Skip to main content

Showing 1–33 of 33 results for author: Kadhe, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.11780  [pdf, other

    cs.LG cs.AI cs.CL

    Split, Unlearn, Merge: Leveraging Data Attributes for More Effective Unlearning in LLMs

    Authors: Swanand Ravindra Kadhe, Farhan Ahmed, Dennis Wei, Nathalie Baracaldo, Inkit Padhi

    Abstract: Large language models (LLMs) have shown to pose social and ethical risks such as generating toxic language or facilitating malicious use of hazardous knowledge. Machine unlearning is a promising approach to improve LLM safety by directly removing harmful behaviors and knowledge. In this paper, we propose "SPlit, UNlearn, MerGE" (SPUNGE), a framework that can be used with any unlearning method to a… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  2. arXiv:2312.07420  [pdf, other

    cs.LG cs.CY

    FairSISA: Ensemble Post-Processing to Improve Fairness of Unlearning in LLMs

    Authors: Swanand Ravindra Kadhe, Anisa Halimi, Ambrish Rawat, Nathalie Baracaldo

    Abstract: Training large language models (LLMs) is a costly endeavour in terms of time and computational resources. The large amount of training data used during the unsupervised pre-training phase makes it difficult to verify all data and, unfortunately, undesirable data may be ingested during training. Re-training from scratch is impractical and has led to the creation of the 'unlearning' discipline where… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

    Comments: Accepted in NeurIPS 2023 Workshop on Socially Responsible Language Modelling Research (SoLaR)

  3. arXiv:2312.04748  [pdf, other

    cs.CR cs.AI cs.CL

    Forcing Generative Models to Degenerate Ones: The Power of Data Poisoning Attacks

    Authors: Shuli Jiang, Swanand Ravindra Kadhe, Yi Zhou, Ling Cai, Nathalie Baracaldo

    Abstract: Growing applications of large language models (LLMs) trained by a third party raise serious concerns on the security vulnerability of LLMs.It has been demonstrated that malicious actors can covertly exploit these vulnerabilities in LLMs through poisoning attacks aimed at generating undesirable outputs. While poisoning attacks have received significant attention in the image domain (e.g., object de… ▽ More

    Submitted 7 December, 2023; originally announced December 2023.

    Comments: 19 pages, 6 figures. Published at NeurIPS 2023 Workshop on Backdoors in Deep Learning: The Good, the Bad, and the Ugly

  4. arXiv:2310.19304  [pdf, other

    cs.CR cs.LG

    Privacy-Preserving Federated Learning over Vertically and Horizontally Partitioned Data for Financial Anomaly Detection

    Authors: Swanand Ravindra Kadhe, Heiko Ludwig, Nathalie Baracaldo, Alan King, Yi Zhou, Keith Houck, Ambrish Rawat, Mark Purcell, Naoise Holohan, Mikio Takeuchi, Ryo Kawahara, Nir Drucker, Hayim Shaul, Eyal Kushnir, Omri Soceanu

    Abstract: The effective detection of evidence of financial anomalies requires collaboration among multiple entities who own a diverse set of data, such as a payment network system (PNS) and its partner banks. Trust among these financial institutions is limited by regulation and competition. Federated learning (FL) enables entities to collaboratively train a model when data is either vertically or horizontal… ▽ More

    Submitted 30 October, 2023; originally announced October 2023.

    Comments: Prize Winner in the U.S. Privacy Enhancing Technologies (PETs) Prize Challenge

  5. arXiv:2305.02219  [pdf, other

    cs.LG cs.DC

    LESS-VFL: Communication-Efficient Feature Selection for Vertical Federated Learning

    Authors: Timothy Castiglia, Yi Zhou, Shiqiang Wang, Swanand Kadhe, Nathalie Baracaldo, Stacy Patterson

    Abstract: We propose LESS-VFL, a communication-efficient feature selection method for distributed systems with vertically partitioned data. We consider a system of a server and several parties with local datasets that share a sample ID space but have different feature sets. The parties wish to collaboratively train a model for a prediction task. As part of the training, the parties wish to remove unimportan… ▽ More

    Submitted 3 May, 2023; originally announced May 2023.

