Skip to main content

Showing 1–50 of 125 results for author: Sadeghi, P

.
  1. arXiv:2407.01167  [pdf, other

    cs.IT cs.CR

    Information Density Bounds for Privacy

    Authors: Sara Saeidian, Leonhard Grosse, Parastoo Sadeghi, Mikael Skoglund, Tobias J. Oechtering

    Abstract: This paper explores the implications of guaranteeing privacy by imposing a lower bound on the information density between the private and the public data. We introduce an operationally meaningful privacy measure called pointwise maximal cost (PMC) and demonstrate that imposing an upper bound on PMC is equivalent to enforcing a lower bound on the information density. PMC quantifies the information… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  2. arXiv:2406.13569  [pdf, other

    cs.LG cs.AI cs.CR cs.IT

    Bayes' capacity as a measure for reconstruction attacks in federated learning

    Authors: Sayan Biswas, Mark Dras, Pedro Faustini, Natasha Fernandes, Annabelle McIver, Catuscia Palamidessi, Parastoo Sadeghi

    Abstract: Within the machine learning community, reconstruction attacks are a principal attack of concern and have been identified even in federated learning, which was designed with privacy preservation in mind. In federated learning, it has been shown that an adversary with knowledge of the machine learning architecture is able to infer the exact value of a training element given an observation of the wei… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

  3. arXiv:2406.06990  [pdf, ps, other

    cs.IT

    Privacy-Utility Tradeoff Based on $α$-lift

    Authors: Mohammad Amin Zarrabian, Parastoo Sadeghi

    Abstract: Information density and its exponential form, known as lift, play a central role in information privacy leakage measures. $α$-lift is the power-mean of lift, which is tunable between the worst-case measure max-lift ($α=\infty$) and more relaxed versions ($α<\infty$). This paper investigates the optimization problem of the privacy-utility tradeoff (PUT) where $α$-lift and mutual information are pri… ▽ More

    Submitted 20 June, 2024; v1 submitted 11 June, 2024; originally announced June 2024.

    Comments: This version has developed algorithm representations and updated simulation results

  4. arXiv:2405.07151  [pdf, other

    cs.IT

    Group Complete-$\{s\}$ Pliable Index Coding

    Authors: Sina Eghbal, Badri N. Vellambi, Lawrence Ong, Parastoo Sadeghi

    Abstract: This paper introduces a novel class of PICOD($t$) problems referred to as $g$-group complete-$S$ PICOD($t$) problems. It constructs a multi-stage achievability scheme to generate pliable index codes for group complete PICOD problems when $S = \{s\}$ is a singleton set. Using the maximum acyclic induced subgraph bound, lower bounds on the broadcast rate are derived for singleton $S$, which establis… ▽ More

    Submitted 11 May, 2024; originally announced May 2024.

    Comments: Accepted for publication in 2024 IEEE International Symposium on Information Theory

  5. arXiv:2405.00423  [pdf, ps, other

    cs.IT

    $α$-leakage by Rényi Divergence and Sibson Mutual Information

    Authors: Ni Ding, Mohammad Amin Zarrabian, Parastoo Sadeghi

    Abstract: For $\tilde{f}(t) = \exp(\frac{α-1}αt)$, this paper proposes a $\tilde{f}$-mean information gain measure. Rényi divergence is shown to be the maximum $\tilde{f}$-mean information gain incurred at each elementary event $y$ of channel output $Y$ and Sibson mutual information is the $\tilde{f}$-mean of this $Y$-elementary information gain. Both are proposed as $α$-leakage measures, indicating the mos… ▽ More

    Submitted 2 July, 2024; v1 submitted 1 May, 2024; originally announced May 2024.

    Comments: authorship dispute

  6. arXiv:2404.04845  [pdf, other

    cs.CL cs.AI

    SLPL SHROOM at SemEval2024 Task 06: A comprehensive study on models ability to detect hallucination

    Authors: Pouya Fallah, Soroush Gooran, Mohammad Jafarinasab, Pouya Sadeghi, Reza Farnia, Amirreza Tarabkhah, Zainab Sadat Taghavi, Hossein Sameti

    Abstract: Language models, particularly generative models, are susceptible to hallucinations, generating outputs that contradict factual knowledge or the source text. This study explores methods for detecting hallucinations in three SemEval-2024 Task 6 tasks: Machine Translation, Definition Modeling, and Paraphrase Generation. We evaluate two methods: semantic similarity between the generated text and factu… ▽ More

    Submitted 9 April, 2024; v1 submitted 7 April, 2024; originally announced April 2024.

