Skip to main content

Showing 1–50 of 55 results for author: Farokhi, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.08172  [pdf, ps, other

    quant-ph cs.LG eess.SP math.ST

    Optimal Universal Quantum Encoding for Statistical Inference

    Authors: Farhad Farokhi

    Abstract: Optimal encoding of classical data for statistical inference using quantum computing is investigated. A universal encoder is sought that is optimal for a wide array of statistical inference tasks. Accuracy of any statistical inference is shown to be upper bounded by a term that is proportional to maximal quantum leakage from the classical data, i.e., the input to the inference model, through its q… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

  2. arXiv:2403.11433  [pdf, ps, other

    quant-ph cs.CR cs.IT eess.SY

    Measuring Quantum Information Leakage Under Detection Threat

    Authors: Farhad Farokhi, Sejeong Kim

    Abstract: Gentle quantum leakage is proposed as a measure of information leakage to arbitrary eavesdroppers that aim to avoid detection. Gentle (also sometimes referred to as weak or non-demolition) measurements are used to encode the desire of the eavesdropper to evade detection. The gentle quantum leakage meets important axioms proposed for measures of information leakage including positivity, independenc… ▽ More

    Submitted 17 March, 2024; originally announced March 2024.

  3. arXiv:2402.06156  [pdf, ps, other

    quant-ph cs.CR cs.IT

    Barycentric and Pairwise Renyi Quantum Leakage

    Authors: Farhad Farokhi

    Abstract: Barycentric and pairwise quantum Renyi leakages are proposed as two measures of information leakage for privacy and security analysis in quantum computing and communication systems. These quantities both require minimal assumptions on the eavesdropper, i.e., they do not make any assumptions on the eavesdropper's attack strategy or the statistical prior on the secret or private classical data encod… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

  4. Information Leakage from Data Updates in Machine Learning Models

    Authors: Tian Hui, Farhad Farokhi, Olga Ohrimenko

    Abstract: In this paper we consider the setting where machine learning models are retrained on updated datasets in order to incorporate the most up-to-date information or reflect distribution shifts. We investigate whether one can infer information about these updates in the training data (e.g., changes to attribute values of records). Here, the adversary has access to snapshots of the machine learning mode… ▽ More

    Submitted 19 September, 2023; originally announced September 2023.

    Journal ref: Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security (AISec '23), November 30, 2023, Copenhagen, Denmark

  5. arXiv:2309.09411  [pdf, other

    math.OC cs.LG

    Distributionally Time-Varying Online Stochastic Optimization under Polyak-Łojasiewicz Condition with Application in Conditional Value-at-Risk Statistical Learning

    Authors: Yuen-Man Pun, Farhad Farokhi, Iman Shames

    Abstract: In this work, we consider a sequence of stochastic optimization problems following a time-varying distribution via the lens of online optimization. Assuming that the loss function satisfies the Polyak-Łojasiewicz condition, we apply online stochastic gradient descent and establish its dynamic regret bound that is composed of cumulative distribution drifts and cumulative gradient biases caused by s… ▽ More

    Submitted 17 September, 2023; originally announced September 2023.

  6. arXiv:2307.12529  [pdf, ps, other

    quant-ph cs.CR cs.IT

    Maximal Information Leakage from Quantum Encoding of Classical Data

    Authors: Farhad Farokhi

    Abstract: A new measure of information leakage for quantum encoding of classical data is defined. An adversary can access a single copy of the state of a quantum system that encodes some classical data and is interested in correctly guessing a general randomized or deterministic function of the data (e.g., a specific feature or attribute of the data in quantum machine learning) that is unknown to the securi… ▽ More

    Submitted 1 January, 2024; v1 submitted 24 July, 2023; originally announced July 2023.

    Journal ref: Physical Review A, 109(2), 022608, 2024

  7. arXiv:2302.12405  [pdf, other

    quant-ph cs.CR cs.IT eess.SY

    Privacy Against Hypothesis-Testing Adversaries for Quantum Computing

    Authors: Farhad Farokhi

    Abstract: A novel definition for data privacy in quantum computing based on quantum hypothesis testing is presented in this paper. The parameters in this privacy notion possess an operational interpretation based on the success/failure of an omnipotent adversary being able to distinguish the private categories to which the data belongs using arbitrary measurements on quantum states. Important properties of… ▽ More

    Submitted 23 February, 2023; originally announced February 2023.