    Comments: Published in ICML 2023

  6. arXiv:2212.08290  [pdf, other

    cs.LG cs.CV

    Robust Learning Protocol for Federated Tumor Segmentation Challenge

    Authors: Ambrish Rawat, Giulio Zizzo, Swanand Kadhe, Jonathan P. Epperlein, Stefano Braghin

    Abstract: In this work, we devise robust and efficient learning protocols for orchestrating a Federated Learning (FL) process for the Federated Tumor Segmentation Challenge (FeTS 2022). Enabling FL for FeTS setup is challenging mainly due to data heterogeneity among collaborators and communication cost of training. To tackle these challenges, we propose Robust Learning Protocol (RoLePRO) which is a combinat… ▽ More

    Submitted 16 December, 2022; originally announced December 2022.

    Comments: 14 pages, 2 figures, 3 tables

  7. arXiv:2207.07779  [pdf, other

    cs.CR

    DeTrust-FL: Privacy-Preserving Federated Learning in Decentralized Trust Setting

    Authors: Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, Swanand Kadhe, Heiko Ludwig

    Abstract: Federated learning has emerged as a privacy-preserving machine learning approach where multiple parties can train a single model without sharing their raw training data. Federated learning typically requires the utilization of multi-party computation techniques to provide strong privacy guarantees by ensuring that an untrusted or curious aggregator cannot obtain isolated replies from parties invol… ▽ More

    Submitted 15 July, 2022; originally announced July 2022.

  8. arXiv:2207.05521  [pdf, other

    cs.LG cs.CR

    Federated Unlearning: How to Efficiently Erase a Client in FL?

    Authors: Anisa Halimi, Swanand Kadhe, Ambrish Rawat, Nathalie Baracaldo

    Abstract: With privacy legislation empowering the users with the right to be forgotten, it has become essential to make a model amenable for forgetting some of its training data. However, existing unlearning methods in the machine learning context can not be directly applied in the context of distributed settings like federated learning due to the differences in learning protocol and the presence of multipl… ▽ More

    Submitted 20 October, 2023; v1 submitted 12 July, 2022; originally announced July 2022.

  9. arXiv:2110.07751  [pdf, other

    cs.LG stat.ML

    Leveraging Spatial and Temporal Correlations in Sparsified Mean Estimation

    Authors: Divyansh Jhunjhunwala, Ankur Mallick, Advait Gadhikar, Swanand Kadhe, Gauri Joshi

    Abstract: We study the problem of estimating at a central server the mean of a set of vectors distributed across several nodes (one vector per node). When the vectors are high-dimensional, the communication cost of sending entire vectors may be prohibitive, and it may be imperative for them to use sparsification techniques. While most existing work on sparsified mean estimation is agnostic to the characteri… ▽ More

    Submitted 14 October, 2021; originally announced October 2021.

    Comments: Accepted to NeurIPS 2021

  10. arXiv:2010.00217  [pdf, other

    cs.CR

    CoVer: Collaborative Light-Node-Only Verification and Data Availability for Blockchains

    Authors: Steven Cao, Swanand Kadhe, Kannan Ramchandran

    Abstract: Validating a blockchain incurs heavy computation, communication, and storage costs. As a result, clients with limited resources, called light nodes, cannot verify transactions independently and must trust full nodes, making them vulnerable to security attacks. Motivated by this problem, we ask a fundamental question: can light nodes securely validate without any full nodes? We answer affirmatively… ▽ More

    Submitted 1 October, 2020; originally announced October 2020.

    Comments: IEEE Blockchain 2020

  11. arXiv:2009.11248  [pdf, other

    cs.CR cs.IT cs.LG stat.ML

    FastSecAgg: Scalable Secure Aggregation for Privacy-Preserving Federated Learning

    Authors: Swanand Kadhe, Nived Rajaraman, O. Ozan Koyluoglu, Kannan Ramchandran

    Abstract: Recent attacks on federated learning demonstrate that kee** the training data on clients' devices does not provide sufficient privacy, as the model parameters shared by clients can leak information about their training data. A 'secure aggregation' protocol enables the server to aggregate clients' models in a privacy-preserving manner. However, existing secure aggregation protocols incur high com… ▽ More

    Submitted 23 September, 2020; originally announced September 2020.

