Skip to main content

Showing 1–9 of 9 results for author: Goeckel, D L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2007.06119  [pdf, other

    cs.CR

    Asymptotic Privacy Loss due to Time Series Matching of Dependent Users

    Authors: Nazanin Takbiri, Minting Chen, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik

    Abstract: The Internet of Things (IoT) promises to improve user utility by tuning applications to user behavior, but revealing the characteristics of a user's behavior presents a significant privacy risk. Our previous work has established the challenging requirements for anonymization to protect users' privacy in a Bayesian setting in which we assume a powerful adversary who has perfect knowledge of the pri… ▽ More

    Submitted 12 July, 2020; originally announced July 2020.

  2. arXiv:1912.02209  [pdf, other

    cs.IT eess.SP

    Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms

    Authors: Nazanin Takbiri, Virat Shejwalker, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik

    Abstract: The prevalence of mobile devices and Location-Based Services (LBS) necessitate the study of Location Privacy-Preserving Mechanisms (LPPM). However, LPPMs reduce the utility of LBS due to the noise they add to users' locations. Here, we consider the remap** technique, which presumes the adversary has a perfect statistical model for the user location. We consider this assumption and show that unde… ▽ More

    Submitted 4 December, 2019; originally announced December 2019.

    Comments: Submitted to IEEE Wireless Communications Letters

  3. arXiv:1902.06404  [pdf, other

    cs.IT

    Asymptotic Limits of Privacy in Bayesian Time Series Matching

    Authors: Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik

    Abstract: Various modern and highly popular applications make use of user data traces in order to offer specific services, often for the purpose of improving the user's experience while using such applications. However, even when user data is privatized by employing privacy-preserving mechanisms (PPM), users' privacy may still be compromised by an external party who leverages statistical matching methods to… ▽ More

    Submitted 18 February, 2019; originally announced February 2019.

    Comments: The 53rd Annual Conference on Information Sciences and Systems

    Journal ref: The 53rd Annual Conference on Information Sciences and Systems 2019

  4. arXiv:1809.10289  [pdf, other

    cs.IT

    Asymptotic Loss in Privacy due to Dependency in Gaussian Traces

    Authors: Nazanin Takbiri, Ramin Soltani, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik

    Abstract: The rapid growth of the Internet of Things (IoT) necessitates employing privacy-preserving techniques to protect users' sensitive information. Even when user traces are anonymized, statistical matching can be employed to infer sensitive information. In our previous work, we have established the privacy requirements for the case that the user traces are instantiations of discrete random variables a… ▽ More

    Submitted 18 February, 2019; v1 submitted 26 September, 2018; originally announced September 2018.

    Comments: IEEE Wireless Communications and Networking Conference

  5. arXiv:1806.11108  [pdf, other

    cs.IT

    Privacy of Dependent Users Against Statistical Matching

    Authors: Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik

    Abstract: Modern applications significantly enhance user experience by adapting to each user's individual condition and/or preferences. While this adaptation can greatly improve a user's experience or be essential for the application to work, the exposure of user data to the application presents a significant privacy threat to the users\textemdash even when the traces are anonymized\textemdash since the sta… ▽ More

    Submitted 29 May, 2019; v1 submitted 28 June, 2018; originally announced June 2018.

    Comments: Submitted to IEEE Transaction on Information Theory

  6. arXiv:1805.01296  [pdf, other

    cs.IT

    Privacy against Statistical Matching: Inter-User Correlation

    Authors: Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik

    Abstract: Modern applications significantly enhance user experience by adapting to each user's individual condition and/or preferences. While this adaptation can greatly improve utility or be essential for the application to work (e.g., for ride-sharing applications), the exposure of user data to the application presents a significant privacy threat to the users, even when the traces are anonymized, since t… ▽ More

    Submitted 27 June, 2018; v1 submitted 2 May, 2018; originally announced May 2018.

    Comments: arXiv admin note: text overlap with arXiv:1702.02701 and arXiv:1710.00197

    Journal ref: ISIT 2018

  7. arXiv:1710.00197  [pdf, other

    cs.IT cs.CR

    Matching Anonymized and Obfuscated Time Series to Users' Profiles

    Authors: Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik

    Abstract: Many popular applications use traces of user data to offer various services to their users. However, even if user data is anonymized and obfuscated, a user's privacy can be compromised through the use of statistical matching techniques that match a user trace to prior user behavior. In this work, we derive the theoretical bounds on the privacy of users in such a scenario. We build on our recent st… ▽ More

    Submitted 27 June, 2018; v1 submitted 30 September, 2017; originally announced October 2017.

    Comments: 48 pages, 12 figures, Submitted to IEEE Transactions on Information Theory

  8. arXiv:1205.2118  [pdf, other

    cs.IT

    Performance Bounds for Grouped Incoherent Measurements in Compressive Sensing

    Authors: Adam C. Polak, Marco F. Duarte, Dennis L. Goeckel

    Abstract: Compressive sensing (CS) allows for acquisition of sparse signals at sampling rates significantly lower than the Nyquist rate required for bandlimited signals. Recovery guarantees for CS are generally derived based on the assumption that measurement projections are selected independently at random. However, for many practical signal acquisition applications, including medical imaging and remote se… ▽ More

    Submitted 20 October, 2014; v1 submitted 9 May, 2012; originally announced May 2012.

    Comments: Revised for publication. 21 pages, 10 figures

  9. arXiv:cs/0509085  [pdf, ps, other

    cs.NI cs.IT

    An Improved Lower Bound to the Number of Neighbors Required for the Asymptotic Connectivity of Ad Hoc Networks

    Authors: Sanquan Song, Dennis L. Goeckel, Don Towsley

    Abstract: Xue and Kumar have established that the number of neighbors required for connectivity of wireless networks with N uniformly distributed nodes must grow as log(N), and they also established that the actual number required lies between 0.074log(N) and 5.1774log(N). In this short paper, by recognizing that connectivity results for networks where the nodes are distributed according to a Poisson poin… ▽ More

    Submitted 27 September, 2005; originally announced September 2005.

    Comments: Submitted to IEEE Transactions on Information Theory