  8. arXiv:2111.00631  [pdf, ps, other

    cs.LG eess.SY math.OC math.PR stat.ML

    Learning Safety Filters for Unknown Discrete-Time Linear Systems

    Authors: Farhad Farokhi, Alex S. Leong, Mohammad Zamani, Iman Shames

    Abstract: A learning-based safety filter is developed for discrete-time linear time-invariant systems with unknown models subject to Gaussian noises with unknown covariance. Safety is characterized using polytopic constraints on the states and control inputs. The empirically learned model and process noise covariance with their confidence bounds are used to construct a robust optimization problem for minima… ▽ More

    Submitted 8 May, 2023; v1 submitted 31 October, 2021; originally announced November 2021.

  9. arXiv:2110.04956  [pdf, other

    cs.RO eess.SY math.OC physics.data-an quant-ph

    Optimal Stochastic Evasive Maneuvers Using the Schrodinger's Equation

    Authors: Farhad Farokhi, Magnus Egerstedt

    Abstract: In this paper, preys with stochastic evasion policies are considered. The stochasticity adds unpredictable changes to the prey's path for avoiding predator's attacks. The prey's cost function is composed of two terms balancing the unpredictability factor (by using stochasticity to make the task of forecasting its future positions by the predator difficult) and energy consumption (the least amount… ▽ More

    Submitted 10 October, 2021; originally announced October 2021.

  10. arXiv:2108.03874  [pdf, other

    cs.IT

    Zero-Error Feedback Capacity for Bounded Stabilization and Finite-State Additive Noise Channels

    Authors: Amir Saberi, Farhad Farokhi, Girish Nair

    Abstract: This article studies the zero-error feedback capacity of {\em causal} discrete channels with memory. First, by extending the classical zero-error feedback capacity concept, a new notion of {\em uniform zero-error feedback capacity} $ C_{0f} $ for such channels is introduced. Using this notion a tight condition for {bounded} stabilization of unstable {noisy} linear systems via causal channels is ob… ▽ More

    Submitted 1 June, 2022; v1 submitted 9 August, 2021; originally announced August 2021.

    Comments: arXiv admin note: text overlap with arXiv:2006.00892

  11. arXiv:2107.01113  [pdf, ps, other

    cs.IT

    Measuring Information Leakage in Non-stochastic Brute-Force Guessing

    Authors: Ni Ding, Farhad Farokhi

    Abstract: This paper proposes an operational measure of non-stochastic information leakage to formalize privacy against a brute-force guessing adversary. The information is measured by non-probabilistic uncertainty of uncertain variables, the non-stochastic counterparts of random variables. For $X$ that is related to released data $Y$, the non-stochastic brute-force leakage is measured by the complexity of… ▽ More

    Submitted 2 July, 2021; originally announced July 2021.

    Comments: 11 pages, 4 figures

  12. arXiv:2106.09904  [pdf, other

    cs.CR

    Sharing in a Trustless World: Privacy-Preserving Data Analytics with Potentially Cheating Participants

    Authors: Tham Nguyen, Hassan Jameel Asghar, Raghav Bhakar, Dali Kaafar, Farhad Farokhi

    Abstract: Lack of trust between organisations and privacy concerns about their data are impediments to an otherwise potentially symbiotic joint data analysis. We propose DataRing, a data sharing system that allows mutually mistrusting participants to query each others' datasets in a privacy-preserving manner while ensuring the correctness of input datasets and query answers even in the presence of (cheating… ▽ More

    Submitted 18 June, 2021; originally announced June 2021.

  13. arXiv:2103.01413  [pdf, other

    cs.LG eess.SY math.OC stat.ML

    Safe Learning of Uncertain Environments

    Authors: Farhad Farokhi, Alex Leong, Iman Shames, Mohammad Zamani

    Abstract: In many learning based control methodologies, learning the unknown dynamic model precedes the control phase, while the aim is to control the system such that it remains in some safe region of the state space. In this work, our aim is to guarantee safety while learning and control proceed simultaneously. Specifically, we consider the problem of safe learning in nonlinear control-affine systems subj… ▽ More

    Submitted 13 May, 2021; v1 submitted 1 March, 2021; originally announced March 2021.