    Comments: Shorter version accepted in ICML Workshop on Federated Learning, July 2020, and CCS Workshop on Privacy-Preserving Machine Learning in Practice, November 2020

  12. arXiv:2009.01598  [pdf, other

    cs.IT cs.DM cs.PF

    Service Rate Region: A New Aspect of Coded Distributed System Design

    Authors: Mehmet Aktas, Gauri Joshi, Swanand Kadhe, Fatemeh Kazemi, Emina Soljanin

    Abstract: Erasure coding has been recognized as a powerful method to mitigate delays due to slow or straggling nodes in distributed systems. This work shows that erasure coding of data objects can flexibly handle skews in the request rates. Coding can help boost the \emph{service rate region}, that is, increase the overall volume of data access requests that the system can handle. This paper aims to postula… ▽ More

    Submitted 27 June, 2021; v1 submitted 3 September, 2020; originally announced September 2020.

  13. arXiv:2005.07184  [pdf, other

    cs.IT cs.DC cs.LG

    Communication-Efficient Gradient Coding for Straggler Mitigation in Distributed Learning

    Authors: Swanand Kadhe, O. Ozan Koyluoglu, Kannan Ramchandran

    Abstract: Distributed implementations of gradient-based methods, wherein a server distributes gradient computations across worker machines, need to overcome two limitations: delays caused by slow running machines called 'stragglers', and communication overheads. Recently, Ye and Abbe [ICML 2018] proposed a coding-theoretic paradigm to characterize a fundamental trade-off between computation load per worker,… ▽ More

    Submitted 14 May, 2020; originally announced May 2020.

    Comments: Shorter version accepted in 2020 IEEE International Symposium on Information Theory (ISIT)

  14. arXiv:1912.09765  [pdf, other

    cs.PF cs.DC cs.IT

    Download Time Analysis for Distributed Storage Codes with Locality and Availability

    Authors: Mehmet Fatih Aktas, Swanand Kadhe, Emina Soljanin, Alex Sprintson

    Abstract: The paper presents techniques for analyzing the expected download time in distributed storage systems that employ systematic availability codes. These codes provide access to hot data through the systematic server containing the object and multiple recovery groups. When a request for an object is received, it can be replicated (forked) to the systematic server and all recovery groups. We first con… ▽ More

    Submitted 10 March, 2021; v1 submitted 20 December, 2019; originally announced December 2019.

    Comments: Accepted for a publication in IEEE Transactions on Communications

  15. arXiv:1911.09721  [pdf, other

    cs.LG cs.DC stat.ML

    Communication-Efficient and Byzantine-Robust Distributed Learning with Error Feedback

    Authors: Avishek Ghosh, Raj Kumar Maity, Swanand Kadhe, Arya Mazumdar, Kannan Ramchandran

    Abstract: We develop a communication-efficient distributed learning algorithm that is robust against Byzantine worker machines. We propose and analyze a distributed gradient-descent algorithm that performs a simple thresholding based on gradient norms to mitigate Byzantine failures. We show the (statistical) error-rate of our algorithm matches that of Yin et al.~\cite{dong}, which uses more complicated sche… ▽ More

    Submitted 14 August, 2021; v1 submitted 21 November, 2019; originally announced November 2019.

  16. arXiv:1907.00598  [pdf, ps, other

    cs.IT cs.CR

    On an Equivalence Between Single-Server PIR with Side Information and Locally Recoverable Codes

    Authors: Swanand Kadhe, Anoosheh Heidarzadeh, Alex Sprintson, O. Ozan Koyluoglu

    Abstract: Private Information Retrieval (PIR) problem has recently attracted a significant interest in the information-theory community. In this problem, a user wants to privately download one or more messages belonging to a database with copies stored on a single or multiple remote servers. In the single server scenario, the user must have prior side information, i.e., a subset of messages unknown to the s… ▽ More

    Submitted 1 July, 2019; originally announced July 2019.

  17. Logical Clifford Synthesis for Stabilizer Codes

    Authors: Narayanan Rengaswamy, Robert Calderbank, Swanand Kadhe, Henry D. Pfister

    Abstract: Quantum error-correcting codes are used to protect qubits involved in quantum computation. This process requires logical operators, acting on protected qubits, to be translated into physical operators (circuits) acting on physical quantum states. We propose a mathematical framework for synthesizing physical circuits that implement logical Clifford operators for stabilizer codes. Circuit synthesis… ▽ More

    Submitted 18 August, 2021; v1 submitted 29 June, 2019; originally announced July 2019.

