Skip to main content

Showing 1–26 of 26 results for author: Banawan, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2303.13485  [pdf, other

    cs.IT cs.NI eess.SY

    Timely Multi-Process Estimation Over Erasure Channels With and Without Feedback: Signal-Independent Policies

    Authors: Karim Banawan, Ahmed Arafa, Karim G. Seddik

    Abstract: We consider a multi-process remote estimation system observing $K$ independent Ornstein-Uhlenbeck processes. In this system, a shared sensor samples the $K$ processes in such a way that the long-term average sum mean square error (MSE) is minimized using signal-independent sampling policies, in which sampling instances are chosen independently from the processes' values. The sensor operates under… ▽ More

    Submitted 30 October, 2023; v1 submitted 23 March, 2023; originally announced March 2023.

    Comments: Accepted for publication in the JSAIT Issue on The Role of Freshness and Semantic Measures in the Transmission of Information for Next Generation Networks. arXiv admin note: text overlap with arXiv:2209.11213

  2. arXiv:2302.12233  [pdf, ps, other

    cs.IT cs.NI eess.SP

    Private Status Updating with Erasures: A Case for Retransmission Without Resampling

    Authors: Ahmed Arafa, Karim Banawan

    Abstract: A status updating system is considered in which a source updates a destination over an erasure channel. The utility of the updates is measured through a function of their age-of-information (AoI), which assesses their freshness. Correlated with the status updates is another process that needs to be kept private from the destination. Privacy is measured through a leakage function that depends on th… ▽ More

    Submitted 23 February, 2023; originally announced February 2023.

    Comments: To appear in IEEE ICC 2023

  3. arXiv:2209.11213  [pdf, ps, other

    cs.IT cs.NI eess.SP eess.SY

    Timely Multi-Process Estimation with Erasures

    Authors: Karim Banawan, Ahmed Arafa, Karim G. Seddik

    Abstract: We consider a multi-process remote estimation system observing $K$ independent Ornstein-Uhlenbeck processes. In this system, a shared sensor samples the $K$ processes in such a way that the long-term average sum mean square error (MSE) is minimized. The sensor operates under a total sampling frequency constraint $f_{\max}$ and samples the processes according to a Maximum-Age-First (MAF) schedule.… ▽ More

    Submitted 22 September, 2022; originally announced September 2022.

    Comments: Accepted for publication in the Asilomar Conference on Signals, Systems, and Computers, October 2022

  4. arXiv:2105.08713  [pdf, ps, other

    cs.IT cs.CR cs.NI eess.SP

    Timely Private Information Retrieval

    Authors: Karim Banawan, Ahmed Arafa, Sennur Ulukus

    Abstract: We introduce the problem of \emph{timely} private information retrieval (PIR) from $N$ non-colluding and replicated servers. In this problem, a user desires to retrieve a message out of $M$ messages from the servers, whose contents are continuously updating. The retrieval process should be executed in a timely manner such that no information is leaked about the identity of the message. To assess t… ▽ More

    Submitted 18 May, 2021; originally announced May 2021.

    Comments: Accepted for presentation in ISIT 2021

  5. arXiv:2102.13094  [pdf, ps, other

    cs.IT cs.NI eess.SP

    Download Cost of Private Updating

    Authors: Bryttany Herren, Ahmed Arafa, Karim Banawan

    Abstract: We consider the problem of privately updating a message out of $K$ messages from $N$ replicated and non-colluding databases. In this problem, a user has an outdated version of the message $\hat{W}_θ$ of length $L$ bits that differ from the current version $W_θ$ in at most $f$ bits. The user needs to retrieve $W_θ$ correctly using a private information retrieval (PIR) scheme with the least number o… ▽ More

    Submitted 25 February, 2021; originally announced February 2021.

    Comments: To appear in the 2021 IEEE International Conference on Communications (ICC)

  6. arXiv:2008.07504  [pdf, ps, other

    cs.IT cs.CR cs.DB eess.SP

    Multi-Party Private Set Intersection: An Information-Theoretic Approach

    Authors: Zhusheng Wang, Karim Banawan, Sennur Ulukus

    Abstract: We investigate the problem of multi-party private set intersection (MP-PSI). In MP-PSI, there are $M$ parties, each storing a data set $\mathcal{p}_i$ over $N_i$ replicated and non-colluding databases, and we want to calculate the intersection of the data sets $\cap_{i=1}^M \mathcal{p}_i$ without leaking any information beyond the set intersection to any of the parties. We consider a specific comm… ▽ More

    Submitted 17 August, 2020; originally announced August 2020.