  14. arXiv:2101.09689  [pdf, ps, other

    cs.IT stat.AP

    A Linear Reduction Method for Local Differential Privacy and Log-lift

    Authors: Ni Ding, Yucheng Liu, Farhad Farokhi

    Abstract: This paper considers the problem of publishing data $X$ while protecting correlated sensitive information $S$. We propose a linear method to generate the sanitized data $Y$ with the same alphabet $\mathcal{Y} = \mathcal{X}$ that attains local differential privacy (LDP) and log-lift at the same time. It is revealed that both LDP and log-lift are inversely proportional to the statistical distance be… ▽ More

    Submitted 26 January, 2021; v1 submitted 24 January, 2021; originally announced January 2021.

  15. arXiv:2101.06811  [pdf, ps, other

    cs.IT cs.LG math.OC stat.ML

    Optimal Pre-Processing to Achieve Fairness and Its Relationship with Total Variation Barycenter

    Authors: Farhad Farokhi

    Abstract: We use disparate impact, i.e., the extent that the probability of observing an output depends on protected attributes such as race and gender, to measure fairness. We prove that disparate impact is upper bounded by the total variation distance between the distribution of the inputs given the protected attributes. We then use pre-processing, also known as data repair, to enforce fairness. We show t… ▽ More

    Submitted 17 January, 2021; originally announced January 2021.

  16. arXiv:2011.14572  [pdf, ps, other

    cs.LG cs.CR math.OC stat.ML

    Gradient Sparsification Can Improve Performance of Differentially-Private Convex Machine Learning

    Authors: Farhad Farokhi

    Abstract: We use gradient sparsification to reduce the adverse effect of differential privacy noise on performance of private machine learning models. To this aim, we employ compressed sensing and additive Laplace noise to evaluate differentially-private gradients. Noisy privacy-preserving gradients are used to perform stochastic gradient descent for training machine learning models. Sparsification, achieve… ▽ More

    Submitted 1 December, 2020; v1 submitted 30 November, 2020; originally announced November 2020.

    Comments: Fixed typos and a mistake in the proof of Proposition 1

  17. arXiv:2011.11819  [pdf, other

    cs.LG cs.AI cs.CR

    When Machine Learning Meets Privacy: A Survey and Outlook

    Authors: Bo Liu, Ming Ding, Sina Shaham, Wenny Rahayu, Farhad Farokhi, Zihuai Lin

    Abstract: The newly emerged machine learning (e.g. deep learning) methods have become a strong driving force to revolutionize a wide range of industries, such as smart healthcare, financial technology, and surveillance systems. Meanwhile, privacy has emerged as a big concern in this machine learning-based artificial intelligence era. It is important to note that the problem of privacy preservation in the co… ▽ More

    Submitted 23 November, 2020; originally announced November 2020.

    Comments: This work is accepted by ACM Computing Surveys

  18. arXiv:2010.09968  [pdf, ps, other

    cs.IT cs.CR

    Non-Stochastic Private Function Evaluation

    Authors: Farhad Farokhi, Girish Nair

    Abstract: We consider private function evaluation to provide query responses based on private data of multiple untrusted entities in such a way that each cannot learn something substantially new about the data of others. First, we introduce perfect non-stochastic privacy in a two-party scenario. Perfect privacy amounts to conditional unrelatedness of the query response and the private uncertain variable of… ▽ More

    Submitted 19 October, 2020; originally announced October 2020.

  19. arXiv:2008.12466  [pdf, other

    math.ST cs.CR cs.LG stat.ML

    Deconvoluting Kernel Density Estimation and Regression for Locally Differentially Private Data

    Authors: Farhad Farokhi

    Abstract: Local differential privacy has become the gold-standard of privacy literature for gathering or releasing sensitive individual data points in a privacy-preserving manner. However, locally differential data can twist the probability density of the data because of the additive noise used to ensure privacy. In fact, the density of privacy-preserving data (no matter how many samples we gather) is alway… ▽ More

    Submitted 8 November, 2020; v1 submitted 27 August, 2020; originally announced August 2020.