    Comments: Main content 12 pages, double column. This is primarily a shortened version of the paper arXiv:1803.06987 based on feedback received, and also has a much more improved introduction. It was presented at ISIT 2018 as well as posters in TQC 2018 and QIP 2019. All comments are welcome!

    Journal ref: IEEE Trans. Quantum Engg., vol. 1, pp. 1-17, 2020, Art no. 2501217

  18. arXiv:1906.12140  [pdf, ps, other

    cs.CR cs.DC cs.IT

    SeF: A Secure Fountain Architecture for Slashing Storage Costs in Blockchains

    Authors: Swanand Kadhe, Jichan Chung, Kannan Ramchandran

    Abstract: Full nodes, which synchronize the entire blockchain history and independently validate all the blocks, form the backbone of any blockchain network by playing a vital role in ensuring security properties. On the other hand, a user running a full node needs to pay a heavy price in terms of storage costs. E.g., the Bitcoin blockchain size has grown over 215GB, in spite of its low throughput. The ledg… ▽ More

    Submitted 28 June, 2019; originally announced June 2019.

  19. arXiv:1904.13373  [pdf, ps, other

    cs.IT cs.DC cs.LG stat.ML

    Gradient Coding Based on Block Designs for Mitigating Adversarial Stragglers

    Authors: Swanand Kadhe, O. Ozan Koyluoglu, Kannan Ramchandran

    Abstract: Distributed implementations of gradient-based methods, wherein a server distributes gradient computations across worker machines, suffer from slow running machines, called 'stragglers'. Gradient coding is a coding-theoretic framework to mitigate stragglers by enabling the server to recover the gradient sum in the presence of stragglers. 'Approximate gradient codes' are variants of gradient codes t… ▽ More

    Submitted 30 April, 2019; originally announced April 2019.

    Comments: Shorter version accepted in 2019 IEEE International Symposium on Information Theory (ISIT)

  20. arXiv:1903.08857  [pdf, other

    cs.DC cs.IT cs.LG

    OverSketched Newton: Fast Convex Optimization for Serverless Systems

    Authors: Vipul Gupta, Swanand Kadhe, Thomas Courtade, Michael W. Mahoney, Kannan Ramchandran

    Abstract: Motivated by recent developments in serverless systems for large-scale computation as well as improvements in scalable randomized matrix algorithms, we develop OverSketched Newton, a randomized Hessian-based optimization algorithm to solve large-scale convex optimization problems in serverless systems. OverSketched Newton leverages matrix sketching ideas from Randomized Numerical Linear Algebra to… ▽ More

    Submitted 27 August, 2020; v1 submitted 21 March, 2019; originally announced March 2019.

    Comments: 37 pages, 12 figures

  21. arXiv:1901.07509  [pdf, ps, other

    cs.IT

    Single-Server Multi-Message Individually-Private Information Retrieval with Side Information

    Authors: Anoosheh Heidarzadeh, Swanand Kadhe, Salim El Rouayheb, Alex Sprintson

    Abstract: We consider a multi-user variant of the private information retrieval problem described as follows. Suppose there are $D$ users, each of which wants to privately retrieve a distinct message from a server with the help of a trusted agent. We assume that the agent has a random subset of $M$ messages that is not known to the server. The goal of the agent is to collectively retrieve the users' request… ▽ More

    Submitted 1 February, 2019; v1 submitted 22 January, 2019; originally announced January 2019.

    Comments: 11 pages; This work is a long version of an article submitted to IEEE for possible publication; This version includes more details on Conjecture 2

  22. arXiv:1807.09908  [pdf, ps, other

    cs.IT

    On the Capacity of Single-Server Multi-Message Private Information Retrieval with Side Information

    Authors: Anoosheh Heidarzadeh, Brenden Garcia, Swanand Kadhe, Salim El Rouayheb, Alex Sprintson

    Abstract: We study Private Information Retrieval with Side Information (PIR-SI) in the single-server multi-message setting. In this setting, a user wants to download $D$ messages from a database of $K\geq D$ messages, stored on a single server, without revealing any information about the identities of the demanded messages to the server. The goal of the user is to achieve information-theoretic privacy by le… ▽ More

    Submitted 25 July, 2018; originally announced July 2018.