  7. arXiv:2007.10200  [pdf, ps, other

    cs.IT cs.NI eess.SP

    Sample, Quantize and Encode: Timely Estimation Over Noisy Channels

    Authors: Ahmed Arafa, Karim Banawan, Karim G. Seddik, H. Vincent Poor

    Abstract: The effects of quantization and coding on the estimation quality of Gauss-Markov processes are considered, with a special attention to the Ornstein-Uhlenbeck process. Samples are acquired from the process, quantized, and then encoded for transmission using either infinite incremental redundancy (IIR) or fixed redundancy (FR) coding schemes. A fixed processing time is consumed at the receiver for d… ▽ More

    Submitted 21 June, 2021; v1 submitted 16 July, 2020; originally announced July 2020.

    Comments: Accepted for publication in the IEEE Transactions on Communications. arXiv admin note: substantial text overlap with arXiv:2004.12982

  8. arXiv:2004.12982  [pdf, ps, other

    cs.IT cs.NI eess.SP

    Timely Estimation Using Coded Quantized Samples

    Authors: Ahmed Arafa, Karim Banawan, Karim G. Seddik, H. Vincent Poor

    Abstract: The effects of quantization and coding on the estimation quality of a Gauss-Markov, namely Ornstein-Uhlenbeck, process are considered. Samples are acquired from the process, quantized, and then encoded for transmission using either infinite incremental redundancy or fixed redundancy coding schemes. A fixed processing time is consumed at the receiver for decoding and sending feedback to the transmi… ▽ More

    Submitted 27 April, 2020; originally announced April 2020.

    Comments: To appear in ISIT 2020

  9. arXiv:2003.13667  [pdf, ps, other

    cs.IT cs.CR eess.SP

    Semantic Private Information Retrieval

    Authors: Sajani Vithana, Karim Banawan, Sennur Ulukus

    Abstract: We investigate the problem of semantic private information retrieval (semantic PIR). In semantic PIR, a user retrieves a message out of $K$ independent messages stored in $N$ replicated and non-colluding databases without revealing the identity of the desired message to any individual database. The messages come with \emph{different semantics}, i.e., the messages are allowed to have \emph{non-unif… ▽ More

    Submitted 30 March, 2020; originally announced March 2020.

    Comments: submitted for publication

  10. arXiv:1912.13501  [pdf, ps, other

    cs.IT cs.CR cs.DB eess.SP

    Private Set Intersection: A Multi-Message Symmetric Private Information Retrieval Perspective

    Authors: Zhusheng Wang, Karim Banawan, Sennur Ulukus

    Abstract: We study the problem of private set intersection (PSI). In this problem, there are two entities $E_i$, for $i=1, 2$, each storing a set $\mathcal{P}_i$, whose elements are picked from a finite field $\mathbb{F}_K$, on $N_i$ replicated and non-colluding databases. It is required to determine the set intersection $\mathcal{P}_1 \cap \mathcal{P}_2$ without leaking any information about the remaining… ▽ More

    Submitted 29 November, 2020; v1 submitted 31 December, 2019; originally announced December 2019.

    Comments: Submitted for publication

  11. arXiv:1908.11366  [pdf, ps, other

    cs.IT cs.CR cs.DB

    Improved Storage for Efficient Private Information Retrieval

    Authors: Karim Banawan, Batuhan Arasli, Sennur Ulukus

    Abstract: We consider the problem of private information retrieval from $N$ \emph{storage-constrained} databases. In this problem, a user wishes to retrieve a single message out of $M$ messages (of size $L$) without revealing any information about the identity of the message to individual databases. Each database stores $μML$ symbols, i.e., a $μ$ fraction of the entire library, where… ▽ More

    Submitted 29 August, 2019; originally announced August 2019.

    Comments: ITW 2019

  12. arXiv:1905.03238  [pdf, ps, other

    cs.IT cs.NI eess.SP

    On Timely Channel Coding with Hybrid ARQ

    Authors: Ahmed Arafa, Karim Banawan, Karim G. Seddik, H. Vincent Poor

    Abstract: A status updating communication system is examined, in which a transmitter communicates with a receiver over a noisy channel. The goal is to realize timely delivery of fresh data over time, which is assessed by an age-of-information (AoI) metric. Channel coding is used to combat the channel errors, and feedback is sent to acknowledge updates' reception. In case decoding is unsuccessful, a hybrid A… ▽ More

    Submitted 8 May, 2019; originally announced May 2019.

  13. arXiv:1904.09703  [pdf, other

    cs.CR

    Privacy-Preserving Smart Parking System Using Blockchain and Private Information Retrieval

    Authors: Wesam Al Amiri, Mohamed Baza, Karim Banawan, Mohamed Mahmoud, Waleed Alasmary, Kemal Akkaya

    Abstract: Searching for available parking spaces is a major problem for drivers especially in big crowded cities, causing traffic congestion and air pollution, and wasting drivers' time. Smart parking systems are a novel solution to enable drivers to have real-time parking information for pre-booking. However, current smart parking requires drivers to disclose their private information, such as desired dest… ▽ More

    Submitted 27 January, 2021; v1 submitted 21 April, 2019; originally announced April 2019.