  7. arXiv:2404.02474  [pdf, other

    cs.CL cs.AI cs.IR cs.LG

    uTeBC-NLP at SemEval-2024 Task 9: Can LLMs be Lateral Thinkers?

    Authors: Pouya Sadeghi, Amirhossein Abaskohi, Yadollah Yaghoobzadeh

    Abstract: Inspired by human cognition, Jiang et al.(2023c) create a benchmark for assessing LLMs' lateral thinking-thinking outside the box. Building upon this benchmark, we investigate how different prompting methods enhance LLMs' performance on this task to reveal their inherent power for outside-the-box thinking ability. Through participating in SemEval-2024, task 9, Sentence Puzzle sub-task, we explore… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

    Comments: 12 pages, 5 figures, 6 tables, Proceedings of the 18th International Workshop on Semantic Evaluation (SemEval-2024) @ NAACL 2024

  8. arXiv:2404.02403  [pdf, other

    cs.CL cs.LG

    Benchmarking Large Language Models for Persian: A Preliminary Study Focusing on ChatGPT

    Authors: Amirhossein Abaskohi, Sara Baruni, Mostafa Masoudi, Nesa Abbasi, Mohammad Hadi Babalou, Ali Edalat, Sepehr Kamahi, Samin Mahdizadeh Sani, Nikoo Naghavian, Danial Namazifard, Pouya Sadeghi, Yadollah Yaghoobzadeh

    Abstract: This paper explores the efficacy of large language models (LLMs) for Persian. While ChatGPT and consequent LLMs have shown remarkable performance in English, their efficiency for more low-resource languages remains an open question. We present the first comprehensive benchmarking study of LLMs across diverse Persian language tasks. Our primary focus is on GPT-3.5-turbo, but we also include GPT-4 a… ▽ More

    Submitted 2 April, 2024; originally announced April 2024.

    Comments: 14 pages, 1 figure, 6 tables, Proceeding of the 2024 Joint International Conference on Computational Linguistics, Language Resources and Evaluation (LREC-COLING)

  9. arXiv:2403.10342  [pdf, other

    cs.NI

    Cooperative Jamming for Physical Layer Security Enhancement Using Deep Reinforcement Learning

    Authors: Sayed Amir Hoseini, Faycal Bouhafs, Neda Aboutorab, Parastoo Sadeghi, Frank den Hartog

    Abstract: Wireless data communications are always facing the risk of eavesdrop** and interception. Conventional protection solutions which are based on encryption may not always be practical as is the case for wireless IoT networks or may soon become ineffective against quantum computers. In this regard, Physical Layer Security (PLS) presents a promising approach to secure wireless communications through… ▽ More

    Submitted 15 March, 2024; originally announced March 2024.

  10. arXiv:2402.12967  [pdf, other

    cs.IT cs.CR

    Quantifying Privacy via Information Density

    Authors: Leonhard Grosse, Sara Saeidian, Parastoo Sadeghi, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We examine the relationship between privacy metrics that utilize information density to measure information leakage between a private and a disclosed random variable. Firstly, we prove that bounding the information density from above or below in turn implies a lower or upper bound on the information density, respectively. Using this result, we establish new relationships between local information… ▽ More

    Submitted 20 February, 2024; originally announced February 2024.

    MSC Class: 94A17 ACM Class: H.1.1

  11. arXiv:2401.15202  [pdf, ps, other

    cs.IT

    A Cross Entropy Interpretation of R{é}nyi Entropy for $α$-leakage

    Authors: Ni Ding, Mohammad Amin Zarrabian, Parastoo Sadeghi

    Abstract: This paper proposes an $α$-leakage measure for $α\in[0,\infty)$ by a cross entropy interpretation of R{é}nyi entropy. While Rényi entropy was originally defined as an $f$-mean for $f(t) = \exp((1-α)t)$, we reveal that it is also a $\tilde{f}$-mean cross entropy measure for $\tilde{f}(t) = \exp(\frac{1-α}αt)$. Minimizing this Rényi cross-entropy gives Rényi entropy, by which the prior and posterior… ▽ More

    Submitted 26 January, 2024; originally announced January 2024.

    Comments: 7 pages; 1 figure

  12. Neutrino spin oscillation in screening models revisited

    Authors: Fayçal Hammad, Nicolas Fleury, Parvaneh Sadeghi

    Abstract: We study, using the Mathisson-Papapetrou-Dixon equations, the spin oscillation of neutrinos when the latter are coupled to the scalar field of screening models of dark energy. First, we derive the transition probability formula for a left-handed neutrino to become a right-handed neutrino within a general static and spherically symmetric metric. We then apply our general formula to neutrinos deflec… ▽ More

    Submitted 18 December, 2023; originally announced December 2023.

