a so-called innocent symbol at the input. We consider three related problems: (1) a jammer without direct communication or coordination with the transmitter, (2) a jammer that cribs the output of the transmitter, and (3) a jammer that is able to coordinate with the transmitter via a secret key that is also shared with the legitimate receiver. For each model, we derive inner and outer bounds on the capacity region that are tight in some special cases. Unlike prior results in the literature, the jammer in our model does not have access to unlimited local randomness. In fact, uncovering the fundamental interplay between the covert communication rate, local randomness, and secret key rate, is one of the distinctions and contributions of the present work. In the context of a few specific channels, we calculate achievable covert rates to illuminate our results.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126969976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
New Family of Cross Z-Complementary Sequences With Large ZCZ Width 具有大ZCZ宽度的交叉z互补序列新家族
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834651
Shibsankar Das, Adrish Banerjee, Zilong Liu
In this paper, we present a new family of cross Z-complementary pairs (CZCPs) based on generalized Boolean functions and two roots of unity. Our key idea is to consider an arbitrary partition of the set {1,2,⋯,n} with two subsets corresponding to two given roots of unity for which two truncated sequences of new alphabet size determined by the two roots of unity are obtained. We show that these two truncated sequences form a new q-ary CZCP with flexible sequence length and large zero-correlation zone width. Furthermore, we derive an enumeration formula by considering the Stirling number of the second kind for the partitions and show that the number of constructed CZCPs increases significantly compared to the existing works.
本文基于广义布尔函数和双单位根,给出了一类新的交叉z互补对。我们的关键思想是考虑集合{1,2,⋯,n}的任意划分,其中两个子集对应于两个给定的单位根,其中两个由单位根确定的新字母表大小的截断序列得到。我们证明了这两个截断序列形成了一个新的q-ary CZCP,具有灵活的序列长度和大的零相关带宽度。在此基础上,我们推导了分区的第二类Stirling数的枚举公式,并证明了与现有工程相比,构建的czcp数量显著增加。
{"title":"New Family of Cross Z-Complementary Sequences With Large ZCZ Width","authors":"Shibsankar Das, Adrish Banerjee, Zilong Liu","doi":"10.1109/ISIT50566.2022.9834651","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834651","url":null,"abstract":"In this paper, we present a new family of cross Z-complementary pairs (CZCPs) based on generalized Boolean functions and two roots of unity. Our key idea is to consider an arbitrary partition of the set {1,2,⋯,n} with two subsets corresponding to two given roots of unity for which two truncated sequences of new alphabet size determined by the two roots of unity are obtained. We show that these two truncated sequences form a new q-ary CZCP with flexible sequence length and large zero-correlation zone width. Furthermore, we derive an enumeration formula by considering the Stirling number of the second kind for the partitions and show that the number of constructed CZCPs increases significantly compared to the existing works.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"696 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116116331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Space Time Codes in Multi-Antenna Coded Caching Systems 多天线编码缓存系统中的空时码
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834484
A. Mahesh, B. Rajan
The paper "Adding transmitters dramatically boosts coded caching gains for finite file sizes" by E. Lampiris and P. Elia introduced multi antenna transmission as a possible strategy to increase coded caching gains. It showed that under the assumption of very high SNRs, if additive white Gaussian noise at the receivers is neglected, then full multiplexing as well as caching gain can be simultaneously obtained with reduced sub-packetization. In this paper, a more realistic setting where noise at the receivers is non-negligible is considered and a transmission scheme using space time codes is proposed to get diversity gain in addition to caching and multiplexing gains.
E. Lampiris和P. Elia的论文《在有限文件大小的情况下,增加发射机显著提高编码缓存增益》介绍了多天线传输作为增加编码缓存增益的可能策略。结果表明,在高信噪比的假设下,如果忽略接收机处的加性高斯白噪声,则可以在减少子分组的情况下同时获得完全复用和缓存增益。本文考虑了一个更现实的接收机噪声不可忽略的情况,提出了一种利用空时码的传输方案,除了高速缓存和复用增益外,还能获得分集增益。
{"title":"Space Time Codes in Multi-Antenna Coded Caching Systems","authors":"A. Mahesh, B. Rajan","doi":"10.1109/ISIT50566.2022.9834484","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834484","url":null,"abstract":"The paper \"Adding transmitters dramatically boosts coded caching gains for finite file sizes\" by E. Lampiris and P. Elia introduced multi antenna transmission as a possible strategy to increase coded caching gains. It showed that under the assumption of very high SNRs, if additive white Gaussian noise at the receivers is neglected, then full multiplexing as well as caching gain can be simultaneously obtained with reduced sub-packetization. In this paper, a more realistic setting where noise at the receivers is non-negligible is considered and a transmission scheme using space time codes is proposed to get diversity gain in addition to caching and multiplexing gains.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"472 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122493652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can we break the dependency in distributed detection? 我们能否打破分布式检测中的依赖关系?
