Skip to main content

Showing 1–50 of 62 results for author: Jaggi, S

.
  1. arXiv:2312.09316  [pdf, other

    cs.AI cs.HC

    Distributional Latent Variable Models with an Application in Active Cognitive Testing

    Authors: Robert Kasumba, Dom CP Marticorena, Anja Pahor, Geetha Ramani, Imani Goffney, Susanne M Jaeggi, Aaron Seitz, Jacob R Gardner, Dennis L Barbour

    Abstract: Cognitive modeling commonly relies on asking participants to complete a battery of varied tests in order to estimate attention, working memory, and other latent variables. In many cases, these tests result in highly variable observation models. A near-ubiquitous approach is to repeat many observations for each test, resulting in a distribution over the outcomes from each test given to each subject… ▽ More

    Submitted 14 December, 2023; originally announced December 2023.

    Comments: 9 pages, 6 figures

  2. arXiv:2301.12399  [pdf, other

    cs.CY

    Learning Analytics from Spoken Discussion Dialogs in Flipped Classroom

    Authors: Hang Su, Borislav Dzodzo, Changlun Li, Danyang Zhao, Hao Geng, Yunxiang Li, Sidharth Jaggi, Helen Meng

    Abstract: The flipped classroom is a new pedagogical strategy that has been gaining increasing importance recently. Spoken discussion dialog commonly occurs in flipped classroom, which embeds rich information indicating processes and progression of students' learning. This study focuses on learning analytics from spoken discussion dialog in the flipped classroom, which aims to collect and analyze the discus… ▽ More

    Submitted 29 January, 2023; originally announced January 2023.

  3. arXiv:2205.06708  [pdf, ps, other

    cs.IT

    The Capacity of Causal Adversarial Channels

    Authors: Yihan Zhang, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate

    Abstract: We characterize the capacity for the discrete-time arbitrarily varying channel with discrete inputs, outputs, and states when (a) the encoder and decoder do not share common randomness, (b) the input and state are subject to cost constraints, (c) the transition matrix of the channel is deterministic given the state, and (d) at each time step the adversary can only observe the current and past chan… ▽ More

    Submitted 13 May, 2022; originally announced May 2022.

  4. arXiv:2102.10256  [pdf, other

    cs.IT

    Generalized Group Testing

    Authors: Xiwei Cheng, Sidharth Jaggi, Qiaoqiao Zhou

    Abstract: In the problem of classical group testing one aims to identify a small subset (of size $d$) diseased individuals/defective items in a large population (of size $n$). This process is based on a minimal number of suitably-designed group tests on subsets of items, where the test outcome is positive iff the given test contains at least one defective item. Motivated by physical considerations, we consi… ▽ More

    Submitted 23 September, 2022; v1 submitted 19 February, 2021; originally announced February 2021.

  5. arXiv:2102.09885  [pdf, other

    cs.IT

    Network Coding with Myopic Adversaries

    Authors: Sijie Li, Rawad Bitar, Sidharth Jaggi, Yihan Zhang

    Abstract: We consider the problem of reliable communication over a network containing a hidden {\it myopic} adversary who can eavesdrop on some $z_{ro}$ links, jam some $z_{wo}$ links, and do both on some $z_{rw}$ links. We provide the first information-theoretically tight characterization of the optimal rate of communication possible under all possible settings of the tuple $(z_{ro},z_{wo},z_{rw})$ by prov… ▽ More

    Submitted 19 February, 2021; originally announced February 2021.

    Comments: Extended version of IEEE ISIT submission. Short video explaining the result: https://cuhk.zoom.us/rec/play/ZL93f6ool7K0T48aoRy5FS_sjme9DjLRDvaQeDLsR7IfV2aQGWrJVbqTTJ12Fg9qpXXvWVM4twAmIH-W.I88Ef9sVrWNS4Eog?startTime=1612281070000&_x_zm_rtaid=qXNfoabtTQK94kBK0YE-6A.1613735660905.fd77db9ef1a673afd9cd4ac45303144d&_x_zm_rhtaid=338

  6. arXiv:2009.03788  [pdf, other

    cs.IT cs.CC cs.DM math.CO

    Tight List-Sizes for Oblivious AVCs under Constraints

    Authors: Yihan Zhang, Sidharth Jaggi, Amitalok J. Budkuley

    Abstract: We study list-decoding over adversarial channels governed by oblivious adversaries (a.k.a. oblivious Arbitrarily Varying Channels (AVCs)). This type of adversaries aims to maliciously corrupt the communication without knowing the actual transmission from the sender. For any oblivious AVCs potentially with constraints on the sender's transmitted sequence and the adversary's noise sequence, we deter… ▽ More

    Submitted 8 September, 2020; originally announced September 2020.