    Comments: 11 pages, submitted for publication

  23. arXiv:1805.03095  [pdf, other

    cs.IT

    Stealthy Communication over Adversarially Jammed Multipath Networks

    Authors: Jianhan Song, Qiaosheng Zhang, Swanand Kadhe, Mayank Bakshi, Sidharth Jaggi

    Abstract: We consider the problem of stealthy communication over a multipath network in the presence of an active adversary. The multipath network consists of multiple parallel noiseless links, and the adversary is able to eavesdrop and jam a subset of links. We consider two types of jamming---erasure jamming and overwrite jamming. We require the communication to be both stealthy and reliable, i.e., the adv… ▽ More

    Submitted 31 August, 2020; v1 submitted 8 May, 2018; originally announced May 2018.

    Comments: To appear in the IEEE Transactions on Communications

  24. Synthesis of Logical Clifford Operators via Symplectic Geometry

    Authors: Narayanan Rengaswamy, Robert Calderbank, Swanand Kadhe, Henry D. Pfister

    Abstract: Quantum error-correcting codes can be used to protect qubits involved in quantum computation. This requires that logical operators acting on protected qubits be translated to physical operators (circuits) acting on physical quantum states. We propose a mathematical framework for synthesizing physical circuits that implement logical Clifford operators for stabilizer codes. Circuit synthesis is enab… ▽ More

    Submitted 19 March, 2018; originally announced March 2018.

    Comments: Single column, main text: 20 pages, full length with appendices: 32 pages. Includes pseudo-codes for all algorithms. Part of this work has been submitted to the 2018 IEEE International Symposium on Information Theory

    MSC Class: 15Axx; 15B10; 20D45; 51A50; 68R01; 68W01; 81R05; 94B05

    Journal ref: Proc. IEEE International Symposium on Information Theory (ISIT), pp. 791-795, 2018

  25. arXiv:1710.06753  [pdf, ps, other

    cs.IT cs.CR

    Universally Weakly Secure Coset Coding Schemes for Minimum Storage Regenerating (MSR) Codes

    Authors: Swanand Kadhe, Alex Sprintson

    Abstract: We consider the problem of designing codes for distributed storage that protect user data against eavesdroppers that can gain access to network links as well as individual nodes. Our goal is to achieve weak security (also known as block security) that requires that the eavesdroppers would not be able to decode individual files or combinations of a small number of files. The standard approach for a… ▽ More

    Submitted 18 October, 2017; originally announced October 2017.

    Comments: Presented at the 55th Annual Allerton Conference on Communication, Control, and Computing, Oct 2017

  26. arXiv:1710.03376  [pdf, other

    cs.IT

    On the Service Capacity Region of Accessing Erasure Coded Content

    Authors: Mehmet Aktas, Sarah E. Anderson, Ann Johnston, Gauri Joshi, Swanand Kadhe, Gretchen L. Matthews, Carolyn Mayer, Emina Soljanin

    Abstract: Cloud storage systems generally add redundancy in storing content files such that $K$ files are replicated or erasure coded and stored on $N > K$ nodes. In addition to providing reliability against failures, the redundant copies can be used to serve a larger volume of content access requests. A request for one of the files can be either be sent to a systematic node, or one of the repair groups. In… ▽ More

    Submitted 9 October, 2017; originally announced October 2017.

    Comments: To be published in 2017 55th Annual Allerton Conference on Communication, Control, and Computing

  27. arXiv:1709.00112  [pdf, ps, other

    cs.IT cs.CR

    Private Information Retrieval with Side Information

    Authors: Swanand Kadhe, Brenden Garcia, Anoosheh Heidarzadeh, Salim El Rouayheb, Alex Sprintson

    Abstract: We study the problem of Private Information Retrieval (PIR) in the presence of prior side information. The problem setup includes a database of $K$ independent messages possibly replicated on several servers, and a user that needs to retrieve one of these messages. In addition, the user has some prior side information in the form of a subset of $M$ messages, not containing the desired message and… ▽ More

    Submitted 31 August, 2017; originally announced September 2017.