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834790
Osama A. Hanna, Xinlin Li, C. Fragouli, S. Diggavi
We consider a distributed detection problem where sensors observe dependent observations. We ask, if we can allow the sensors to locally exchange a few bits with each other, whether we can use these bits to "break" the dependency of the sensor observations, and thus reduce the dependent detection problem to the much better-studied and understood case of conditionally independent observations. To this end, we propose an optimization problem that we prove is equivalent to minimizing the dependency between the sensor observations. This problem is in general NP-hard, however, we show that for at least some cases of Gaussian distributions it can be solved efficiently. For general distributions, we propose to use alternating minimization and derive a constant factor approximation algorithm. Numerical evaluations indicate that our approach can offer significant improvement in detection accuracy over alternative schemes.
我们考虑一个分布式检测问题,其中传感器观察依赖的观测值。我们的问题是,如果我们可以允许传感器局部交换一些比特,我们是否可以使用这些比特来“打破”传感器观测的依赖,从而将依赖检测问题减少到更好地研究和理解条件独立观测的情况。为此,我们提出了一个优化问题,我们证明了它等同于最小化传感器观测之间的依赖性。这个问题通常是np困难的,然而,我们证明了至少在一些高斯分布的情况下,它可以有效地解决。对于一般分布,我们建议使用交替最小化,并推导出一个常因子近似算法。数值评估表明,我们的方法可以提供显著提高检测精度比其他方案。
{"title":"Can we break the dependency in distributed detection?","authors":"Osama A. Hanna, Xinlin Li, C. Fragouli, S. Diggavi","doi":"10.1109/ISIT50566.2022.9834790","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834790","url":null,"abstract":"We consider a distributed detection problem where sensors observe dependent observations. We ask, if we can allow the sensors to locally exchange a few bits with each other, whether we can use these bits to \"break\" the dependency of the sensor observations, and thus reduce the dependent detection problem to the much better-studied and understood case of conditionally independent observations. To this end, we propose an optimization problem that we prove is equivalent to minimizing the dependency between the sensor observations. This problem is in general NP-hard, however, we show that for at least some cases of Gaussian distributions it can be solved efficiently. For general distributions, we propose to use alternating minimization and derive a constant factor approximation algorithm. Numerical evaluations indicate that our approach can offer significant improvement in detection accuracy over alternative schemes.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"396 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122817519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fully Analog Noise-Resilient Dynamical Systems Storing Binary Sequence 存储二进制序列的全模拟噪声弹性动力系统
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834448
T. Wadayama
This paper presents fully analog noise-resilient dynamical systems for storing a binary sequence. The proposed dynamical system is a gradient descent dynamical system based on a potential energy function defined based on a parity check matrix of a binary linear code. We assume that the dynamical system operates with stochastic disturbances such as thermal noises. We formulate the whole system, including stochastic disturbances, using stochastic differential equations (SDE). From a discretized stochastic difference equation, i.e., the Euler-Maruyama equation, we can study the covariance evolution of error vectors regarding the random walk of the system state around an equilibrium state. Some numerical evaluations for the (7,4) Hamming code and related codes indicate the robustness of the proposed dynamical system against the stochastic disturbances.