  7. arXiv:2002.03374  [pdf, other

    cs.IT

    Communication Efficient Secret Sharing in the Presence of Malicious Adversary

    Authors: Rawad Bitar, Sidharth Jaggi

    Abstract: Consider the communication efficient secret sharing problem. A dealer wants to share a secret with $n$ parties such that any $k\leq n$ parties can reconstruct the secret and any $z<k$ parties eavesdrop** on their shares obtain no information about the secret. In addition, a legitimate user contacting any $d$, $k\leq d \leq n$, parties to decode the secret can do so by reading and downloading the… ▽ More

    Submitted 9 February, 2020; originally announced February 2020.

    Comments: Extended version of a paper submitted to ISIT 2020

  8. arXiv:2001.02575  [pdf, other

    cs.IT

    Quadratically Constrained Two-way Adversarial Channels

    Authors: Yihan Zhang, Shashank Vatedka, Sidharth Jaggi

    Abstract: We study achievable rates of reliable communication in a power-constrained two-way additive interference channel over the real alphabet where communication is disrupted by a power-constrained jammer. This models the wireless communication scenario where two users Alice and Bob, operating in the full duplex mode, wish to exchange messages with each other in the presence of a jammer, James. Alice an… ▽ More

    Submitted 9 January, 2020; v1 submitted 8 January, 2020; originally announced January 2020.

  9. arXiv:2001.01201  [pdf, ps, other

    cs.IT

    Undetectable Radios: Covert Communication under Spectral Mask Constraints

    Authors: Qiaosheng, Zhang, Matthieu R. Bloch, Mayank Bakshi, Sidharth Jaggi

    Abstract: We consider the problem of covert communication over continuous-time additive white Gaussian noise (AWGN) channels under spectral mask constraints, wherein two legitimate parties attempt to communicate reliably in the presence of an eavesdropper that should be unable to estimate if communication takes place. The spectral mask constraint is imposed to restrict excessive radiation beyond the bandwid… ▽ More

    Submitted 5 January, 2020; originally announced January 2020.

  10. arXiv:1909.04264  [pdf, other

    cs.IT math.CO math.MG

    Generalized List Decoding

    Authors: Yihan Zhang, Amitalok J. Budkuley, Sidharth Jaggi

    Abstract: This paper concerns itself with the question of list decoding for general adversarial channels, e.g., bit-flip ($\textsf{XOR}$) channels, erasure channels, $\textsf{AND}$ ($Z$-) channels, $\textsf{OR}$ channels, real adder channels, noisy typewriter channels, etc. We precisely characterize when exponential-sized (or positive rate) $(L-1)$-list decodable codes (where the list size $L$ is a universa… ▽ More

    Submitted 9 September, 2019; originally announced September 2019.

  11. arXiv:1809.04464  [pdf, other

    cs.IT

    Arbitrarily Varying Remote Sources

    Authors: Amitalok J. Budkuley, Bikash Kumar Dey, Sidharth Jaggi, Vinod M. Prabhakaran

    Abstract: We study a lossy source coding problem for an arbitrarily varying remote source (AVRS) which was proposed in a prior work. An AVRS transmits symbols, each generated in an independent and identically distributed manner, which are sought to be estimated at the decoder. These symbols are remotely generated, and the encoder and decoder observe noise corrupted versions received through a two-output noi… ▽ More

    Submitted 11 September, 2018; originally announced September 2018.

    Comments: 10 pages. arXiv admin note: substantial text overlap with arXiv:1704.07693

  12. arXiv:1805.03319  [pdf, other

    cs.IT

    Quadratically Constrained Channels with Causal Adversaries

    Authors: Tongxin Li, Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate

    Abstract: We consider the problem of communication over a channel with a causal jamming adversary subject to quadratic constraints. A sender Alice wishes to communicate a message to a receiver Bob by transmitting a real-valued length-$n$ codeword $\mathbf{x}=x_1,...,x_n$ through a communication channel. Alice and Bob do not share common randomness. Knowing Alice's encoding strategy, an adversarial jammer Ja… ▽ More

    Submitted 8 May, 2018; originally announced May 2018.

    Comments: 80 pages, ISIT 2018

  13. arXiv:1805.03095  [pdf, other

    cs.IT

    Stealthy Communication over Adversarially Jammed Multipath Networks

    Authors: Jianhan Song, Qiaosheng Zhang, Swanand Kadhe, Mayank Bakshi, Sidharth Jaggi

    Abstract: We consider the problem of stealthy communication over a multipath network in the presence of an active adversary. The multipath network consists of multiple parallel noiseless links, and the adversary is able to eavesdrop and jam a subset of links. We consider two types of jamming---erasure jamming and overwrite jamming. We require the communication to be both stealthy and reliable, i.e., the adv… ▽ More

    Submitted 31 August, 2020; v1 submitted 8 May, 2018; originally announced May 2018.

