Skip to main content

Showing 1–14 of 14 results for author: Cervia, G

.
  1. arXiv:2304.07722  [pdf, ps, other

    cs.IT cs.CR

    Pointwise Maximal Leakage on General Alphabets

    Authors: Sara Saeidian, Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund

    Abstract: Pointwise maximal leakage (PML) is an operationally meaningful privacy measure that quantifies the amount of information leaking about a secret $X$ to a single outcome of a related random variable $Y$. In this paper, we extend the notion of PML to random variables on arbitrary probability spaces. We develop two new definitions: First, we extend PML to countably infinite random variables by conside… ▽ More

    Submitted 16 April, 2023; originally announced April 2023.

    Comments: Accepted for presentation at ISIT2023

  2. arXiv:2303.07782  [pdf, ps, other

    cs.CR cs.IT

    Inferential Privacy: From Impossibility to Database Privacy

    Authors: Sara Saeidian, Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We investigate the possibility of guaranteeing inferential privacy for mechanisms that release useful information about some data containing sensitive information, denoted by $X$. We describe a general model of utility and privacy in which utility is achieved by disclosing the value of low-entropy features of $X$, while privacy is maintained by kee** high-entropy features of $X$ secret. Adopting… ▽ More

    Submitted 14 March, 2023; originally announced March 2023.

  3. Pointwise Maximal Leakage

    Authors: Sara Saeidian, Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We introduce a privacy measure called pointwise maximal leakage, generalizing the pre-existing notion of maximal leakage, which quantifies the amount of information leaking about a secret $X$ by disclosing a single outcome of a (randomized) function calculated on $X$. Pointwise maximal leakage is a robust and operationally meaningful privacy measure that captures the largest amount of information… ▽ More

    Submitted 15 August, 2023; v1 submitted 10 May, 2022; originally announced May 2022.

    Comments: Results unchanged. New examples added. This version has been accepted for publication in IEEE Transactions on Information Theory

  4. arXiv:2105.01033  [pdf, other

    cs.IT

    Optimal Maximal Leakage-Distortion Tradeoff

    Authors: Sara Saeidian, Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund

    Abstract: Most methods for publishing data with privacy guarantees introduce randomness into datasets which reduces the utility of the published data. In this paper, we study the privacy-utility tradeoff by taking maximal leakage as the privacy measure and the expected Hamming distortion as the utility measure. We study three different but related problems. First, we assume that the data-generating distribu… ▽ More

    Submitted 3 May, 2021; originally announced May 2021.

  5. arXiv:2101.06937  [pdf, other

    cs.IT

    $(ε, n)$ Fixed-Length Strong Coordination Capacity

    Authors: Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund

    Abstract: This paper investigates the problem of synthesizing joint distributions in the finite-length regime. For a fixed blocklength $n$ and an upper bound on the distribution approximation $ε$, we prove a capacity result for fixed-length strong coordination. It is shown analytically that the rate conditions for the fixed-length regime are lower-bounded by the mutual information that appears in the asympt… ▽ More

    Submitted 13 May, 2021; v1 submitted 18 January, 2021; originally announced January 2021.

  6. Quantifying Membership Privacy via Information Leakage

    Authors: Sara Saeidian, Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund

    Abstract: Machine learning models are known to memorize the unique properties of individual data points in a training set. This memorization capability can be exploited by several types of attacks to infer information about the training data, most notably, membership inference attacks. In this paper, we propose an approach based on information leakage for guaranteeing membership privacy. Specifically, we pr… ▽ More

    Submitted 15 April, 2021; v1 submitted 12 October, 2020; originally announced October 2020.

    Comments: To be published in IEEE Transactions on Information Forensics and Security

  7. arXiv:2009.01572  [pdf, other

    cs.IT

    Secure Strong Coordination

    Authors: Giulia Cervia, German Bassi, Mikael Skoglund

    Abstract: We consider a network of two nodes separated by a noisy channel, in which the source and its reconstruction have to be strongly coordinated, while simultaneously satisfying the strong secrecy condition with respect to an outside observer of the noisy channel. In the case of non-causal encoding and decoding, we propose a joint source-channel coding scheme for the secure strong coordination region.… ▽ More

    Submitted 3 September, 2020; originally announced September 2020.

    Journal ref: IEEE WPS 2020 - International Workshop on Privacy and Security for Information Systems

  8. arXiv:2009.01569  [pdf, other

    cs.IT

    Remote Joint Strong Coordination and Reliable Communication

    Authors: Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We consider a three-node network, in which two agents wish to communicate over a noisy channel, while controlling the distribution observed by a third external agent. We use strong coordination to constrain the distribution, and we provide a complete characterization of the "remote strong coordination and reliable communication" region.