本文提出了用于存储二进制序列的全模拟抗噪声动力系统。所提出的动力系统是基于基于二进制线性码的奇偶校验矩阵定义的势能函数的梯度下降动力系统。我们假设动力系统在随机扰动(如热噪声)下运行。我们用随机微分方程(SDE)来描述整个系统,包括随机扰动。从离散化的随机差分方程,即Euler-Maruyama方程,我们可以研究系统状态在平衡状态周围随机游走时误差向量的协方差演化。对(7,4)汉明码及相关码的数值计算表明,所提出的动力系统对随机扰动具有鲁棒性。
{"title":"Fully Analog Noise-Resilient Dynamical Systems Storing Binary Sequence","authors":"T. Wadayama","doi":"10.1109/ISIT50566.2022.9834448","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834448","url":null,"abstract":"This paper presents fully analog noise-resilient dynamical systems for storing a binary sequence. The proposed dynamical system is a gradient descent dynamical system based on a potential energy function defined based on a parity check matrix of a binary linear code. We assume that the dynamical system operates with stochastic disturbances such as thermal noises. We formulate the whole system, including stochastic disturbances, using stochastic differential equations (SDE). From a discretized stochastic difference equation, i.e., the Euler-Maruyama equation, we can study the covariance evolution of error vectors regarding the random walk of the system state around an equilibrium state. Some numerical evaluations for the (7,4) Hamming code and related codes indicate the robustness of the proposed dynamical system against the stochastic disturbances.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128411093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Non-Binary High-Rate Repetition-Parity-Parity Codes Over the BEC BEC上非二进制高速率重复奇偶校验码的分析
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834620
I. Andriyanova, C. Poulliat
A new class of doubly-generalized LDPC codes over extended code alphabets has been recently proposed in [1]. These codes have been shown to have good asymptotic and minimum distance properties in the range of high code rates, and their structure is solely based on non-binary repetition and parity-check component codes. In this work we go further in the investigation of the new code class, called Repetition-parity-Parity (RPP) in the rest of the paper, by extending the definition of [1] to irregular degree distributions. One performs the asymptotic decoding analysis of the RPP ensemble over the binary erasure channel and formulates a degree distribution optimization problem by means of an approximated EXIT analysis. Some insights on the stability, minimum distance properties and low complexity encoding and decoding of RPP codes have been also developed.
最近在文献[1]中提出了一类新的扩展码字母表上的双广义LDPC码。这些码在高码率范围内具有良好的渐近和最小距离性质,其结构完全基于非二进制重复和奇偶校验分量码。在这项工作中,我们通过将[1]的定义扩展到不规则度分布,进一步研究了新的代码类,在本文的其余部分称为重复奇偶校验(RPP)。对二进制擦除信道上的RPP集成进行了渐近解码分析,并利用近似EXIT分析提出了一个度分布优化问题。在RPP码的稳定性、最小距离特性和低复杂度编解码方面也有了一些新的认识。
{"title":"Analysis of Non-Binary High-Rate Repetition-Parity-Parity Codes Over the BEC","authors":"I. Andriyanova, C. Poulliat","doi":"10.1109/ISIT50566.2022.9834620","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834620","url":null,"abstract":"A new class of doubly-generalized LDPC codes over extended code alphabets has been recently proposed in [1]. These codes have been shown to have good asymptotic and minimum distance properties in the range of high code rates, and their structure is solely based on non-binary repetition and parity-check component codes. In this work we go further in the investigation of the new code class, called Repetition-parity-Parity (RPP) in the rest of the paper, by extending the definition of [1] to irregular degree distributions. One performs the asymptotic decoding analysis of the RPP ensemble over the binary erasure channel and formulates a degree distribution optimization problem by means of an approximated EXIT analysis. Some insights on the stability, minimum distance properties and low complexity encoding and decoding of RPP codes have been also developed.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128516848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strong Data Processing Inequalities via Sums of Squares 通过平方和处理强数据不等式
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834406
Oisin Faust, Hamza Fawzi
A hierarchy of semidefinite programming relaxations is described which gives certified upper bounds on the strong data processing (SDPI) constant of a discrete channel. The relaxations rely on a combination of tools from approximation theory and sum-of-squares techniques. By leveraging the properties of rational Padé approximants, we prove that the hierarchy converges to the true SDPI constant. Numerical experiments are performed which verify that these relaxations are very accurate even at low levels of the hierarchy.