    Comments: To appear in the IEEE Transactions on Communications

  14. arXiv:1805.02426  [pdf, other

    cs.IT

    Covert Communication over Adversarially Jammed Channels

    Authors: Qiaosheng Zhang, Mayank Bakshi, Sidharth Jaggi

    Abstract: Suppose that a transmitter Alice potentially wishes to communicate with a receiver Bob over an adversarially jammed binary channel. An active adversary James eavesdrops on their communication over a binary symmetric channel (BSC(q)), and may maliciously flip (up to) a certain fraction p of their transmitted bits based on his observations. We consider a setting where the communication must be simul… ▽ More

    Submitted 23 June, 2021; v1 submitted 7 May, 2018; originally announced May 2018.

    Comments: Accepted for publication in IEEE Transactions on Information Theory

  15. arXiv:1804.10221  [pdf, other

    cs.IT

    Communication over an Arbitrarily Varying Channel under a State-Myopic Encoder

    Authors: Amitalok J. Budkuley, Sidharth Jaggi

    Abstract: We study the problem of communication over a discrete arbitrarily varying channel (AVC) when a noisy version of the state is known non-causally at the encoder. The state is chosen by an adversary which knows the coding scheme. A state-myopic encoder observes this state non-causally, though imperfectly, through a noisy discrete memoryless channel (DMC). We first characterize the capacity of this st… ▽ More

    Submitted 26 April, 2018; originally announced April 2018.

    Comments: 16 pages

  16. arXiv:1801.05951  [pdf, other

    cs.IT

    Quadratically Constrained Myopic Adversarial Channels

    Authors: Yihan Zhang, Shashank Vatedka, Sidharth Jaggi, Anand Sarwate

    Abstract: We study communication in the presence of a jamming adversary where quadratic power constraints are imposed on the transmitter and the jammer. The jamming signal is allowed to be a function of the codebook, and a noncausal but noisy observation of the transmitted codeword. For a certain range of the noise-to-signal ratios (NSRs) of the transmitter and the jammer, we are able to characterize the ca… ▽ More

    Submitted 10 August, 2020; v1 submitted 18 January, 2018; originally announced January 2018.

    Comments: Improved z-aware symmetrization bound is added, subsuming those given by z-agnostic symmetrization and the old z-aware symmetrization in the previous version

  17. arXiv:1801.02701  [pdf, other

    cs.IT

    Novel Impossibility Results for Group-Testing

    Authors: Abhishek Agarwal, Sidharth Jaggi, Arya Mazumdar

    Abstract: In this work we prove non-trivial impossibility results for perhaps the simplest non-linear estimation problem, that of {\it Group Testing} (GT), via the recently developed Madiman-Tetali inequalities. Group Testing concerns itself with identifying a hidden set of $d$ defective items from a set of $n$ items via $t$ {disjunctive/pooled} measurements ("group tests"). We consider the linear sparsity… ▽ More

    Submitted 9 April, 2018; v1 submitted 8 January, 2018; originally announced January 2018.

    Comments: 18 pages, 1 figure, 1 table, short version submitted to ISIT 2018 Revised discussion of literature

  18. arXiv:1708.03429  [pdf, ps, other

    cs.IT cs.DS

    Nearly Optimal Sparse Group Testing

    Authors: Venkata Gandikota, Elena Grigorescu, Sidharth Jaggi, Samson Zhou

    Abstract: Group testing is the process of pooling arbitrary subsets from a set of $n$ items so as to identify, with a minimal number of tests, a "small" subset of $d$ defective items. In "classical" non-adaptive group testing, it is known that when $d$ is substantially smaller than $n$, $Θ(d\log(n))$ tests are both information-theoretically necessary and sufficient to guarantee recovery with high probabilit… ▽ More

    Submitted 19 September, 2018; v1 submitted 11 August, 2017; originally announced August 2017.

  19. arXiv:1610.01287  [pdf, other

    cs.IT

    Sufficiently Myopic Adversaries are Blind

    Authors: Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg

    Abstract: In this work we consider a communication problem in which a sender, Alice, wishes to communicate with a receiver, Bob, over a channel controlled by an adversarial jammer, James, who is {\em myopic}. Roughly speaking, for blocklength $n$, the codeword $X^n$ transmitted by Alice is corrupted by James who must base his adversarial decisions (of which locations of $X^n$ to corrupt and how to corrupt t… ▽ More

    Submitted 5 October, 2016; originally announced October 2016.

