-
Legal Summarisation through LLMs: The PRODIGIT Project
Authors:
Thiago Dal Pont,
Federico Galli,
Andrea Loreggia,
Giuseppe Pisano,
Riccardo Rovatti,
Giovanni Sartor
Abstract:
We present some initial results of a large-scale Italian project called PRODIGIT which aims to support tax judges and lawyers through digital technology, focusing on AI. We have focused on generation of summaries of judicial decisions and on the extraction of related information, such as the identification of legal issues and decision-making criteria, and the specification of keywords. To this end…
▽ More
We present some initial results of a large-scale Italian project called PRODIGIT which aims to support tax judges and lawyers through digital technology, focusing on AI. We have focused on generation of summaries of judicial decisions and on the extraction of related information, such as the identification of legal issues and decision-making criteria, and the specification of keywords. To this end, we have deployed and evaluated different tools and approaches to extractive and abstractive summarisation. We have applied LLMs, and particularly on GPT4, which has enabled us to obtain results that proved satisfactory, according to an evaluation by expert tax judges and lawyers. On this basis, a prototype application is being built which will be made publicly available.
△ Less
Submitted 4 August, 2023;
originally announced August 2023.
-
Anomaly Detection based on Compressed Data: an Information Theoretic Characterization
Authors:
Alex Marchioni,
Andriy Enttsel,
Mauro Mangia,
Riccardo Rovatti,
Gianluca Setti
Abstract:
We analyze the effect of lossy compression in the processing of sensor signals that must be used to detect anomalous events in the system under observation. The intuitive relationship between the quality loss at higher compression and the possibility of telling anomalous behaviours from normal ones is formalized in terms of information-theoretic quantities. Some analytic derivations are made withi…
▽ More
We analyze the effect of lossy compression in the processing of sensor signals that must be used to detect anomalous events in the system under observation. The intuitive relationship between the quality loss at higher compression and the possibility of telling anomalous behaviours from normal ones is formalized in terms of information-theoretic quantities. Some analytic derivations are made within the Gaussian framework and possibly in the asymptotic regime for what concerns the stretch of signals considered. Analytical conclusions are matched with the performance of practical detectors in a toy case allowing the assessment of different compression/detector configurations.
△ Less
Submitted 30 April, 2022; v1 submitted 6 October, 2021;
originally announced October 2021.
-
On the security of a class of diffusion mechanisms for image encryption
Authors:
Leo Yu Zhang,
Yuansheng Liu,
Kwok-Wo Wong,
Fabio Pareschi,
Yushu Zhang,
Riccardo Rovatti,
Gianluca Setti
Abstract:
The need for fast and strong image cryptosystems motivates researchers to develop new techniques to apply traditional cryptographic primitives in order to exploit the intrinsic features of digital images. One of the most popular and mature technique is the use of complex ynamic phenomena, including chaotic orbits and quantum walks, to generate the required key stream. In this paper, under the assu…
▽ More
The need for fast and strong image cryptosystems motivates researchers to develop new techniques to apply traditional cryptographic primitives in order to exploit the intrinsic features of digital images. One of the most popular and mature technique is the use of complex ynamic phenomena, including chaotic orbits and quantum walks, to generate the required key stream. In this paper, under the assumption of plaintext attacks we investigate the security of a classic diffusion mechanism (and of its variants) used as the core cryptographic rimitive in some image cryptosystems based on the aforementioned complex dynamic phenomena. We have theoretically found that regardless of the key schedule process, the data complexity for recovering each element of the equivalent secret key from these diffusion mechanisms is only O(1). The proposed analysis is validated by means of numerical examples. Some additional cryptographic applications of our work are also discussed.
△ Less
Submitted 31 December, 2015;
originally announced December 2015.
-
Interleaving techniques for high-throughput chaotic noise generation in CMOS
Authors:
Sergio Callegari,
Riccardo Rovatti,
Gianluca Setti
Abstract:
An interleaving technique is proposed to enhance the throughput of current-mode CMOS discrete time chaotic sources based on the iteration of unidimensional maps. A discussion of the reasons and the advantages offered by the approach is provided, together with analytical results about the conservation of some major statistical features. As an example, application to an FM-DCSK communication system…
▽ More
An interleaving technique is proposed to enhance the throughput of current-mode CMOS discrete time chaotic sources based on the iteration of unidimensional maps. A discussion of the reasons and the advantages offered by the approach is provided, together with analytical results about the conservation of some major statistical features. As an example, application to an FM-DCSK communication system is proposed. To conclude, a sample circuit capable of 20 Msample/s is presented.
△ Less
Submitted 1 July, 2015;
originally announced July 2015.