    Comments: updated reference list, deeper numerical analysis

  20. arXiv:2008.04477  [pdf, other

    cs.CR cs.IT eess.SY math.OC

    Security Versus Privacy

    Authors: Farhad Farokhi, Peyman Mohajerin Esfahani

    Abstract: Linear queries can be submitted to a server containing private data. The server provides a response to the queries systematically corrupted using an additive noise to preserve the privacy of those whose data is stored on the server. The measure of privacy is inversely proportional to the trace of the Fisher information matrix. It is assumed that an adversary can inject a false bias to the response… ▽ More

    Submitted 10 August, 2020; originally announced August 2020.

    Journal ref: 2018 IEEE Conference on Decision and Control (CDC)

  21. arXiv:2006.13488  [pdf, other

    cs.LG cs.CR math.OC math.ST stat.ML

    Distributionally-Robust Machine Learning Using Locally Differentially-Private Data

    Authors: Farhad Farokhi

    Abstract: We consider machine learning, particularly regression, using locally-differentially private datasets. The Wasserstein distance is used to define an ambiguity set centered at the empirical distribution of the dataset corrupted by local differential privacy noise. The ambiguity set is shown to contain the probability distribution of unperturbed, clean data. The radius of the ambiguity set is a funct… ▽ More

    Submitted 24 June, 2020; originally announced June 2020.

  22. arXiv:2006.01397  [pdf, ps, other

    math.OC cs.LG eess.SY stat.ML

    Online Stochastic Convex Optimization: Wasserstein Distance Variation

    Authors: Iman Shames, Farhad Farokhi

    Abstract: Distributionally-robust optimization is often studied for a fixed set of distributions rather than time-varying distributions that can drift significantly over time (which is, for instance, the case in finance and sociology due to underlying expansion of economy and evolution of demographics). This motivates understanding conditions on probability distributions, using the Wasserstein distance, tha… ▽ More

    Submitted 29 September, 2020; v1 submitted 2 June, 2020; originally announced June 2020.

  23. arXiv:2006.00892  [pdf, ps, other

    cs.IT

    An Explicit Formula for the Zero-Error Feedback Capacity of a Class of Finite-State Additive Noise Channels

    Authors: Amir Saberi, Farhad Farokhi, Girish N. Nair

    Abstract: It is known that for a discrete channel with correlated additive noise, the ordinary capacity with or without feedback both equal $ \log q-\mathcal{H} (Z) $, where $ \mathcal{H}(Z) $ is the entropy rate of the noise process $ Z $ and $ q $ is the alphabet size. In this paper, a class of finite-state additive noise channels is introduced. It is shown that the zero-error feedback capacity of such ch… ▽ More

    Submitted 29 May, 2020; originally announced June 2020.

    Comments: arXiv admin note: text overlap with arXiv:2003.11954

  24. arXiv:2004.10911  [pdf, ps, other

    cs.IT cs.CR eess.SY

    Measuring Information Leakage in Non-stochastic Brute-Force Guessing

    Authors: Farhad Farokhi, Ni Ding

    Abstract: We propose an operational measure of information leakage in a non-stochastic setting to formalize privacy against a brute-force guessing adversary. We use uncertain variables, non-probabilistic counterparts of random variables, to construct a guessing framework in which an adversary is interested in determining private information based on uncertain reports. We consider brute-force trial-and-error… ▽ More

    Submitted 27 January, 2021; v1 submitted 22 April, 2020; originally announced April 2020.

  25. arXiv:2003.11954  [pdf, other

    eess.SY cs.IT

    Bounded State Estimation over Finite-State Channels: Relating Topological Entropy and Zero-Error Capacity

    Authors: Amir Saberi, Farhad Farokhi, Girish N. Nair

    Abstract: We investigate state estimation of linear systems over channels having a finite state not known by the transmitter or receiver. We show that similar to memoryless channels, zero-error capacity is the right figure of merit for achieving bounded estimation errors. We then consider finite-state, worst-case versions of the common erasure and additive noise channels models, in which the noise is govern… ▽ More

    Submitted 4 October, 2021; v1 submitted 24 March, 2020; originally announced March 2020.