    Comments: 18 pages

  20. arXiv:1607.02014  [pdf, other

    cs.IT

    Computationally Efficient Covert Communication

    Authors: Qiaosheng Zhang, Mayank Bakshi, Sidharth Jaggi

    Abstract: In this paper, we design the first computationally efficient codes for simultaneously reliable and covert communication over Binary Symmetric Channels (BSCs). Our setting is as follows: a transmitter Alice wishes to potentially reliably transmit a message to a receiver Bob, while ensuring that the transmission taking place is covert with respect to an eavesdropper Willie (who hears Alice's transmi… ▽ More

    Submitted 9 June, 2018; v1 submitted 7 July, 2016; originally announced July 2016.

    Comments: Submitted to IEEE Transactions on Information Theory

  21. arXiv:1605.01834  [pdf, other

    cs.IT

    Arbitrarily Varying Networks: Capacity-achieving Computationally Efficient Codes

    Authors: Peida Tian, Sidharth Jaggi, Mayank Bakshi, Oliver Kosut

    Abstract: We consider the problem of communication over a network containing a hidden and malicious adversary that can control a subset of network resources, and aims to disrupt communications. We focus on omniscient node-based adversaries, i.e., the adversaries can control a subset of nodes, and know the message, network code and packets on all links. Characterizing information-theoretically optimal commun… ▽ More

    Submitted 6 May, 2016; originally announced May 2016.

    Comments: 13 pages, 7 figures, long version of ISIT paper

  22. arXiv:1602.02384  [pdf, other

    cs.IT cs.CR

    The benefit of a 1-bit jump-start, and the necessity of stochastic encoding, in jamming channels

    Authors: Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate

    Abstract: We consider the problem of communicating a message $m$ in the presence of a malicious jamming adversary (Calvin), who can erase an arbitrary set of up to $pn$ bits, out of $n$ transmitted bits $(x_1,\ldots,x_n)$. The capacity of such a channel when Calvin is exactly causal, i.e. Calvin's decision of whether or not to erase bit $x_i$ depends on his observations $(x_1,\ldots,x_i)$ was recently chara… ▽ More

    Submitted 7 February, 2016; originally announced February 2016.

    Comments: 21 pages, 4 figures, extended draft of submission to ISIT 2016

  23. arXiv:1602.00276  [pdf, other

    cs.IT

    The Capacity of Online (Causal) $q$-ary Error-Erasure Channels

    Authors: Zitan Chen, Sidharth Jaggi, Michael Langberg

    Abstract: In the $q$-ary online (or "causal") channel coding model, a sender wishes to communicate a message to a receiver by transmitting a codeword $\mathbf{x} =(x_1,\ldots,x_n) \in \{0,1,\ldots,q-1\}^n$ symbol by symbol via a channel limited to at most $pn$ errors and/or $p^{*} n$ erasures. The channel is "online" in the sense that at the $i$th step of communication the channel decides whether to corrupt… ▽ More

    Submitted 31 January, 2016; originally announced February 2016.

    Comments: This is a new version of the binary case, which can be found at arXiv:1412.6376

  24. arXiv:1510.03060  [pdf, ps, other

    cs.IT

    End-to-End Error-Correcting Codes on Networks with Worst-Case Symbol Errors

    Authors: Qiwen Wang, Sidharth Jaggi

    Abstract: The problem of coding for networks experiencing worst-case symbol errors is considered. We argue that this is a reasonable model for highly dynamic wireless network transmissions. We demonstrate that in this setup prior network error-correcting schemes can be arbitrarily far from achieving the optimal network throughput. A new transform metric for errors under the considered model is proposed. Usi… ▽ More

    Submitted 11 October, 2015; originally announced October 2015.

    Comments: Submitted for publication. arXiv admin note: substantial text overlap with arXiv:1108.2393

  25. arXiv:1505.01110  [pdf, ps, other

    cs.IT

    Zero Error Coordination

    Authors: Mahed Abroshan, Amin Gohari, Sidharth Jaggi

    Abstract: In this paper, we consider a zero error coordination problem wherein the nodes of a network exchange messages to be able to perfectly coordinate their actions with the individual observations of each other. While previous works on coordination commonly assume an asymptotically vanishing error, we assume exact, zero error coordination. Furthermore, unlike previous works that employ the empirical or… ▽ More

    Submitted 5 May, 2015; originally announced May 2015.