-
A Tailed Tent Map Chaotic Circuit Exploiting S$^2$I Memory Elements
Authors:
Sergio Callegari,
Riccardo Rovatti,
Gianluca Setti
Abstract:
In the implementation of discrete time chaotic systems, designers have mostly focused on the choice and synthesis of suitable nonlinear blocks, while correct and fast operation cannot neglect analog memory elements. Herein, a realization exploiting the Tailed Tent Map coupled with S$^2$I sample and hold stages is proposed. Interfacing problems between the memory and the processing sub-circuits are…
▽ More
In the implementation of discrete time chaotic systems, designers have mostly focused on the choice and synthesis of suitable nonlinear blocks, while correct and fast operation cannot neglect analog memory elements. Herein, a realization exploiting the Tailed Tent Map coupled with S$^2$I sample and hold stages is proposed. Interfacing problems between the memory and the processing sub-circuits are tackled and the possibility to obtain a fivefold speed improvement with respect to previously reported results is demonstrated by means of SPICE and other computer aided simulations.
△ Less
Submitted 27 June, 2015;
originally announced June 2015.
-
On Known-Plaintext Attacks to a Compressed Sensing-based Encryption: A Quantitative Analysis
Authors:
Valerio Cambareri,
Mauro Mangia,
Fabio Pareschi,
Riccardo Rovatti,
Gianluca Setti
Abstract:
Despite the linearity of its encoding, compressed sensing may be used to provide a limited form of data protection when random encoding matrices are used to produce sets of low-dimensional measurements (ciphertexts). In this paper we quantify by theoretical means the resistance of the least complex form of this kind of encoding against known-plaintext attacks. For both standard compressed sensing…
▽ More
Despite the linearity of its encoding, compressed sensing may be used to provide a limited form of data protection when random encoding matrices are used to produce sets of low-dimensional measurements (ciphertexts). In this paper we quantify by theoretical means the resistance of the least complex form of this kind of encoding against known-plaintext attacks. For both standard compressed sensing with antipodal random matrices and recent multiclass encryption schemes based on it, we show how the number of candidate encoding matrices that match a typical plaintext-ciphertext pair is so large that the search for the true encoding matrix inconclusive. Such results on the practical ineffectiveness of known-plaintext attacks underlie the fact that even closely-related signal recovery under encoding matrix uncertainty is doomed to fail.
Practical attacks are then exemplified by applying compressed sensing with antipodal random matrices as a multiclass encryption scheme to signals such as images and electrocardiographic tracks, showing that the extracted information on the true encoding matrix from a plaintext-ciphertext pair leads to no significant signal recovery quality increase. This theoretical and empirical evidence clarifies that, although not perfectly secure, both standard compressed sensing and multiclass encryption schemes feature a noteworthy level of security against known-plaintext attacks, therefore increasing its appeal as a negligible-cost encryption method for resource-limited sensing applications.
△ Less
Submitted 25 June, 2015; v1 submitted 6 November, 2013;
originally announced November 2013.
-
From Chirps to Random-FM Excitations in Pulse Compression Ultrasound Systems
Authors:
Sergio Callegari,
Marco Ricci,
Salvatore Caporale,
Marcello Monticelli,
Massimiliano Eroli,
Luca Senni,
Riccardo Rovatti,
Gianluca Setti,
Pietro Burrascano
Abstract:
Pulse compression is often practiced in ultrasound Non Destructive Testing (NDT) systems using chirps. However, chirps are inadequate for setups where multiple probes need to operate concurrently in Multiple Input Multiple Output (MIMO) arrangements. Conversely, many coded excitation systems designed for MIMO miss some chirp advantages (constant envelope excitation, easiness of bandwidth control,…
▽ More
Pulse compression is often practiced in ultrasound Non Destructive Testing (NDT) systems using chirps. However, chirps are inadequate for setups where multiple probes need to operate concurrently in Multiple Input Multiple Output (MIMO) arrangements. Conversely, many coded excitation systems designed for MIMO miss some chirp advantages (constant envelope excitation, easiness of bandwidth control, etc.) and may not be easily implemented on hardware originally conceived for chirp excitations. Here, we propose a system based on random-FM excitations, capable of enabling MIMO with minimal changes with respect to a chirp-based setup. Following recent results, we show that random-FM excitations retain many advantages of chirps and provide the ability to frequency-shape the excitations matching the transducers features.
△ Less
Submitted 24 October, 2013;
originally announced October 2013.
-
Sample and Hold Errors in the Implementation of Chaotic Maps
Authors:
Sergio Callegari,
Riccardo Rovatti
Abstract:
Though considerable effort has recently been devoted to hardware realization of chaotic maps, the analysis generally neglects the influence of implementation inaccuracies. Here we investigate the consequences of S/H errors on Bernoulli shift, tent map and tailed tent map systems: an error model is proposed and implementations are characterized under its assumptions.
Though considerable effort has recently been devoted to hardware realization of chaotic maps, the analysis generally neglects the influence of implementation inaccuracies. Here we investigate the consequences of S/H errors on Bernoulli shift, tent map and tailed tent map systems: an error model is proposed and implementations are characterized under its assumptions.
△ Less
Submitted 24 October, 2013; v1 submitted 17 October, 2013;
originally announced October 2013.