    Comments: arXiv admin note: text overlap with arXiv:1902.00726

  26. arXiv:2003.08500  [pdf, ps, other

    cs.LG cs.CR eess.SP math.OC stat.ML

    The Cost of Privacy in Asynchronous Differentially-Private Machine Learning

    Authors: Farhad Farokhi, Nan Wu, David Smith, Mohamed Ali Kaafar

    Abstract: We consider training machine learning models using Training data located on multiple private and geographically-scattered servers with different privacy settings. Due to the distributed nature of the data, communicating with all collaborating private data owners simultaneously may prove challenging or altogether impossible. In this paper, we develop differentially-private asynchronous algorithms f… ▽ More

    Submitted 29 June, 2020; v1 submitted 18 March, 2020; originally announced March 2020.

  27. arXiv:2002.06856  [pdf, other

    cs.LG stat.ML

    Data and Model Dependencies of Membership Inference Attack

    Authors: Shakila Mahjabin Tonni, Dinusha Vatsalan, Farhad Farokhi, Dali Kaafar, Zhigang Lu, Gioacchino Tangari

    Abstract: Machine learning (ML) models have been shown to be vulnerable to Membership Inference Attacks (MIA), which infer the membership of a given data point in the target dataset by observing the prediction output of the ML model. While the key factors for the success of MIA have not yet been fully understood, existing defense mechanisms such as using L2 regularization \cite{10shokri2017membership} and d… ▽ More

    Submitted 25 July, 2020; v1 submitted 17 February, 2020; originally announced February 2020.

  28. arXiv:2002.03294  [pdf, other

    eess.SY cs.IT

    Uniformly Bounded State Estimation over Multiple Access Channels

    Authors: Ghassen Zafzouf, Girish N. Nair, Farhad Farokhi

    Abstract: This paper addresses the problem of distributed state estimation via multiple access channels (MACs). We consider a scenario where two encoders are simultaneously communicating their measurements through a noisy channel. Firstly, the zero-error capacity region of the general M-input, single-output MAC is characterized using tools from nonstochastic information theory. Next, we show that a tight co… ▽ More

    Submitted 22 December, 2022; v1 submitted 9 February, 2020; originally announced February 2020.

  29. arXiv:2001.10655  [pdf, ps, other

    cs.LG cs.CR eess.SP math.OC math.ST stat.ML

    Regularization Helps with Mitigating Poisoning Attacks: Distributionally-Robust Machine Learning Using the Wasserstein Distance

    Authors: Farhad Farokhi

    Abstract: We use distributionally-robust optimization for machine learning to mitigate the effect of data poisoning attacks. We provide performance guarantees for the trained model on the original data (not including the poison records) by training the model for the worst-case distribution on a neighbourhood around the empirical distribution (extracted from the training dataset corrupted by a poisoning atta… ▽ More

    Submitted 28 January, 2020; originally announced January 2020.

  30. arXiv:2001.10648  [pdf, ps, other

    cs.LG cs.CR cs.IT math.OC math.ST stat.ML

    Modelling and Quantifying Membership Information Leakage in Machine Learning

    Authors: Farhad Farokhi, Mohamed Ali Kaafar

    Abstract: Machine learning models have been shown to be vulnerable to membership inference attacks, i.e., inferring whether individuals' data have been used for training models. The lack of understanding about factors contributing success of these attacks motivates the need for modelling membership information leakage using information theory and for investigating properties of machine learning models and t… ▽ More

    Submitted 27 April, 2020; v1 submitted 28 January, 2020; originally announced January 2020.

  31. arXiv:1912.12576  [pdf, ps, other

    cs.CR cs.LG stat.ML

    Privacy-Preserving Public Release of Datasets for Support Vector Machine Classification

    Authors: Farhad Farokhi

    Abstract: We consider the problem of publicly releasing a dataset for support vector machine classification while not infringing on the privacy of data subjects (i.e., individuals whose private information is stored in the dataset). The dataset is systematically obfuscated using an additive noise for privacy protection. Motivated by the Cramer-Rao bound, inverse of the trace of the Fisher information matrix… ▽ More

    Submitted 28 December, 2019; originally announced December 2019.