  26. arXiv:1504.05984  [pdf, other

    cs.IT

    Coding against a Limited-view Adversary: The Effect of Causality and Feedback

    Authors: Qiaosheng Zhang, Swanand Kadhe, Mayank Bakshi, Sidharth Jaggi, Alex Sprintson

    Abstract: We consider the problem of communication over a multi-path network in the presence of a causal adversary. The limited-view causal adversary is able to eavesdrop on a subset of links and also jam on a potentially overlap** subset of links based on the current and past information. To ensure that the communication takes place reliably and secretly, resilient network codes with necessary redundancy… ▽ More

    Submitted 5 August, 2015; v1 submitted 22 April, 2015; originally announced April 2015.

    Comments: 15 pages

  27. arXiv:1503.00555  [pdf, other

    cs.IT

    Learning Immune-Defectives Graph through Group Tests

    Authors: Abhinav Ganesan, Sidharth Jaggi, Venkatesh Saligrama

    Abstract: This paper deals with an abstraction of a unified problem of drug discovery and pathogen identification. Pathogen identification involves identification of disease-causing biomolecules. Drug discovery involves finding chemical compounds, called lead compounds, that bind to pathogenic proteins and eventually inhibit the function of the protein. In this paper, the lead compounds are abstracted as in… ▽ More

    Submitted 16 August, 2015; v1 submitted 26 January, 2015; originally announced March 2015.

    Comments: Double column, 17 pages. Updated with tighter lower bounds and other minor edits

  28. arXiv:1502.07830  [pdf, ps, other

    cs.IT

    File Updates Under Random/Arbitrary Insertions And Deletions

    Authors: Qiwen Wang, Viveck Cadambe, Sidharth Jaggi, Moshe Schwartz, Muriel Médard

    Abstract: A client/encoder edits a file, as modeled by an insertion-deletion (InDel) process. An old copy of the file is stored remotely at a data-centre/decoder, and is also available to the client. We consider the problem of throughput- and computationally-efficient communication from the client to the data-centre, to enable the server to update its copy to the newly edited file. We study two models for t… ▽ More

    Submitted 27 February, 2015; originally announced February 2015.

    Comments: The paper is an extended version of our paper to be appeared at ITW 2015

  29. arXiv:1412.6376  [pdf, other

    cs.IT

    A characterization of the capacity of online (causal) binary channels

    Authors: Zitan Chen, Sidharth Jaggi, Michael Langberg

    Abstract: In the binary online (or "causal") channel coding model, a sender wishes to communicate a message to a receiver by transmitting a codeword $\mathbf{x} =(x_1,\ldots,x_n) \in \{0,1\}^n$ bit by bit via a channel limited to at most $pn$ corruptions. The channel is "online" in the sense that at the $i$th step of communication the channel decides whether to corrupt the $i$th bit or not based on its view… ▽ More

    Submitted 19 December, 2014; originally announced December 2014.

  30. arXiv:1410.8440  [pdf, ps, other

    cs.IT

    Non-Adaptive Group Testing with Inhibitors

    Authors: Abhinav Ganesan, Javad Ebrahimi, Sidharth Jaggi, Venkatesh Saligrama

    Abstract: Group testing with inhibitors (GTI) introduced by Farach at al. is studied in this paper. There are three types of items, $d$ defectives, $r$ inhibitors and $n-d-r$ normal items in a population of $n$ items. The presence of any inhibitor in a test can prevent the expression of a defective. For this model, we propose a probabilistic non-adaptive pooling design with a low complexity decoding algorit… ▽ More

    Submitted 15 December, 2014; v1 submitted 30 October, 2014; originally announced October 2014.

    Comments: Updated with results for the case of knowledge of only upper bounds on no. of defectives and inhibitors; 11 pages, 2 figures

  31. arXiv:1401.4451  [pdf, other

    cs.IT

    Reliable, Deniable, and Hidable Communication over Multipath Networks

    Authors: Swanand Kadhe, Sidharth Jaggi, Mayank Bakshi, Alex Sprintson

    Abstract: We consider the scenario wherein Alice wants to (potentially) communicate to the intended receiver Bob over a network consisting of multiple parallel links in the presence of a passive eavesdropper Willie, who observes an unknown subset of links. A primary goal of our communication protocol is to make the communication "deniable", {\it i.e.}, Willie should not be able to {\it reliably} estimate wh… ▽ More

    Submitted 28 January, 2014; v1 submitted 17 January, 2014; originally announced January 2014.

    Comments: 26 pages, 4 figures; Extended version of the paper submitted for ISIT 2014

  32. arXiv:1401.4269  [pdf, ps, other

    cs.IT

    SUPER: Sparse signals with Unknown Phases Efficiently Recovered

    Authors: Sheng Cai, Mayank Bakshi, Sidharth Jaggi, Minghua Chen

    Abstract: Suppose ${\bf x}$ is any exactly $k$-sparse vector in $\mathbb{C}^{n}$. We present a class of phase measurement matrix $A$ in $\mathbb{C}^{m\times n}$, and a corresponding algorithm, called SUPER, that can resolve ${\bf x}$ up to a global phase from intensity measurements $|A{\bf x}|$ with high probability over $A$. Here $|A{\bf x}|$ is a vector of component-wise magnitudes of $A{\bf x}$. The SUPE… ▽ More

    Submitted 25 January, 2014; v1 submitted 17 January, 2014; originally announced January 2014.