  14. arXiv:1902.09512  [pdf, ps, other

    cs.IT cs.CR cs.DB

    The Capacity of Private Information Retrieval from Heterogeneous Uncoded Caching Databases

    Authors: Karim Banawan, Batuhan Arasli, Yi-Peng Wei, Sennur Ulukus

    Abstract: We consider private information retrieval (PIR) of a single file out of $K$ files from $N$ non-colluding databases with heterogeneous storage constraints $\mathbf{m}=(m_1, \cdots, m_N)$. The aim of this work is to jointly design the content placement phase and the information retrieval phase in order to minimize the download cost in the PIR phase. We characterize the optimal PIR download cost as a… ▽ More

    Submitted 25 February, 2019; originally announced February 2019.

    Comments: Submitted for publication, February 2019

  15. arXiv:1901.00004  [pdf, ps, other

    cs.IT cs.CR

    Private Information Retrieval from Non-Replicated Databases

    Authors: Karim Banawan, Sennur Ulukus

    Abstract: We consider the problem of private information retrieval (PIR) of a single message out of $K$ messages from $N$ non-colluding and non-replicated databases. Different from the majority of the existing literature, which considers the case of replicated databases where all databases store the same content in the form of all $K$ messages, here, we consider the case of non-replicated databases under a… ▽ More

    Submitted 31 December, 2018; originally announced January 2019.

  16. arXiv:1811.11160  [pdf, ps, other

    cs.IT cs.CR cs.DB

    The Capacity of Private Information Retrieval from Decentralized Uncoded Caching Databases

    Authors: Yi-Peng Wei, Batuhan Arasli, Karim Banawan, Sennur Ulukus

    Abstract: We consider the private information retrieval (PIR) problem from decentralized uncoded caching databases. There are two phases in our problem setting, a caching phase, and a retrieval phase. In the caching phase, a data center containing all the $K$ files, where each file is of size $L$ bits, and several databases with storage size constraint $μK L$ bits exist in the system. Each database independ… ▽ More

    Submitted 27 November, 2018; originally announced November 2018.

    Comments: Submitted for publication, November 2018

  17. arXiv:1807.05997  [pdf, ps, other

    cs.IT cs.CR

    Noisy Private Information Retrieval: On Separability of Channel Coding and Information Retrieval

    Authors: Karim Banawan, Sennur Ulukus

    Abstract: We consider the problem of noisy private information retrieval (NPIR) from $N$ non-communicating databases, each storing the same set of $M$ messages. In this model, the answer strings are not returned through noiseless bit pipes, but rather through \emph{noisy} memoryless channels. We aim at characterizing the PIR capacity for this model as a function of the statistical information measures of th… ▽ More

    Submitted 16 July, 2018; originally announced July 2018.

    Comments: Submitted to IEEE Transactions on Information Theory, July 2018

  18. arXiv:1801.06171  [pdf, ps, other

    cs.IT cs.CR

    Private Information Retrieval Through Wiretap Channel II: Privacy Meets Security

    Authors: Karim Banawan, Sennur Ulukus

    Abstract: We consider the problem of private information retrieval through wiretap channel II (PIR-WTC-II). In PIR-WTC-II, a user wants to retrieve a single message (file) privately out of $M$ messages, which are stored in $N$ replicated and non-communicating databases. An external eavesdropper observes a fraction $μ_n$ (of its choice) of the traffic exchanged between the $n$th database and the user. In add… ▽ More

    Submitted 18 January, 2018; originally announced January 2018.

    Comments: Submitted to IEEE Transactions on Information Theory, January 2018

  19. arXiv:1801.03079  [pdf, ps, other

    cs.IT cs.CR

    Asymmetry Hurts: Private Information Retrieval Under Asymmetric Traffic Constraints

    Authors: Karim Banawan, Sennur Ulukus

    Abstract: We consider the classical setting of private information retrieval (PIR) of a single message (file) out of $M$ messages from $N$ distributed databases under the new constraint of \emph{asymmetric traffic} from databases. In this problem, the \emph{ratios between the traffic} from the databases are constrained, i.e., the ratio of the length of the answer string that the user (retriever) receives fr… ▽ More

    Submitted 9 January, 2018; originally announced January 2018.

    Comments: Submitted to IEEE Transactions on Information Theory, January 2018

  20. arXiv:1712.07021  [pdf, ps, other

    cs.IT cs.CR cs.DC cs.NI

    Cache-Aided Private Information Retrieval with Partially Known Uncoded Prefetching: Fundamental Limits

    Authors: Yi-Peng Wei, Karim Banawan, Sennur Ulukus

    Abstract: We consider the problem of private information retrieval (PIR) from $N$ non-colluding and replicated databases, when the user is equipped with a cache that holds an uncoded fraction $r$ of the symbols from each of the $K$ stored messages in the databases. This model operates in a two-phase scheme, namely, the prefetching phase where the user acquires side information and the retrieval phase where… ▽ More

    Submitted 18 December, 2017; originally announced December 2017.