    Comments: 9 pages. Matches the published version

    Journal ref: Phys. Rev. D 108, 083025 (2023)

  13. arXiv:2310.20486  [pdf, ps, other

    cs.IT

    Optimal Binary Differential Privacy via Graphs

    Authors: Sahel Torkamani, Javad B. Ebrahimi, Parastoo Sadeghi, Rafael G. L. D'Oliveira, Muriel Médard

    Abstract: We present the notion of \emph{reasonable utility} for binary mechanisms, which applies to all utility functions in the literature. This notion induces a partial ordering on the performance of all binary differentially private (DP) mechanisms. DP mechanisms that are maximal elements of this ordering are optimal DP mechanisms for every reasonable utility. By looking at differential privacy as a ran… ▽ More

    Submitted 31 October, 2023; originally announced October 2023.

  14. arXiv:2309.05871  [pdf, other

    cs.CR cs.IR cs.IT

    Generalized Rainbow Differential Privacy

    Authors: Yuzhou Gu, Ziqi Zhou, Onur Günlü, Rafael G. L. D'Oliveira, Parastoo Sadeghi, Muriel Médard, Rafael F. Schaefer

    Abstract: We study a new framework for designing differentially private (DP) mechanisms via randomized graph colorings, called rainbow differential privacy. In this framework, datasets are nodes in a graph, and two neighboring datasets are connected by an edge. Each dataset in the graph has a preferential ordering for the possible outputs of the mechanism, and these orderings are called rainbows. Different… ▽ More

    Submitted 5 April, 2024; v1 submitted 11 September, 2023; originally announced September 2023.

    Comments: arXiv admin note: text overlap with arXiv:2202.03974

  15. arXiv:2305.06577  [pdf, other

    cs.IT

    Preferential Pliable Index Coding

    Authors: Daniel Byrne, Lawrence Ong, Parastoo Sadeghi, Badri N. Vellambi

    Abstract: We propose and study a variant of pliable index coding (PICOD) where receivers have preferences for their unknown messages and give each unknown message a preference ranking. We call this the preferential pliable index-coding (PPICOD) problem and study the Pareto trade-off between the code length and overall satisfaction metric among all receivers. We derive theoretical characteristics of the PPIC… ▽ More

    Submitted 15 May, 2023; v1 submitted 11 May, 2023; originally announced May 2023.

    Comments: An extended version of the same-titled paper accepted for presentation at the 2023 IEEE International Symposium on Information Theory (ISIT)

  16. Neutrino flavor oscillations inside matter in conformal coupling models

    Authors: Fayçal Hammad, Parvaneh Sadeghi, Nicolas Fleury

    Abstract: We recently studied neutrinos flavor oscillations in vacuum within conformal coupling models. In this paper, we extend that analysis by investigating neutrino flavor oscillations inside matter within a general conformal coupling scenario. We first derive the general formula for the flavor transition probability inside matter in arbitrary static and spherically symmetric spacetimes. The modified re… ▽ More

    Submitted 11 May, 2023; v1 submitted 7 April, 2023; originally announced April 2023.

    Comments: 12 pages. No figures. One reference added. Section II (summarizing the vacuum oscillations) in this article draws heavily from arXiv:2209.03899, where vacuum oscillations in screening models have been worked out in much more detail. Matches the published version

    Journal ref: Phys. Rev. D 107, 104015 (2023)

  17. arXiv:2303.13771  [pdf, other

    cs.IT cs.CR

    On the connection between the ABS perturbation methodology and differential privacy

    Authors: Parastoo Sadeghi, Chien-Hung Chien

    Abstract: This paper explores analytical connections between the perturbation methodology of the Australian Bureau of Statistics (ABS) and the differential privacy (DP) framework. We consider a single static counting query function and find the analytical form of the perturbation distribution with symmetric support for the ABS perturbation methodology. We then analytically measure the DP parameters, namely… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

  18. On the Lift, Related Privacy Measures, and Applications to Privacy-Utility Tradeoffs

    Authors: Mohammad Amin Zarrabian, Ni Ding, Parastoo Sadeghi

    Abstract: This paper investigates lift, the likelihood ratio between the posterior and prior belief about sensitive features in a dataset. Maximum and minimum lifts over sensitive features quantify the adversary's knowledge gain and should be bounded to protect privacy. We demonstrate that max and min lifts have a distinct range of values and probability of appearance in the dataset, referred to as \emph{li… ▽ More

    Submitted 2 March, 2023; originally announced March 2023.