    Comments: 19 pages

  33. Group Testing with Prior Statistics

    Authors: Tongxin Li, Chun Lam Chan, Wenhao Huang, Tarik Kaced, Sidharth Jaggi

    Abstract: We consider a new group testing model wherein each item is a binary random variable defined by an a priori probability of being defective. We assume that each probability is small and that items are independent, but not necessarily identically distributed. The goal of group testing algorithms is to identify with high probability the subset of defectives via non-linear (disjunctive) binary measurem… ▽ More

    Submitted 21 July, 2018; v1 submitted 15 January, 2014; originally announced January 2014.

    Comments: 23 pages, 12 figures, presented in ISIT 2014, Honolulu

    Journal ref: Information Theory (ISIT), 2014 IEEE International Symposium on, 2346-2350

  34. FRANTIC: A Fast Reference-based Algorithm for Network Tomography via Compressive Sensing

    Authors: Sheng Cai, Mayank Bakshi, Sidharth Jaggi, Minghua Chen

    Abstract: We study the problem of link and node delay estimation in undirected networks when at most k out of n links or nodes in the network are congested. Our approach relies on end-to-end measurements of path delays across pre-specified paths in the network. We present a class of algorithms that we call FRANTIC. The FRANTIC algorithms are motivated by compressive sensing; however, unlike traditional comp… ▽ More

    Submitted 3 December, 2013; originally announced December 2013.

    Comments: Submitted to IEEE Transactions on Communications. A preliminary version of this paper will be presented at the 6th International Conference on Communication System & Networks (COMSNETS) - 2014. A poster based on this work was also presented at International Symposium on Information Theory 2013

  35. arXiv:1307.2811  [pdf, other

    cs.IT

    GROTESQUE: Noisy Group Testing (Quick and Efficient)

    Authors: Sheng Cai, Mohammad Jahangoshahi, Mayank Bakshi, Sidharth Jaggi

    Abstract: Group-testing refers to the problem of identifying (with high probability) a (small) subset of $D$ defectives from a (large) set of $N$ items via a "small" number of "pooled" tests. For ease of presentation in this work we focus on the regime when $D = \cO{N^{1-\gap}}$ for some $\gap > 0$. The tests may be noiseless or noisy, and the testing procedure may be adaptive (the pool defining a test may… ▽ More

    Submitted 10 July, 2013; originally announced July 2013.

    Comments: 26 pages, 5 figures

  36. arXiv:1304.6693  [pdf, other

    cs.IT

    Reliable Deniable Communication: Hiding Messages in Noise

    Authors: Pak Hou Che, Mayank Bakshi, Sidharth Jaggi

    Abstract: A transmitter Alice may wish to reliably transmit a message to a receiver Bob over a binary symmetric channel (BSC), while simultaneously ensuring that her transmission is deniable from an eavesdropper Willie. That is, if Willie listening to Alice's transmissions over a "significantly noisier" BSC than the one to Bob, he should be unable to estimate even whether Alice is transmitting. We consider… ▽ More

    Submitted 11 July, 2016; v1 submitted 24 April, 2013; originally announced April 2013.

  37. arXiv:1304.6027  [pdf, other

    cs.IT

    Near-Optimal Stochastic Threshold Group Testing

    Authors: Chun Lam Chan, Sheng Cai, Mayank Bakshi, Sidharth Jaggi, Venkatesh Saligrama

    Abstract: We formulate and analyze a stochastic threshold group testing problem motivated by biological applications. Here a set of $n$ items contains a subset of $d \ll n$ defective items. Subsets (pools) of the $n$ items are tested -- the test outcomes are negative, positive, or stochastic (negative or positive with certain probabilities that might depend on the number of defectives being tested in the po… ▽ More

    Submitted 24 April, 2013; v1 submitted 22 April, 2013; originally announced April 2013.

    Comments: 9 pages, 5 figures

  38. arXiv:1303.0141  [pdf, other

    cs.IT

    Routing for Security in Networks with Adversarial Nodes

    Authors: Pak Hou Che, Minghua Chen, Tracey Ho, Sidharth Jaggi, Michael Langberg

    Abstract: We consider the problem of secure unicast transmission between two nodes in a directed graph, where an adversary eavesdrops/jams a subset of nodes. This adversarial setting is in contrast to traditional ones where the adversary controls a subset of links. In particular, we study, in the main, the class of routing-only schemes (as opposed to those allowing coding inside the network). Routing-only s… ▽ More

    Submitted 1 March, 2013; originally announced March 2013.