-
Low-complexity Multiclass Encryption by Compressed Sensing
Authors:
Valerio Cambareri,
Mauro Mangia,
Fabio Pareschi,
Riccardo Rovatti,
Gianluca Setti
Abstract:
The idea that compressed sensing may be used to encrypt information from unauthorised receivers has already been envisioned, but never explored in depth since its security may seem compromised by the linearity of its encoding process. In this paper we apply this simple encoding to define a general private-key encryption scheme in which a transmitter distributes the same encoded measurements to rec…
▽ More
The idea that compressed sensing may be used to encrypt information from unauthorised receivers has already been envisioned, but never explored in depth since its security may seem compromised by the linearity of its encoding process. In this paper we apply this simple encoding to define a general private-key encryption scheme in which a transmitter distributes the same encoded measurements to receivers of different classes, which are provided partially corrupted encoding matrices and are thus allowed to decode the acquired signal at provably different levels of recovery quality.
The security properties of this scheme are thoroughly analysed: firstly, the properties of our multiclass encryption are theoretically investigated by deriving performance bounds on the recovery quality attained by lower-class receivers with respect to high-class ones. Then we perform a statistical analysis of the measurements to show that, although not perfectly secure, compressed sensing grants some level of security that comes at almost-zero cost and thus may benefit resource-limited applications.
In addition to this we report some exemplary applications of multiclass encryption by compressed sensing of speech signals, electrocardiographic tracks and images, in which quality degradation is quantified as the impossibility of some feature extraction algorithms to obtain sensitive information from suitably degraded signal recoveries.
△ Less
Submitted 17 February, 2015; v1 submitted 12 July, 2013;
originally announced July 2013.
-
Rakeness in the design of Analog-to-Information Conversion of Sparse and Localized Signals
Authors:
Mauro Mangia,
Riccardo Rovatti,
Gianluca Setti
Abstract:
Design of Random Modulation Pre-Integration systems based on the restricted-isometry property may be suboptimal when the energy of the signals to be acquired is not evenly distributed, i.e. when they are both sparse and localized. To counter this, we introduce an additional design criterion, that we call rakeness, accounting for the amount of energy that the measurements capture from the signal to…
▽ More
Design of Random Modulation Pre-Integration systems based on the restricted-isometry property may be suboptimal when the energy of the signals to be acquired is not evenly distributed, i.e. when they are both sparse and localized. To counter this, we introduce an additional design criterion, that we call rakeness, accounting for the amount of energy that the measurements capture from the signal to be acquired. Hence, for localized signals a proper system tuning increases the rakeness as well as the average SNR of the samples used in its reconstruction. Yet, maximizing average SNR may go against the need of capturing all the components that are potentially non-zero in a sparse signal, i.e., against the restricted isometry requirement ensuring reconstructability. What we propose is to administer the trade-off between rakeness and restricted isometry in a statistical way by laying down an optimization problem. The solution of such an optimization problem is the statistic of the process generating the random waveforms onto which the signal is projected to obtain the measurements. The formal definition of such a problems is given as well as its solution for signals that are either localized in frequency or in more generic domain. Sample applications, to ECG signals and small images of printed letters and numbers, show that rakeness-based design leads to non-negligible improvements in both cases.
△ Less
Submitted 5 May, 2012;
originally announced May 2012.
-
Determination of the Integrated Sidelobe Level of Sets of Rotated Legendre Sequences
Authors:
Salvador Javier Haboba,
Riccardo Rovatti,
Gianluca Setti
Abstract:
Sequences sets with low aperiodic auto- and cross-correlations play an important role in many applications like communications, radar and other active sensing applications. The use of antipodal sequences reduces hardware requirements while increases the difficult of the task of signal design. In this paper we present a method for the computation of the Integrated Sidelobe Level (ISL), and we use i…
▽ More
Sequences sets with low aperiodic auto- and cross-correlations play an important role in many applications like communications, radar and other active sensing applications. The use of antipodal sequences reduces hardware requirements while increases the difficult of the task of signal design. In this paper we present a method for the computation of the Integrated Sidelobe Level (ISL), and we use it to calculate the asymptotic expression for the ISL of a set of sequences formed by different rotations of a Legendre sequence.
△ Less
Submitted 14 February, 2011; v1 submitted 16 December, 2010;
originally announced December 2010.
-
Markov Modeling of Cooperative Multiplayer Coupon Collectors' Problems
Authors:
R. Rovatti,
C. Passerini,
G. Mazzini
Abstract:
The paper introduces a modified version of the classical Coupon Collector's Problem entailing exchanges and cooperation between multiple players. Results of the development show that, within a proper Markov framework, the complexity of the Cooperative Multiplayer Coupon Collectors' Problem can be attacked with an eye to the modeling of resource harvesting and sharing within the context of Next G…
▽ More
The paper introduces a modified version of the classical Coupon Collector's Problem entailing exchanges and cooperation between multiple players. Results of the development show that, within a proper Markov framework, the complexity of the Cooperative Multiplayer Coupon Collectors' Problem can be attacked with an eye to the modeling of resource harvesting and sharing within the context of Next Generation Network. The cost of cooperation is computed in terms of exchange protocol burden and found to be dependent on only ensemble parameters such as the number of players and the number of coupons but not on the detailed collection statistics. The benefits of cooperation are quantified in terms of reduction of the average number of actions before collection completion.
△ Less
Submitted 13 December, 2009;
originally announced December 2009.