  19. Revisiting the Schrödinger-Dirac equation

    Authors: Nicolas Fleury, Fayçal Hammad, Parvaneh Sadeghi

    Abstract: In flat spacetime, the Dirac equation is the "square root" of the Klein-Gordon equation in the sense that by applying the square of the Dirac operator to the Dirac spinor, one recovers the Klein-Gordon equation duplicated for each component of the spinor. In the presence of gravity, applying the square of the curved-spacetime Dirac operator to the Dirac spinor does not yield the curved-spacetime K… ▽ More

    Submitted 13 February, 2023; originally announced February 2023.

    Comments: 23 pages, no figures. An Addendum is included at the end of the article, and 3 additional references inserted

    Journal ref: Symmetry 15(2), 432 (2023)

  20. Age of Information in Downlink Systems: Broadcast or Unicast Transmission?

    Authors: Zhifeng Tang, Nan Yang, Parastoo Sadeghi, Xiangyun Zhou

    Abstract: We analytically decide whether the broadcast transmission scheme or the unicast transmission scheme achieves the optimal age of information (AoI) performance of a multiuser system where a base station (BS) generates and transmits status updates to multiple user equipments (UEs). In the broadcast transmission scheme, the status update for all UEs is jointly encoded into a packet for transmission, w… ▽ More

    Submitted 7 July, 2023; v1 submitted 26 October, 2022; originally announced October 2022.

  21. arXiv:2210.12916  [pdf, ps, other

    cs.IT cs.CR

    Explaining epsilon in local differential privacy through the lens of quantitative information flow

    Authors: Natasha Fernandes, Annabelle McIver, Parastoo Sadeghi

    Abstract: The study of leakage measures for privacy has been a subject of intensive research and is an important aspect of understanding how privacy leaks occur in computer systems. Differential privacy has been a focal point in the privacy community for some years and yet its leakage characteristics are not completely understood. In this paper we bring together two areas of research -- information theory a… ▽ More

    Submitted 18 May, 2023; v1 submitted 23 October, 2022; originally announced October 2022.

  22. Plane-wave and wavepacket neutrino flavor oscillations in vacuum in conformal coupling models

    Authors: Fayçal Hammad, Parvaneh Sadeghi, Nicolas Fleury

    Abstract: We investigate neutrino flavor oscillations in vacuum within a general conformal coupling model. We first examine the flavor oscillations within the plane-wave description of neutrinos, and then we extend our analysis to the wavepacket-based formalism. In both cases, we derive the general formulas for the flavor transition probability in arbitrary static and spherically symmetric spacetimes. We th… ▽ More

    Submitted 27 September, 2022; v1 submitted 8 September, 2022; originally announced September 2022.

    Comments: 16 pages, 3 figures. One reference added, titles of two others rectified

    Journal ref: Phys. Rev. D 106, 065019 (2022)

  23. arXiv:2206.06646  [pdf, other

    cs.NI cs.CR

    Network-Controlled Physical-Layer Security: Enhancing Secrecy Through Friendly Jamming

    Authors: Sayed Amir Hoseini, Parastoo Sadeghi, Faycal Bouhafs, Neda Aboutorab, Frank den Hartog

    Abstract: The broadcasting nature of the wireless medium makes exposure to eavesdroppers a potential threat. Physical Layer Security (PLS) has been widely recognized as a promising security measure complementary to encryption. It has recently been demonstrated that PLS can be implemented using off-the-shelf equipment by spectrum-programming enhanced Software-Defined Networking (SDN), where a network control… ▽ More

    Submitted 14 June, 2022; originally announced June 2022.

  24. arXiv:2205.14549  [pdf, ps, other

    cs.IT

    Asymmetric Local Information Privacy and the Watchdog Mechanism

    Authors: Mohammad Amin Zarrabian, Ni Ding, Parastoo Sadeghi

    Abstract: This paper proposes a novel watchdog privatization scheme by generalizing local information privacy (LIP) to enhance data utility. To protect the sensitive features $S$ correlated with some useful data $X$, LIP restricts the lift, the ratio of the posterior belief to the prior on $S$ after and before accessing $X$. For each $x$, both maximum and minimum lift over sensitive features are measures of… ▽ More

    Submitted 28 May, 2022; originally announced May 2022.

  25. arXiv:2205.10827  [pdf, other

    cs.IT cs.CR

    Information Leakage in Index Coding With Sensitive and Non-Sensitive Messages

    Authors: Yucheng Liu, Lawrence Ong, Phee Lep Yeoh, Parastoo Sadeghi, Joerg Kliewer, Sarah Johnson

    Abstract: Information leakage to a guessing adversary in index coding is studied, where some messages in the system are sensitive and others are not. The non-sensitive messages can be used by the server like secret keys to mitigate leakage of the sensitive messages to the adversary. We construct a deterministic linear coding scheme, developed from the rank minimization method based on fitting matrices (Bar-… ▽ More

    Submitted 22 May, 2022; originally announced May 2022.