    Journal ref: IEEE Transactions on Big Data, 2020

  32. arXiv:1911.04842  [pdf, other

    cs.CR

    Develo** Non-Stochastic Privacy-Preserving Policies Using Agglomerative Clustering

    Authors: Ni Ding, Farhad Farokhi

    Abstract: We consider a non-stochastic privacy-preserving problem in which an adversary aims to infer sensitive information $S$ from publicly accessible data $X$ without using statistics. We consider the problem of generating and releasing a quantization $\hat{X}$ of $X$ to minimize the privacy leakage of $S$ to $\hat{X}$ while maintaining a certain level of utility (or, inversely, the quantization loss). T… ▽ More

    Submitted 12 July, 2020; v1 submitted 12 November, 2019; originally announced November 2019.

    Comments: 14 pages, 9 figures

  33. arXiv:1910.13027  [pdf, ps, other

    cs.IT cs.CR cs.IR eess.SP eess.SY

    Noiseless Privacy

    Authors: Farhad Farokhi

    Abstract: In this paper, we define noiseless privacy, as a non-stochastic rival to differential privacy, requiring that the outputs of a mechanism (i.e., function composition of a privacy-preserving map** and a query) can attain only a few values while varying the data of an individual (the logarithm of the number of the distinct values is bounded by the privacy budget). Therefore, the output of the mecha… ▽ More

    Submitted 28 October, 2019; originally announced October 2019.

  34. arXiv:1909.11812  [pdf, ps, other

    cs.CR cs.IT eess.SY math.OC

    Differential Privacy for Evolving Almost-Periodic Datasets with Continual Linear Queries: Application to Energy Data Privacy

    Authors: Farhad Farokhi

    Abstract: For evolving datasets with continual reports, the composition rule for differential privacy (DP) dictates that the scale of DP noise must grow linearly with the number of the queries, or that the privacy budget must be split equally between all the queries, so that the privacy budget across all the queries remains bounded and consistent with the privacy guarantees. To avoid this drawback of DP, we… ▽ More

    Submitted 25 September, 2019; originally announced September 2019.

  35. arXiv:1908.04954  [pdf, ps, other

    cs.CR cs.IT quant-ph

    Taking a Lesson from Quantum Particles for Statistical Data Privacy

    Authors: Farhad Farokhi

    Abstract: Privacy is under threat from artificial intelligence revolution fueled by unprecedented abundance of data. Differential privacy, an established candidate for privacy protection, is susceptible to adversarial attacks, acts conservatively, and leads to miss-implementations because of lacking systematic methods for setting its parameters (known as the privacy budget). An alternative is information-th… ▽ More

    Submitted 14 August, 2019; originally announced August 2019.

  36. arXiv:1908.03995  [pdf, ps, other

    cs.CR econ.TH eess.SP eess.SY

    Temporally Discounted Differential Privacy for Evolving Datasets on an Infinite Horizon

    Authors: Farhad Farokhi

    Abstract: We define discounted differential privacy, as an alternative to (conventional) differential privacy, to investigate privacy of evolving datasets, containing time series over an unbounded horizon. We use privacy loss as a measure of the amount of information leaked by the reports at a certain fixed time. We observe that privacy losses are weighted equally across time in the definition of differenti… ▽ More

    Submitted 27 January, 2020; v1 submitted 12 August, 2019; originally announced August 2019.

    Journal ref: 2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)

  37. arXiv:1906.09721  [pdf, ps, other

    cs.CR cs.LG eess.SY math.OC

    A Game-Theoretic Approach to Adversarial Linear Support Vector Classification

    Authors: Farhad Farokhi

    Abstract: In this paper, we employ a game-theoretic model to analyze the interaction between an adversary and a classifier. There are two classes (i.e., positive and negative classes) to which data points can belong. The adversary is interested in maximizing the probability of miss-detection for the positive class (i.e., false negative probability). The adversary however does not want to significantly modif… ▽ More

    Submitted 24 June, 2019; originally announced June 2019.

  38. arXiv:1906.09679  [pdf, ps, other

    cs.CR cs.LG stat.ML

    The Value of Collaboration in Convex Machine Learning with Differential Privacy

    Authors: Nan Wu, Farhad Farokhi, David Smith, Mohamed Ali Kaafar

    Abstract: In this paper, we apply machine learning to distributed private data owned by multiple data owners, entities with access to non-overlap** training datasets. We use noisy, differentially-private gradients to minimize the fitness cost of the machine learning model using stochastic gradient descent. We quantify the quality of the trained model, using the fitness cost, as a function of privacy budge… ▽ More

    Submitted 23 June, 2019; originally announced June 2019.