描述了一类半定规划松弛,给出了离散信道的强数据处理常数(SDPI)的证明上界。弛豫依赖于近似理论和平方和技术的组合。通过利用有理逼近的性质,我们证明了层次结构收敛于真实的SDPI常数。数值实验证明,即使在较低的层次上,这些松弛也是非常准确的。
{"title":"Strong Data Processing Inequalities via Sums of Squares","authors":"Oisin Faust, Hamza Fawzi","doi":"10.1109/ISIT50566.2022.9834406","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834406","url":null,"abstract":"A hierarchy of semidefinite programming relaxations is described which gives certified upper bounds on the strong data processing (SDPI) constant of a discrete channel. The relaxations rely on a combination of tools from approximation theory and sum-of-squares techniques. By leveraging the properties of rational Padé approximants, we prove that the hierarchy converges to the true SDPI constant. Numerical experiments are performed which verify that these relaxations are very accurate even at low levels of the hierarchy.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128617826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Gaussian Data Privacy Under Linear Function Recoverability 线性函数可恢复性下的高斯数据隐私
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834525
Ajaykrishnan Nageswaran
A user’s data is represented by a Gaussian random variable. Given a linear function of the data, a querier is required to recover, with at least a prescribed accuracy level, the function value based on a query response provided by the user. The user devises the query response, subject to the recoverability requirement, so as to maximize privacy of the data from the querier. Recoverability and privacy are both measured by ℓ2-distance criteria. An exact characterization is provided of maximum user data privacy under the recoverability condition. An explicit achievability scheme for the user is given and its privacy compared with a converse upper bound.
用户数据由高斯随机变量表示。给定数据的线性函数,查询程序需要根据用户提供的查询响应,至少以规定的精度级别恢复函数值。用户根据可恢复性要求设计查询响应,从而最大限度地保护查询者的数据隐私。可恢复性和隐私性都是通过l2距离标准来测量的。给出了可恢复性条件下最大用户数据隐私的精确表征。给出了用户的显式可达性方案,并将其隐私性与逆上界进行了比较。
{"title":"Gaussian Data Privacy Under Linear Function Recoverability","authors":"Ajaykrishnan Nageswaran","doi":"10.1109/ISIT50566.2022.9834525","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834525","url":null,"abstract":"A user’s data is represented by a Gaussian random variable. Given a linear function of the data, a querier is required to recover, with at least a prescribed accuracy level, the function value based on a query response provided by the user. The user devises the query response, subject to the recoverability requirement, so as to maximize privacy of the data from the querier. Recoverability and privacy are both measured by ℓ2-distance criteria. An exact characterization is provided of maximum user data privacy under the recoverability condition. An explicit achievability scheme for the user is given and its privacy compared with a converse upper bound.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127003564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Theoretic Private Inference in Quantized Models 量化模型中的信息论私有推理
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834464
Netanel Raviv, Rawad Bitar, Eitan Yaakobi
In a Private Inference scenario, a server holds a model (e.g., a neural network), a user holds data, and the user wishes to apply the model on her data. The privacy of both parties must be protected; the user’s data might contain confidential information, and the server’s model is his intellectual property.Private inference has been studied extensively in recent years, mostly from a cryptographic perspective by incorporating homo-morphic encryption and multiparty computation protocols, which incur high computational overhead and degrade the accuracy of the model. In this work we take a perpendicular approach which draws inspiration from the expansive Private Information Retrieval literature. We view private inference as the task of retrieving an inner product of a parameter vector with the data, a fundamental step in most machine learning models.By combining binary arithmetic with real-valued one, we present a scheme which enables the retrieval of the inner product for models whose weights are either binarized, or given in fixed-point representation; such models gained increased attention recently, due to their ease of implementation and increased robustness. We also present a fundamental trade-off between the privacy of the user and that of the server, and show that our scheme is optimal in this sense. Our scheme is simple, universal to a large family of models, provides clear information-theoretic guarantees to both parties with zero accuracy loss, and in addition, is compatible with continuous data distributions and allows infinite precision.