    Comments: Accepted by IEEE International Symposium on Information Theory (ISIT) 2022

  26. arXiv:2205.10821  [pdf, other

    cs.IT cs.CR

    Information Leakage in Index Coding

    Authors: Yucheng Liu, Lawrence Ong, Phee Lep Yeoh, Parastoo Sadeghi, Joerg Kliewer, Sarah Johnson

    Abstract: We study the information leakage to a guessing adversary in index coding with a general message distribution. Under both vanishing-error and zero-error decoding assumptions, we develop lower and upper bounds on the optimal leakage rate, which are based on the broadcast rate of the subproblem induced by the set of messages the adversary tries to guess. When the messages are independent and uniforml… ▽ More

    Submitted 22 May, 2022; originally announced May 2022.

    Comments: Published in Proceedings of IEEE Information Theory Workshop (ITW) 2021

  27. arXiv:2203.15429  [pdf, ps, other

    cs.DS cs.IT

    Heterogeneous Differential Privacy via Graphs

    Authors: Sahel Torkamani, Javad B. Ebrahimi, Parastoo Sadeghi, Rafael G. L. D'Oliveira, Muriel Medard

    Abstract: We generalize a previous framework for designing utility-optimal differentially private (DP) mechanisms via graphs, where datasets are vertices in the graph and edges represent dataset neighborhood. The boundary set contains datasets where an individual's response changes the binary-valued query compared to its neighbors. Previous work was limited to the homogeneous case where the privacy paramete… ▽ More

    Submitted 29 March, 2022; originally announced March 2022.

  28. arXiv:2202.03974  [pdf, other

    cs.CR cs.IR cs.IT cs.LG

    Rainbow Differential Privacy

    Authors: Ziqi Zhou, Onur Günlü, Rafael G. L. D'Oliveira, Muriel Médard, Parastoo Sadeghi, Rafael F. Schaefer

    Abstract: We extend a previous framework for designing differentially private (DP) mechanisms via randomized graph colorings that was restricted to binary functions, corresponding to colorings in a graph, to multi-valued functions. As before, datasets are nodes in the graph and any two neighboring datasets are connected by an edge. In our setting, we assume that each dataset has a preferential ordering for… ▽ More

    Submitted 13 May, 2022; v1 submitted 8 February, 2022; originally announced February 2022.

    Comments: To appear in the 2022 IEEE International Symposium on Information Theory

  29. arXiv:2201.10057  [pdf, ps, other

    cs.IT

    On the Optimality of Linear Index Coding over the Fields with Characteristic Three

    Authors: Arman Sharififar, Parastoo Sadeghi, Neda Aboutorab

    Abstract: It has been known that the insufficiency of linear coding in achieving the optimal rate of the general index coding problem is rooted in its rate's dependency on the field size. However, this dependency has been described only through the two well-known matroid instances, namely the Fano and non-Fano matroids, which, in turn, limits its scope only to the fields with characteristic two. In this pap… ▽ More

    Submitted 1 May, 2022; v1 submitted 24 January, 2022; originally announced January 2022.

  30. Spin-1/2 particles under the influence of a uniform magnetic field in the interior Schwarzschild solution

    Authors: Fayçal Hammad, Alexandre Landry, Parvaneh Sadeghi

    Abstract: The relativistic wave equation for spin-1/2 particles in the interior Schwarzschild solution in the presence of a uniform magnetic field is obtained. The fully relativistic regime is considered, and the energy levels occupied by the particles are derived as functions of the magnetic field, the radius of the massive sphere and the total mass of the latter. As no assumption is made on the relative s… ▽ More

    Submitted 30 November, 2021; originally announced November 2021.

    Comments: 18+5 pages, no figures. This paper is published in the Special Issue of the Journal Universe: Feature Papers - Compact Objects

    Journal ref: Universe 7(12), 467 (2021)

  31. arXiv:2111.02638  [pdf, ps, other

    cs.IT eess.SP

    The Age of Information of Short-Packet Communications: Joint or Distributed Encoding?

    Authors: Zhifeng Tang, Nan Yang, Parastoo Sadeghi, Xiangyun Zhou

    Abstract: In this paper, we analyze the impact of different encoding schemes on the age of information (AoI) performance in a point-to-point system, where a source generates packets based on the status updates collected from multiple sensors and transmits the packets to a destination. In this system, we consider two encoding schemes, namely, the joint encoding scheme and the distributed encoding scheme. In… ▽ More

    Submitted 4 November, 2021; originally announced November 2021.