    Comments: Accepted in IEEE S&P 2020

    Journal ref: IEEE Symposium on Security and Privacy 2020 (IEEE SP 2020)

  39. arXiv:1904.07377  [pdf, other

    cs.IT eess.SP eess.SY math.OC

    Non-Stochastic Hypothesis Testing with Application to Privacy Against Hypothesis-Testing Adversary

    Authors: Farhad Farokhi

    Abstract: In this paper, we consider privacy against hypothesis testing adversaries within a non-stochastic framework. We develop a theory of non-stochastic hypothesis testing by borrowing the notion of uncertain variables from non-stochastic information theory. We define tests as binary-valued map**s on uncertain variables and prove a fundamental bound on the best performance of tests in non-stochastic h… ▽ More

    Submitted 15 April, 2019; originally announced April 2019.

  40. arXiv:1902.06899  [pdf, ps, other

    cs.CR eess.SP eess.SY math.OC

    Implementing Homomorphic Encryption Based Secure Feedback Control for Physical Systems

    Authors: Julian Tran, Farhad Farokhi, Michael Cantoni, Iman Shames

    Abstract: This paper is about an encryption based approach to the secure implementation of feedback controllers for physical systems. Specifically, Paillier's homomorphic encryption is used to digitally implement a class of linear dynamic controllers, which includes the commonplace static gain and PID type feedback control laws as special cases. The developed implementation is amenable to Field Programmable… ▽ More

    Submitted 27 March, 2019; v1 submitted 19 February, 2019; originally announced February 2019.

    Journal ref: Control Engineering Practice, Volume 97, April 2020, 104350

  41. arXiv:1902.00726  [pdf, other

    eess.SP cs.IT eess.SY

    State Estimation over Worst-Case Erasure and Symmetric Channels with Memory

    Authors: Amir Saberi, Farhad Farokhi, Girish N. Nair

    Abstract: Worst-case models of erasure and symmetric channels are investigated, in which the number of channel errors occurring in each sliding window of a given length is bounded. Upper and lower bounds on their zero-error capacities are derived, with the lower bounds revealing a connection with the topological entropy of the channel dynamics. Necessary and sufficient conditions for linear state estimation… ▽ More

    Submitted 2 February, 2019; originally announced February 2019.

  42. arXiv:1812.04168  [pdf, ps, other

    math.OC cs.CR eess.SY

    Secure and Private Implementation of Dynamic Controllers Using Semi-Homomorphic Encryption

    Authors: Carlos Murguia, Farhad Farokhi, Iman Shames

    Abstract: This paper presents a secure and private implementation of linear time-invariant dynamic controllers using Paillier's encryption, a semi-homomorphic encryption method. To avoid overflow or underflow within the encryption domain, the state of the controller is reset periodically. A control design approach is presented to ensure stability and optimize performance of the closed-loop system with encry… ▽ More

    Submitted 20 June, 2019; v1 submitted 10 December, 2018; originally announced December 2018.

    Comments: Improved numerical example

  43. arXiv:1810.11153  [pdf, ps, other

    cs.IT cs.CR eess.SY math.OC

    Development and Analysis of Deterministic Privacy-Preserving Policies Using Non-Stochastic Information Theory

    Authors: Farhad Farokhi

    Abstract: A deterministic privacy metric using non-stochastic information theory is developed. Particularly, minimax information is used to construct a measure of information leakage, which is inversely proportional to the measure of privacy. Anyone can submit a query to a trusted agent with access to a non-stochastic uncertain private dataset. Optimal deterministic privacy-preserving policies for respondin… ▽ More

    Submitted 22 January, 2019; v1 submitted 25 October, 2018; originally announced October 2018.

    Comments: improved introduction and numerical example

    Journal ref: IEEE Transactions on Information Forensics and Security, 2019

  44. arXiv:1808.09565  [pdf, other

    math.OC cs.IT eess.SY

    Ensuring Privacy with Constrained Additive Noise by Minimizing Fisher Information

    Authors: Farhad Farokhi, Henrik Sandberg

    Abstract: The problem of preserving the privacy of individual entries of a database when responding to linear or nonlinear queries with constrained additive noise is considered. For privacy protection, the response to the query is systematically corrupted with an additive random noise whose support is a subset or equal to a pre-defined constraint set. A measure of privacy using the inverse of the trace of t… ▽ More

    Submitted 28 August, 2018; originally announced August 2018.