    Comments: Shorter version of the paper is accepted in Allerton Conference 2017

  28. arXiv:1707.05944  [pdf, ps, other

    cs.IT

    Codes with Locality in the Rank and Subspace Metrics

    Authors: Swanand Kadhe, Salim El Rouayheb, Iwan Duursma, Alex Sprintson

    Abstract: We extend the notion of locality from the Hamming metric to the rank and subspace metrics. Our main contribution is to construct a class of array codes with locality constraints in the rank metric. Our motivation for constructing such codes stems from designing codes for efficient data recovery from correlated and/or mixed (i.e., complete and partial) failures in distributed storage systems. Speci… ▽ More

    Submitted 5 May, 2019; v1 submitted 19 July, 2017; originally announced July 2017.

    Comments: Presented in part at the 2016 Allerton Conference (see version 1). The second version additionally contains the notion of locality in the subspace metric. The third version additionally contains an application of subspace-locality to distributed storage systems, where nodes can be accessed over a noisy network

  29. arXiv:1701.02456  [pdf, ps, other

    cs.IT

    Rate Optimal Binary Linear Locally Repairable Codes with Small Availability

    Authors: Swanand Kadhe, Robert Calderbank

    Abstract: A locally repairable code with availability has the property that every code symbol can be recovered from multiple, disjoint subsets of other symbols of small size. In particular, a code symbol is said to have $(r,t)$-availability if it can be recovered from $t$ disjoint subsets, each of size at most $r$. A code with availability is said to be 'rate-optimal', if its rate is maximum among the class… ▽ More

    Submitted 14 September, 2017; v1 submitted 10 January, 2017; originally announced January 2017.

    Comments: Shorter version of the paper was presented at ISIT 2017. The updated second version contains a new section on rate upper bounds for binary linear codes with (2,t) and (r,3)-availability

  30. arXiv:1601.06153  [pdf, ps, other

    cs.IT

    Codes with Unequal Locality

    Authors: Swanand Kadhe, Alex Sprintson

    Abstract: For a code $\code$, its $i$-th symbol is said to have locality $r$ if its value can be recovered by accessing some other $r$ symbols of $\code$. Locally repairable codes (LRCs) are the family of codes such that every symbol has locality $r$. In this paper, we focus on (linear) codes whose individual symbols can be partitioned into disjoint subsets such that the symbols in one subset have differe… ▽ More

    Submitted 22 January, 2016; originally announced January 2016.

    Comments: Longer version of the ISIT 2016 submission

  31. arXiv:1504.05984  [pdf, other

    cs.IT

    Coding against a Limited-view Adversary: The Effect of Causality and Feedback

    Authors: Qiaosheng Zhang, Swanand Kadhe, Mayank Bakshi, Sidharth Jaggi, Alex Sprintson

    Abstract: We consider the problem of communication over a multi-path network in the presence of a causal adversary. The limited-view causal adversary is able to eavesdrop on a subset of links and also jam on a potentially overlap** subset of links based on the current and past information. To ensure that the communication takes place reliably and secretly, resilient network codes with necessary redundancy… ▽ More

    Submitted 5 August, 2015; v1 submitted 22 April, 2015; originally announced April 2015.

    Comments: 15 pages

  32. arXiv:1405.2894  [pdf, ps, other

    cs.IT

    Weakly Secure Regenerating Codes for Distributed Storage

    Authors: Swanand Kadhe, Alex Sprintson

    Abstract: We consider the problem of secure distributed data storage under the paradigm of \emph{weak security}, in which no \emph{meaningful information} is leaked to the eavesdropper. More specifically, the eavesdropper cannot get any information about any individual message file or a small group of files. The key benefit of the weak security paradigm is that it incurs no loss in the storage capacity, whi… ▽ More

    Submitted 12 May, 2014; originally announced May 2014.

    Comments: Extended version of the paper accepted in NetCod 2014

  33. arXiv:1401.4451  [pdf, other

    cs.IT

    Reliable, Deniable, and Hidable Communication over Multipath Networks

    Authors: Swanand Kadhe, Sidharth Jaggi, Mayank Bakshi, Alex Sprintson

    Abstract: We consider the scenario wherein Alice wants to (potentially) communicate to the intended receiver Bob over a network consisting of multiple parallel links in the presence of a passive eavesdropper Willie, who observes an unknown subset of links. A primary goal of our communication protocol is to make the communication "deniable", {\it i.e.}, Willie should not be able to {\it reliably} estimate wh… ▽ More

    Submitted 28 January, 2014; v1 submitted 17 January, 2014; originally announced January 2014.

    Comments: 26 pages, 4 figures; Extended version of the paper submitted for ISIT 2014