  32. Wave packet treatment of neutrino flavor oscillations in various spacetimes

    Authors: P. Sadeghi, F. Hammad, A. Landry, T. Martel

    Abstract: We study the effect of gravity on neutrino flavor oscillations when each mass eigenstate is described by a wave packet instead of a plane wave. Two different approaches for implementing the wave packet formalism in the study of neutrino flavor oscillations in curved spacetime are examined. We work with a general static and spherically symmetric spacetime before applying our results to a few spacet… ▽ More

    Submitted 2 November, 2021; originally announced November 2021.

    Comments: 31 pages. 1 figure

    Journal ref: Gen. Relativ. Gravit. 53, 98 (2021)

  33. arXiv:2110.06412  [pdf, other

    cs.CR cs.IT

    Offset-Symmetric Gaussians for Differential Privacy

    Authors: Parastoo Sadeghi, Mehdi Korki

    Abstract: The Gaussian distribution is widely used in mechanism design for differential privacy (DP). Thanks to its sub-Gaussian tail, it significantly reduces the chance of outliers when responding to queries. However, it can only provide approximate $(ε, δ(ε))$-DP. In practice, $δ(ε)$ must be much smaller than the size of the dataset, which may limit the use of the Gaussian mechanism for large datasets wi… ▽ More

    Submitted 12 October, 2021; originally announced October 2021.

  34. arXiv:2110.04724  [pdf, ps, other

    cs.IT

    Enhancing Utility in the Watchdog Privacy Mechanism

    Authors: Mohammad Amin Zarrabian, Ni Ding, Parastoo Sadeghi, Thierry Rakotoarivelo

    Abstract: This paper is concerned with enhancing data utility in the privacy watchdog method for attaining information-theoretic privacy. For a specific privacy constraint, the watchdog method filters out the high-risk data symbols through applying a uniform data regulation scheme, e.g., merging all high-risk symbols together. While this method entirely trades the symbols resolution off for privacy, we show… ▽ More

    Submitted 10 October, 2021; originally announced October 2021.

    Comments: 5 pages, 3 figures

    MSC Class: 68P27;

  35. arXiv:2105.07211  [pdf, other

    cs.IT

    On Converse Results for Secure Index Coding

    Authors: Yucheng Liu, Lawrence Ong, Parastoo Sadeghi, Neda Aboutorab, Arman Sharififar

    Abstract: In this work, we study the secure index coding problem where there are security constraints on both legitimate receivers and eavesdroppers. We develop two performance bounds (i.e., converse results) on the symmetric secure capacity. The first one is an extended version of the basic acyclic chain bound (Liu and Sadeghi, 2019) that takes security constraints into account. The second converse result… ▽ More

    Submitted 15 May, 2021; originally announced May 2021.

    Comments: A shortened version submitted to IEEE Information Theory Workshop (ITW) 2021

  36. Fresh look at the effects of gravitational tidal forces on a freely-falling quantum particle

    Authors: F. Hammad, P. Sadeghi, N. Fleury, A. Leblanc

    Abstract: We take a closer and new look at the effects of tidal forces on the free fall of a quantum particle inside a spherically symmetric gravitational field. We derive the corresponding Schrödinger equation for the particle by starting from the fully relativistic Klein-Gordon equation in order (i) to briefly discuss the issue of the equivalence principle and (ii) to be able to compare the relativistic t… ▽ More

    Submitted 28 September, 2021; v1 submitted 18 February, 2021; originally announced February 2021.

    Comments: 33 pages. References added and typos corrected. Accepted for publication in IJMPD

    Journal ref: Int. J. Mod. Phys. D 31, 2150121 (2022)

  37. arXiv:2102.05172  [pdf, ps, other

    cs.IT

    Differential Privacy for Binary Functions via Randomized Graph Colorings

    Authors: Rafael G. L. D'Oliveira, Muriel Medard, Parastoo Sadeghi

    Abstract: We present a framework for designing differentially private (DP) mechanisms for binary functions via a graph representation of datasets. Datasets are nodes in the graph and any two neighboring datasets are connected by an edge. The true binary function we want to approximate assigns a value (or true color) to a dataset. Randomized DP mechanisms are then equivalent to randomized colorings of the gr… ▽ More

    Submitted 9 February, 2021; originally announced February 2021.