  45. arXiv:1702.08582  [pdf, other

    eess.SY cs.CR math.OC

    Private and Secure Coordination of Match-Making for Heavy-Duty Vehicle Platooning

    Authors: Farhad Farokhi, Iman Shames, Karl H. Johansson

    Abstract: A secure and private framework for inter-agent communication and coordination is developed. This allows an agent, in our case a fleet owner, to ask questions or submit queries in an encrypted fashion using semi-homomorphic encryption. The submitted query can be about the interest of the other fleet owners for using a road at a specific time of the day, for instance, for the purpose of collaborativ… ▽ More

    Submitted 27 February, 2017; originally announced February 2017.

  46. arXiv:1509.08193  [pdf, other

    math.OC cs.GT eess.SY

    Budget-Constrained Contract Design for Effort-Averse Sensors in Averaging Based Estimation

    Authors: Farhad Farokhi, Iman Shames, Michael Cantoni

    Abstract: Consider a group of effort-averse, or lazy, sensors that seek to minimize the effort invested to collect measurements of a variable. Increasing the effort invested by the sensors improves the quality of the measurements provided to the central planner but this incurs increased costs to the sensors. The central planner, which processes the sensor measurements, employs an averaging estimator. It als… ▽ More

    Submitted 14 February, 2016; v1 submitted 28 September, 2015; originally announced September 2015.

    Comments: Improved literature review

  47. arXiv:1509.05502  [pdf, other

    cs.GT eess.SY math.OC

    Mutual Information as Privacy-Loss Measure in Strategic Communication

    Authors: Farhad Farokhi, Girish Nair

    Abstract: A game is introduced to study the effect of privacy in strategic communication between well-informed senders and a receiver. The receiver wants to accurately estimate a random variable. The sender, however, wants to communicate a message that balances a trade-off between providing an accurate measurement and minimizing the amount of leaked private information, which is assumed to be correlated wit… ▽ More

    Submitted 18 September, 2015; originally announced September 2015.

  48. arXiv:1509.05500  [pdf, ps, other

    math.OC cs.CR math.PR

    On Reconstructability of Quadratic Utility Functions from the Iterations in Gradient Methods

    Authors: Farhad Farokhi, Iman Shames, Michael G. Rabbat, Mikael Johansson

    Abstract: In this paper, we consider a scenario where an eavesdropper can read the content of messages transmitted over a network. The nodes in the network are running a gradient algorithm to optimize a quadratic utility function where such a utility optimization is a part of a decision making process by an administrator. We are interested in understanding the conditions under which the eavesdropper can rec… ▽ More

    Submitted 17 September, 2015; originally announced September 2015.

  49. Quadratic Gaussian Privacy Games

    Authors: Farhad Farokhi, Henrik Sandberg, Iman Shames, Michael Cantoni

    Abstract: A game-theoretic model for analysing the effects of privacy on strategic communication between agents is devised. In the model, a sender wishes to provide an accurate measurement of the state to a receiver while also protecting its private information (which is correlated with the state) private from a malicious agent that may eavesdrop on its communications with the receiver. A family of nontrivi… ▽ More

    Submitted 17 September, 2015; originally announced September 2015.

    Comments: Accepted for Presentation at the 54th IEEE Conference on Decision and Control (CDC 2015)

  50. arXiv:1503.02784  [pdf, other

    cs.GT eess.SY math.OC

    Promoting Truthful Behaviour in Participatory-Sensing Mechanisms

    Authors: Farhad Farokhi, Iman Shames, Michael Cantoni

    Abstract: In this paper, the interplay between a class of nonlinear estimators and strategic sensors is studied in several participatory-sensing scenarios. It is shown that for the class of estimators, if the strategic sensors have access to noiseless measurements of the to-be-estimated-variable, truth-telling is an equilibrium of the game that models the interplay between the sensors and the estimator. Fur… ▽ More

    Submitted 10 March, 2015; originally announced March 2015.

    Comments: IEEE Signal Processing Letters, In Press