在私有推理场景中,服务器持有模型(例如,神经网络),用户持有数据,用户希望将模型应用于其数据。双方的隐私必须得到保护;用户的数据可能包含机密信息,服务器的模型是他的知识产权。近年来,人们对私有推理进行了广泛的研究,主要是从密码学的角度出发,将同态加密和多方计算协议结合在一起,这带来了很高的计算开销,降低了模型的准确性。在这项工作中,我们采用垂直的方法,从广泛的私人信息检索文献中汲取灵感。我们将私有推理视为检索参数向量与数据的内积的任务,这是大多数机器学习模型的基本步骤。通过将二值算法与实值算法相结合,我们提出了一种能够检索权值为二值化或以不动点表示的模型的内积的方案;由于易于实现和增强的健壮性,这些模型最近获得了越来越多的关注。我们还提出了用户隐私和服务器隐私之间的基本权衡,并表明我们的方案在这个意义上是最优的。我们的方案简单,适用于大量的模型,为双方提供了明确的信息论保证,零精度损失,并且兼容连续数据分布,允许无限精度。
{"title":"Information Theoretic Private Inference in Quantized Models","authors":"Netanel Raviv, Rawad Bitar, Eitan Yaakobi","doi":"10.1109/ISIT50566.2022.9834464","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834464","url":null,"abstract":"In a Private Inference scenario, a server holds a model (e.g., a neural network), a user holds data, and the user wishes to apply the model on her data. The privacy of both parties must be protected; the user’s data might contain confidential information, and the server’s model is his intellectual property.Private inference has been studied extensively in recent years, mostly from a cryptographic perspective by incorporating homo-morphic encryption and multiparty computation protocols, which incur high computational overhead and degrade the accuracy of the model. In this work we take a perpendicular approach which draws inspiration from the expansive Private Information Retrieval literature. We view private inference as the task of retrieving an inner product of a parameter vector with the data, a fundamental step in most machine learning models.By combining binary arithmetic with real-valued one, we present a scheme which enables the retrieval of the inner product for models whose weights are either binarized, or given in fixed-point representation; such models gained increased attention recently, due to their ease of implementation and increased robustness. We also present a fundamental trade-off between the privacy of the user and that of the server, and show that our scheme is optimal in this sense. Our scheme is simple, universal to a large family of models, provides clear information-theoretic guarantees to both parties with zero accuracy loss, and in addition, is compatible with continuous data distributions and allows infinite precision.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123909564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of an Age-Dependent Stochastic Hybrid System 年龄相关随机混合系统的分析
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834502
A. Maatouk, M. Assaad, A. Ephremides
In this paper, we provide an analysis of a status update system modeled through the Stochastic Hybrid Systems (SHSs) tool. Contrary to previous works, which assumed constant transition rates, we allow the system’s transition dynamics to be functions of the Age of Information (AoI). This dependence allows us to encapsulate many applications and opens the door for more sophisticated systems to be studied. However, this same dependence on the AoI engenders technical and analytical difficulties. Our paper provides a first step in addressing these difficulties. Specifically, we first showcase the regularity and other critical characteristics of the age process in our system of interest. Then, we provide a framework to establish the Lagrange stability and positive recurrence of the process. Building on these results, we provide an approach, dubbed as the moment closure technique, to compute the m-th moment of the age process for any m≥1. Interestingly, this technique allows us to approximate the average age of various systems by solving a simple set of linear equations.
本文通过随机混合系统(SHSs)工具对一个状态更新系统进行了建模分析。与之前的作品假设恒定的转换速率相反,我们允许系统的转换动态成为信息时代(AoI)的功能。这种依赖性使我们能够封装许多应用程序,并为研究更复杂的系统打开了大门。然而,对AoI的同样依赖会产生技术和分析上的困难。我们的论文为解决这些困难提供了第一步。具体来说,我们首先展示了我们感兴趣的系统中年龄过程的规律性和其他关键特征。然后,我们提供了一个框架来建立这个过程的拉格朗日稳定性和正递推性。在这些结果的基础上,我们提供了一种称为矩闭合技术的方法,用于计算任何m≥1的年龄过程的第m个矩。有趣的是,这种技术允许我们通过求解一组简单的线性方程来近似各种系统的平均年龄。
{"title":"Analysis of an Age-Dependent Stochastic Hybrid System","authors":"A. Maatouk, M. Assaad, A. Ephremides","doi":"10.1109/ISIT50566.2022.9834502","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834502","url":null,"abstract":"In this paper, we provide an analysis of a status update system modeled through the Stochastic Hybrid Systems (SHSs) tool. Contrary to previous works, which assumed constant transition rates, we allow the system’s transition dynamics to be functions of the Age of Information (AoI). This dependence allows us to encapsulate many applications and opens the door for more sophisticated systems to be studied. However, this same dependence on the AoI engenders technical and analytical difficulties. Our paper provides a first step in addressing these difficulties. Specifically, we first showcase the regularity and other critical characteristics of the age process in our system of interest. Then, we provide a framework to establish the Lagrange stability and positive recurrence of the process. Building on these results, we provide an approach, dubbed as the moment closure technique, to compute the m-th moment of the age process for any m≥1. Interestingly, this technique allows us to approximate the average age of various systems by solving a simple set of linear equations.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114701778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2022 IEEE International Symposium on Information Theory (ISIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1