    Comments: Submitted for publication, December 2017. arXiv admin note: substantial text overlap with arXiv:1709.01056

  21. arXiv:1710.00809  [pdf, ps, other

    cs.IT cs.CR

    The Capacity of Private Information Retrieval with Partially Known Private Side Information

    Authors: Yi-Peng Wei, Karim Banawan, Sennur Ulukus

    Abstract: We consider the problem of private information retrieval (PIR) of a single message out of $K$ messages from $N$ replicated and non-colluding databases where a cache-enabled user (retriever) of cache-size $M$ possesses side information in the form of full messages that are partially known to the databases. In this model, the user and the databases engage in a two-phase scheme, namely, the prefetchi… ▽ More

    Submitted 26 November, 2017; v1 submitted 2 October, 2017; originally announced October 2017.

    Comments: Submitted to IEEE Transactions on Information Theory, November 2017

  22. arXiv:1709.01056  [pdf, ps, other

    cs.IT cs.CR

    Fundamental Limits of Cache-Aided Private Information Retrieval with Unknown and Uncoded Prefetching

    Authors: Yi-Peng Wei, Karim Banawan, Sennur Ulukus

    Abstract: We consider the problem of private information retrieval (PIR) from $N$ non-colluding and replicated databases when the user is equipped with a cache that holds an uncoded fraction $r$ from each of the $K$ stored messages in the databases. We assume that the databases are unaware of the cache content. We investigate $D^*(r)$ the optimal download cost normalized with the message size as a function… ▽ More

    Submitted 4 September, 2017; originally announced September 2017.

    Comments: Submitted to IEEE Transactions on Information Theory, September 2017

  23. arXiv:1706.01442  [pdf, ps, other

    cs.IT cs.CR cs.IR

    The Capacity of Private Information Retrieval from Byzantine and Colluding Databases

    Authors: Karim Banawan, Sennur Ulukus

    Abstract: We consider the problem of single-round private information retrieval (PIR) from $N$ replicated databases. We consider the case when $B$ databases are outdated (unsynchronized), or even worse, adversarial (Byzantine), and therefore, can return incorrect answers. In the PIR problem with Byzantine databases (BPIR), a user wishes to retrieve a specific message from a set of $M$ messages with zero-err… ▽ More

    Submitted 5 June, 2017; originally announced June 2017.

    Comments: Submitted to IEEE Transactions on Information Theory, June 2017

  24. arXiv:1702.01739  [pdf, ps, other

    cs.IT cs.CR cs.IR

    Multi-Message Private Information Retrieval: Capacity Results and Near-Optimal Schemes

    Authors: Karim Banawan, Sennur Ulukus

    Abstract: We consider the problem of multi-message private information retrieval (MPIR) from $N$ non-communicating replicated databases. In MPIR, the user is interested in retrieving $P$ messages out of $M$ stored messages without leaking the identity of the retrieved messages. The information-theoretic sum capacity of MPIR $C_s^P$ is the maximum number of desired message symbols that can be retrieved priva… ▽ More

    Submitted 6 February, 2017; originally announced February 2017.

    Comments: Submitted to IEEE Transactions on Information Theory, February 2017

  25. arXiv:1609.08138  [pdf, ps, other

    cs.IT cs.CR

    The Capacity of Private Information Retrieval from Coded Databases

    Authors: Karim Banawan, Sennur Ulukus

    Abstract: We consider the problem of private information retrieval (PIR) over a distributed storage system. The storage system consists of $N$ non-colluding databases, each storing a coded version of $M$ messages. In the PIR problem, the user wishes to retrieve one of the available messages without revealing the message identity to any individual database. We derive the information-theoretic capacity of thi… ▽ More

    Submitted 26 September, 2016; originally announced September 2016.

    Comments: Submitted to IEEE Transactions on Information Theory, September 2016

  26. MIMO Wiretap Channel under Receiver Side Power Constraints with Applications to Wireless Power Transfer and Cognitive Radio

    Authors: Karim Banawan, Sennur Ulukus

    Abstract: We consider the multiple-input multiple-output (MIMO) wiretap channel under a minimum receiver-side power constraint in addition to the usual maximum transmitter-side power constraint. This problem is motivated by energy harvesting communications with wireless energy transfer, where an added goal is to deliver a minimum amount of energy to a receiver in addition to delivering secure data to anothe… ▽ More

    Submitted 5 July, 2016; originally announced July 2016.

    Comments: Submitted to IEEE Transactions on Communications, September 2015. Accepted for publication, July 2016