    Comments: Submitted to IEEE ISIT 2021

  38. arXiv:2102.01908  [pdf, other

    cs.IT cs.CR

    Information Leakage in Zero-Error Source Coding: A Graph-Theoretic Perspective

    Authors: Yucheng Liu, Lawrence Ong, Sarah Johnson, Joerg Kliewer, Parastoo Sadeghi, Phee Lep Yeoh

    Abstract: We study the information leakage to a guessing adversary in zero-error source coding. The source coding problem is defined by a confusion graph capturing the distinguishability between source symbols. The information leakage is measured by the ratio of the adversary's successful guessing probability after and before eavesdrop** the codeword, maximized over all possible source distributions. Such… ▽ More

    Submitted 3 February, 2021; originally announced February 2021.

    Comments: A shortened version has been submitted to ISIT 2021

  39. arXiv:2102.01526  [pdf, ps, other

    cs.IT

    Broadcast Rate Requires Nonlinear Coding in a Unicast Index Coding Instance of Size 36

    Authors: Arman Sharififar, Parastoo Sadeghi, Neda Aboutorab

    Abstract: Insufficiency of linear coding for the network coding problem was first proved by providing an instance which is solvable only by nonlinear network coding (Dougherty et al., 2005).Based on the work of Effros, et al., 2015, this specific network coding instance can be modeled as a groupcast index coding (GIC)instance with 74 messages and 80 users (where a message can be requested by multiple users)… ▽ More

    Submitted 5 February, 2023; v1 submitted 2 February, 2021; originally announced February 2021.

  40. arXiv:2101.10551  [pdf, ps, other

    cs.IT

    $α$-Information-theoretic Privacy Watchdog and Optimal Privatization Scheme

    Authors: Ni Ding, Mohammad Amin Zarrabian, Parastoo Sadeghi

    Abstract: This paper proposes an $α$-lift measure for data privacy and determines the optimal privatization scheme that minimizes the $α$-lift in the watchdog method. To release data $X$ that is correlated with sensitive information $S$, the ratio $l(s,x) = \frac{p(s|x)}{p(s)} $ denotes the `lift' of the posterior belief on $S$ and quantifies data privacy. The $α$-lift is proposed as the $L_α$-norm of the l… ▽ More

    Submitted 25 January, 2021; originally announced January 2021.

  41. arXiv:2101.08970  [pdf, other

    cs.IT

    An Update-based Maximum Column Distance Coding Scheme for Index Coding

    Authors: Arman Sharififar, Neda Aboutorab, Parastoo Sadeghi

    Abstract: In this paper, we propose a new scalar linear coding scheme for the index coding problem called update-based maximum column distance (UMCD) coding scheme. The central idea in each transmission is to code messages such that one of the receivers with the minimum size of side information is instantaneously eliminated from unsatisfied receivers. One main contribution of the paper is to prove that the… ▽ More

    Submitted 5 February, 2023; v1 submitted 22 January, 2021; originally announced January 2021.

  42. What can we learn from the conformal noninvariance of the Klein-Gordon equation?

    Authors: F. Hammad, P. Sadeghi, N. Fleury, A. Leblanc

    Abstract: It is well known that the Klein-Gordon equation in curved spacetime is conformally noninvariant, both with and without a mass term. We show that such a noninvariance provides nontrivial physical insights at different levels, first within the fully relativistic regime, then in the nonrelativistic regime leading to the Schrödinger equation, and then within the de Broglie-Bohm causal interpretation o… ▽ More

    Submitted 7 November, 2021; v1 submitted 22 December, 2020; originally announced December 2020.

    Comments: Length reduced, typos corrected, references added, main results emphasized. Accepted in IJMPA

    Journal ref: Int. J. Mod. Phys. A 36, 2150224 (2021)

  43. arXiv:2010.09367  [pdf, other

    cs.IT

    On Properties and Optimization of Information-theoretic Privacy Watchdog

    Authors: Parastoo Sadeghi, Ni Ding, Thierry Rakotoarivelo

    Abstract: We study the problem of privacy preservation in data sharing, where $S$ is a sensitive variable to be protected and $X$ is a non-sensitive useful variable correlated with $S$. Variable $X$ is randomized into variable $Y$, which will be shared or released according to $p_{Y|X}(y|x)$. We measure privacy leakage by \emph{information privacy} (also known as \emph{log-lift} in the literature), which gu… ▽ More

    Submitted 19 October, 2020; originally announced October 2020.

  44. Frequency fluctuations in nanomechanical silicon nitride string resonators

    Authors: Pedram Sadeghi, Alper Demir, Luis Guillermo Villanueva, Hendrik Kähler, Silvan Schmid

    Abstract: High quality factor ($Q$) nanomechanical resonators have received a lot of attention for sensor applications with unprecedented sensitivity. Despite the large interest, few investigations into the frequency stability of high-$Q$ resonators have been reported. Such resonators are characterized by a linewidth significantly smaller than typically employed measurement bandwidths, which is the opposite… ▽ More

    Submitted 25 September, 2020; originally announced September 2020.