  39. arXiv:1301.6345  [pdf, other

    cs.IT

    On AVCs with Quadratic Constraints

    Authors: Farzin Haddadpour, Mahdi Jafari Siavoshani, Mayank Bakshi, Sidharth Jaggi

    Abstract: In this work we study an Arbitrarily Varying Channel (AVC) with quadratic power constraints on the transmitter and a so-called "oblivious" jammer (along with additional AWGN) under a maximum probability of error criterion, and no private randomness between the transmitter and the receiver. This is in contrast to similar AVC models under the average probability of error criterion considered in [1],… ▽ More

    Submitted 27 January, 2013; originally announced January 2013.

    Comments: A shorter version of this work will be send to ISIT13, Istanbul. 8 pages, 3 figures

  40. arXiv:1301.2860  [pdf, ps, other

    cs.IT

    Rateless Resilient Network Coding Against Byzantine Adversaries

    Authors: Wentao Huang, Tracey Ho, Hongyi Yao, Sidharth Jaggi

    Abstract: This paper considers rateless network error correction codes for reliable multicast in the presence of adversarial errors. Most existing network error correction codes are designed for a given network capacity and maximum number of errors known a priori to the encoder and decoder. However, in certain practical settings it may be necessary to operate without such a priori knowledge. We present rate… ▽ More

    Submitted 14 January, 2013; originally announced January 2013.

  41. arXiv:1207.2335  [pdf, other

    cs.IT cs.DS

    SHO-FA: Robust compressive sensing with order-optimal complexity, measurements, and bits

    Authors: Mayank Bakshi, Sidharth Jaggi, Sheng Cai, Minghua Chen

    Abstract: Suppose x is any exactly k-sparse vector in R^n. We present a class of sparse matrices A, and a corresponding algorithm that we call SHO-FA (for Short and Fast) that, with high probability over A, can reconstruct x from Ax. The SHO-FA algorithm is related to the Invertible Bloom Lookup Tables recently introduced by Goodrich et al., with two important distinctions - SHO-FA relies on linear measurem… ▽ More

    Submitted 14 November, 2012; v1 submitted 10 July, 2012; originally announced July 2012.

    Comments: Submitted to IEEE Transactions on Information Theory. A preliminary version of this paper was presented at the 50th Annual Allerton Conference on Communication, Control and Computing - 2012. A poster based on this work was also presented at International Symposium on Information Theory 2012

    ACM Class: H.1.1

  42. Upper Bounds on the Capacity of Binary Channels with Causal Adversaries

    Authors: Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate

    Abstract: In this work we consider the communication of information in the presence of a causal adversarial jammer. In the setting under study, a sender wishes to communicate a message to a receiver by transmitting a codeword $(x_1,...,x_n)$ bit-by-bit over a communication channel. The sender and the receiver do not share common randomness. The adversarial jammer can view the transmitted bits $x_i$ one at a… ▽ More

    Submitted 13 December, 2012; v1 submitted 11 April, 2012; originally announced April 2012.

    Comments: To appear in the IEEE Transactions on Information Theory; shortened version appeared at ISIT 2012

  43. arXiv:1204.2150  [pdf, other

    cs.IT

    Analog Network Coding in General SNR Regime: Performance of Network Simplification

    Authors: Samar Agnihotri, Sidharth Jaggi, Minghua Chen

    Abstract: We consider a communication scenario where a source communicates with a destination over a directed layered relay network. Each relay performs analog network coding where it scales and forwards the signals received at its input. In this scenario, we address the question: What portion of the maximum end-to-end achievable rate can be maintained if only a fraction of relay nodes available at each lay… ▽ More

    Submitted 23 April, 2012; v1 submitted 10 April, 2012; originally announced April 2012.

    Comments: 11 pages, 3 figures. Substantially revised content in Section III and IV, tighter upper-bounds. arXiv admin note: substantial text overlap with arXiv:1203.2297 and arXiv:1202.0372

  44. arXiv:1203.2297  [pdf, other

    cs.IT

    Analog network coding in general SNR regime: Performance of a greedy scheme

    Authors: Samar Agnihotri, Sidharth Jaggi, Minghua Chen

    Abstract: The problem of maximum rate achievable with analog network coding for a unicast communication over a layered relay network with directed links is considered. A relay node performing analog network coding scales and forwards the signals received at its input. Recently this problem has been considered under certain assumptions on per node scaling factor and received SNR. Previously, we established a… ▽ More

    Submitted 23 April, 2012; v1 submitted 10 March, 2012; originally announced March 2012.