    Submitted 3 September, 2020; originally announced September 2020.

    Journal ref: 2020 IEEE International Symposium on Information Theory (ISIT)

  9. arXiv:1909.12691  [pdf, other

    cs.IT

    Fixed-Length Strong Coordination

    Authors: Giulia Cervia, Tobias Oechtering, Mikael Skoglund

    Abstract: We consider the problem of synthesizing joint distributions of signals and actions over noisy channels in the finite-length regime. For a fixed blocklength $n$ and an upper bound on the distance $\varepsilon$, a coding scheme is proposed such that the induced joint distribution is $\varepsilon$-close in $L^1$ distance to a target i.i.d. distribution. The set of achievable target distributions and… ▽ More

    Submitted 27 September, 2019; originally announced September 2019.

    Comments: 5 pages, 2 figures

    Journal ref: 2019 IEEE Information Theory Workshop (ITW)

  10. arXiv:1809.10934  [pdf, other

    cs.IT

    Strong Coordination over Noisy Channels with Strictly Causal Encoding

    Authors: Giulia Cervia, Laura Luzzi, Maël Le Treust, Matthieu R. Bloch

    Abstract: We consider a network of two nodes separated by a noisy channel, in which the input and output signals have to be coordinated with the source and its reconstruction. In the case of strictly causal encoding and non-causal decoding, we prove inner and outer bounds for the strong coordination region and show that the inner bound is achievable with polar codes.

    Submitted 28 September, 2018; originally announced September 2018.

    Comments: 10 pages, 3 figures, conference paper

    Journal ref: Proceedings of Allerton Conference on Communication, Control and Computing 2018

  11. arXiv:1802.09795  [pdf, other

    cs.IT

    Polar codes for empirical coordination over noisy channels with strictly causal encoding

    Authors: Giulia Cervia, Laura Luzzi, Maël Le Treust, Matthieu R. Bloch

    Abstract: In this paper, we propose a coding scheme based on polar codes for empirical coordination of autonomous devices. We consider a two-node network with a noisy link in which the input and output signals have to be coordinated with the source and the reconstruction. In the case of strictly causal encoding, we show that polar codes achieve the empirical coordination region, provided that a vanishing ra… ▽ More

    Submitted 27 February, 2018; originally announced February 2018.

    Comments: 4 pages, 1 figure, conference paper presented at XXVIème colloque GRETSI (2017)

  12. Strong coordination of signals and actions over noisy channels with two-sided state information

    Authors: Giulia Cervia, Laura Luzzi, Maël Le Treust, Matthieu R. Bloch

    Abstract: We consider a network of two nodes separated by a noisy channel with two-sided state information, in which the input and output signals have to be coordinated with the source and its reconstruction. In the case of non-causal encoding and decoding, we propose a joint source-channel coding scheme and develop inner and outer bounds for the strong coordination region. While the inner and outer bounds… ▽ More

    Submitted 8 March, 2018; v1 submitted 31 January, 2018; originally announced January 2018.

    Journal ref: IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 66, NO. 8, AUGUST 2020

  13. arXiv:1705.05587  [pdf, other

    cs.IT

    Strong Coordination of Signals and Actions over Noisy Channels

    Authors: Giulia Cervia, Laura Luzzi, Maël Le Treust, Matthieu Bloch

    Abstract: -We develop a random binning scheme for strong coordination in a network of two nodes separated by a noisy channel, in which the input and output signals have to be coordinated with the source and its reconstruction. In the case of non-causal encoding and decoding, we propose a joint source-channel coding scheme and develop inner and outer bounds for the strong coordination region. While the set o… ▽ More

    Submitted 16 May, 2017; originally announced May 2017.

    Journal ref: IEEE International Symposium on Information Theory, Jun 2017, Aachen, Germany

  14. arXiv:1609.06432  [pdf, other

    cs.IT

    Polar Coding for Empirical Coordination of Signals and Actions over Noisy Channels

    Authors: Giulia Cervia, Laura Luzzi, Matthieu Bloch, Maël Le Treust

    Abstract: -We develop a polar coding scheme for empirical coordination in a two-node network with a noisy link in which the input and output signals have to be coordinated with the source and the reconstruction. In the case of non-causal encoding and decoding, we show that polar codes achieve the best known inner bound for the empirical coordination region, provided that a vanishing rate of common randomnes… ▽ More

    Submitted 21 September, 2016; originally announced September 2016.

    Journal ref: Information Theory Workshop 2016, Sep 2016, Cambridge, United Kingdom