    Comments: 8 pages, 6 figures

    Journal ref: Phys. Rev. B 102, 214106 (2020)

  45. arXiv:2008.09702  [pdf, ps, other

    cs.IT cs.CR

    Low Influence, Utility, and Independence in Differential Privacy: A Curious Case of $3 \choose 2$

    Authors: Rafael G. L. D'Oliveira, Salman Salamatian, Muriel Médard, Parastoo Sadeghi

    Abstract: We study the relationship between randomized low influence functions and differentially private mechanisms. Our main aim is to formally determine whether differentially private mechanisms are low influence and whether low influence randomized functions can be differentially private. We show that differential privacy does not necessarily imply low influence in a formal sense. However, low influence… ▽ More

    Submitted 7 February, 2021; v1 submitted 21 August, 2020; originally announced August 2020.

  46. arXiv:2007.09374  [pdf, other

    cs.IT

    Differentially Private Mechanisms for Count Queries

    Authors: Parastoo Sadeghi, Shahab Asoodeh, Flavio du Pin Calmon

    Abstract: In this paper, we consider the problem of responding to a count query (or any other integer-valued queries) evaluated on a dataset containing sensitive attributes. To protect the privacy of individuals in the dataset, a standard practice is to add continuous noise to the true count. We design a differentially-private mechanism which adds integer-valued noise allowing the released output to remain… ▽ More

    Submitted 18 July, 2020; originally announced July 2020.

  47. arXiv:2005.10860  [pdf, other

    physics.app-ph cond-mat.mes-hall

    Thermal transport and frequency response of localized modes on low-stress nanomechanical silicon nitride drums featuring a phononic bandgap structure

    Authors: Pedram Sadeghi, Manuel Tanzer, Niklas Luhmann, Markus Piller, Miao-Hsuan Chien, Silvan Schmid

    Abstract: Development of broadband thermal sensors for the detection of, among others, radiation, single nanoparticles, or single molecules is of great interest. In recent years, photothermal spectroscopy based on the shift of the resonance frequency of stressed nanomechanical resonators has been successfully demonstrated. Here, we show the application of soft-clamped phononic crystal membranes made of sili… ▽ More

    Submitted 21 May, 2020; originally announced May 2020.

    Journal ref: Phys. Rev. Applied 14, 024068 (2020)

  48. arXiv:2005.10156  [pdf, other

    physics.app-ph

    Thermal radiation dominated heat transfer in nanomechanical silicon nitride drum resonators

    Authors: Markus Piller, Pedram Sadeghi, Robert G. West, Niklas Luhmann, Paolo Martini, Ole Hansen, Silvan Schmid

    Abstract: Nanomechanical silicon nitride (SiN) drum resonators are currently employed in various fields of applications that arise from their unprecedented frequency response to physical quantities. In the present study, we investigate the thermal transport in nanomechanical SiN drum resonators by analytical modelling, computational simulations, and experiments for a better understanding of the underlying h… ▽ More

    Submitted 20 May, 2020; originally announced May 2020.

    Comments: 8 pages, 4 figures in main text, 3 figures in supplementary

  49. arXiv:2004.10554  [pdf, other

    physics.app-ph physics.ins-det

    A nanoelectromechanical position-sensitive detector with picometer resolution

    Authors: Miao-Hsuan Chien, Johannes Steurer, Pedram Sadeghi, Nicolas Cazier, Silvan Schmid

    Abstract: Sub-nanometer displacement detection lays the solid foundation for critical applications in modern metrology. In-plane displacement sensing, however, is mainly dominated by the detection of differential photocurrent signals from photodiodes, with resolution in the nanometer range. Here, we present an integrated in-plane displacement sensor based on a nanoelectromechanical trampoline resonator. Wit… ▽ More

    Submitted 22 April, 2020; originally announced April 2020.

    Comments: 9 pages, 4 figures in main text, 6 figures in supplementary

  50. arXiv:2004.02076  [pdf, ps, other

    cs.IT

    Independent User Partition Multicast Scheme for the Groupcast Index Coding Problem

    Authors: Arman Sharififar, Neda Aboutorab, Yucheng Liu, Parastoo Sadeghi

    Abstract: The groupcast index coding (GIC) problem is a generalization of the index coding problem, where one packet can be demanded by multiple users. In this paper, we propose a new coding scheme called independent user partition multicast (IUPM) for the GIC problem. The novelty of this scheme compared to the user partition multicast (UPM) (Shanmugam \textit{et al.}, 2015) is in removing redundancies in t… ▽ More

    Submitted 4 April, 2020; originally announced April 2020.