    Comments: 11 pages, 5 figures. Fixed an issue with the notation in the statement and proof of Lemma 1. arXiv admin note: substantial text overlap with arXiv:1204.2150 and arXiv:1202.0372

  45. arXiv:1202.5202  [pdf, ps, other

    cs.IT cs.PF

    Secure Compressed Reading in Smart Grids

    Authors: Sheng Cai, Jihang Ye, Minghua Chen, Jianxin Yan, Sidharth Jaggi

    Abstract: Smart Grids measure energy usage in real-time and tailor supply and delivery accordingly, in order to improve power transmission and distribution. For the grids to operate effectively, it is critical to collect readings from massively-installed smart meters to control centers in an efficient and secure manner. In this paper, we propose a secure compressed reading scheme to address this critical is… ▽ More

    Submitted 22 February, 2012; originally announced February 2012.

  46. arXiv:1202.0372  [pdf, other

    cs.IT

    Analog Network Coding in General SNR Regime

    Authors: Samar Agnihotri, Sidharth Jaggi, Minghua Chen

    Abstract: The problem of maximum rate achievable with analog network coding for a unicast communication over a layered wireless relay network with directed links is considered. A relay node performing analog network coding scales and forwards the signals received at its input. Recently this problem has been considered under two assumptions: (A) each relay node scales its received signal to the upper bound o… ▽ More

    Submitted 19 May, 2012; v1 submitted 2 February, 2012; originally announced February 2012.

    Comments: 11 pages. Revised Section 2 and more accurate analysis in Section 5. A shorter version to appear in ISIT-2012. arXiv admin note: substantial text overlap with arXiv:1203.2297

  47. Non-adaptive Group Testing: Explicit bounds and novel algorithms

    Authors: Chun Lam Chan, Sidharth Jaggi, Venkatesh Saligrama, Samar Agnihotri

    Abstract: We consider some computationally efficient and provably correct algorithms with near-optimal sample-complexity for the problem of noisy non-adaptive group testing. Group testing involves grou** arbitrary subsets of items into pools. Each pool is then tested to identify the defective items, which are usually assumed to be "sparse". We consider non-adaptive randomly pooling measurements, where poo… ▽ More

    Submitted 5 March, 2014; v1 submitted 1 February, 2012; originally announced February 2012.

    Comments: Accepted for publication in the IEEE Transactions on Information Theory; current version, Oct. 9, 2012. Main change from v4 to v5: fixed some typos, corrected details of the LP decoding algorithms

  48. arXiv:1108.2393  [pdf, ps, other

    cs.IT

    Binary Error Correcting Network Codes

    Authors: Qiwen Wang, Sidharth Jaggi, Shuo-Yen Robert Li

    Abstract: We consider network coding for networks experiencing worst-case bit-flip errors, and argue that this is a reasonable model for highly dynamic wireless network transmissions. We demonstrate that in this setup prior network error-correcting schemes can be arbitrarily far from achieving the optimal network throughput. We propose a new metric for errors under this model. Using this metric, we prove a… ▽ More

    Submitted 14 August, 2011; v1 submitted 11 August, 2011; originally announced August 2011.

  49. arXiv:1107.4540  [pdf, other

    cs.IT

    Non-adaptive probabilistic group testing with noisy measurements: Near-optimal bounds with efficient algorithms

    Authors: Chun Lam Chan, Pak Hou Che, Sidharth Jaggi, Venkatesh Saligrama

    Abstract: We consider the problem of detecting a small subset of defective items from a large set via non-adaptive "random pooling" group tests. We consider both the case when the measurements are noiseless, and the case when the measurements are noisy (the outcome of each group test may be independently faulty with probability q). Order-optimal results for these scenarios are known in the literature. We gi… ▽ More

    Submitted 22 July, 2011; originally announced July 2011.

  50. arXiv:1105.2760  [pdf, other

    cs.IT

    Amplify-and-Forward in Wireless Relay Networks

    Authors: Samar Agnihotri, Sidharth Jaggi, Minghua Chen

    Abstract: A general class of wireless relay networks with a single source-destination pair is considered. Intermediate nodes in the network employ an amplify-and-forward scheme to relay their input signals. In this case the overall input-output channel from the source via the relays to the destination effectively behaves as an intersymbol interference channel with colored noise. Unlike previous work we form… ▽ More

    Submitted 1 June, 2011; v1 submitted 13 May, 2011; originally announced May 2011.

    Comments: Minor revision: fixed a typo in eqn. reference, changed the formatting. 30 pages, 8 figures