Skip to main content

Showing 1–50 of 73 results for author: Kliewer, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.07316  [pdf, other

    cs.LG cs.IT

    VALID: a Validated Algorithm for Learning in Decentralized Networks with Possible Adversarial Presence

    Authors: Mayank Bakshi, Sara Ghasvarianjahromi, Yauhen Yakimenka, Allison Beemer, Oliver Kosut, Joerg Kliewer

    Abstract: We introduce the paradigm of validated decentralized learning for undirected networks with heterogeneous data and possible adversarial infiltration. We require (a) convergence to a global empirical loss minimizer when adversaries are absent, and (b) either detection of adversarial presence of convergence to an admissible consensus irrespective of the adversarial configuration. To this end, we prop… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

    Comments: This is an extended version of the paper at International Symposium on Information Theory 2024

  2. arXiv:2403.10676  [pdf, other

    cs.IT cs.CR

    Secure Distributed Storage: Optimal Trade-Off Between Storage Rate and Privacy Leakage

    Authors: Remi A. Chou, Joerg Kliewer

    Abstract: Consider the problem of storing data in a distributed manner over $T$ servers. Specifically, the data needs to (i) be recoverable from any $τ$ servers, and (ii) remain private from any $z$ colluding servers, where privacy is quantified in terms of mutual information between the data and all the information available at any $z$ colluding servers. For this model, our main results are (i) the fundame… ▽ More

    Submitted 15 March, 2024; originally announced March 2024.

    Comments: 11 pages, 3 figures, two-column, accepted to IEEE Transactions on Information Theory, part of the results was presented at the 2020 IEEE International Symposium on Information Theory (ISIT)

  3. arXiv:2401.12151  [pdf, other

    cs.IT cs.DC math.OC

    Uncoded Storage Coded Transmission Elastic Computing with Straggler Tolerance in Heterogeneous Systems

    Authors: Xi Zhong, Joerg Kliewer, Mingyue Ji

    Abstract: In 2018, Yang et al. introduced a novel and effective approach, using maximum distance separable (MDS) codes, to mitigate the impact of elasticity in cloud computing systems. This approach is referred to as coded elastic computing. Some limitations of this approach include that it assumes all virtual machines have the same computing speeds and storage capacities, and it cannot tolerate stragglers… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

    Comments: 6 pages, 1 figure, accepted in ICC 2024

  4. arXiv:2311.12652  [pdf, other

    cs.LG math.OC

    FedDRO: Federated Compositional Optimization for Distributionally Robust Learning

    Authors: Prashant Khanduri, Chengyin Li, Rafi Ibn Sultan, Yao Qiang, Joerg Kliewer, Dongxiao Zhu

    Abstract: Recently, compositional optimization (CO) has gained popularity because of its applications in distributionally robust optimization (DRO) and many other machine learning problems. Large-scale and distributed availability of data demands the development of efficient federated learning (FL) algorithms for solving CO problems. Develo** FL algorithms for CO is particularly challenging because of the… ▽ More

    Submitted 21 November, 2023; originally announced November 2023.

    Comments: 38 Pages, 6 Figures

  5. On the Capacity of Private Nonlinear Computation for Replicated Databases

    Authors: Sarah A. Obead, Hsuan-Yin Lin, Eirik Rosnes, Jörg Kliewer

    Abstract: We consider the problem of private computation (PC) in a distributed storage system. In such a setting a user wishes to compute a function of $f$ messages replicated across $n$ noncolluding databases, while revealing no information about the desired function to the databases. We provide an information-theoretically accurate achievable PC rate, which is the ratio of the smallest desired amount of i… ▽ More

    Submitted 4 July, 2023; originally announced July 2023.

    Comments: 5 pages, 1 figure, 1 table. Presented at the 2019 IEEE Information Theory Workshop (ITW). Figure 1 is updated as it contained incorrect data-points for $f=2$ and $g=3$. arXiv admin note: text overlap with arXiv:2003.10007

    Journal ref: in Proc. IEEE Inf. Theory Workshop (ITW), Visby, Sweden, Aug. 25-28, 2019, pp. 1-5

  6. arXiv:2212.03080  [pdf, other

    cs.LG cs.CR cs.IT

    Straggler-Resilient Differentially-Private Decentralized Learning

    Authors: Yauhen Yakimenka, Chung-Wei Weng, Hsuan-Yin Lin, Eirik Rosnes, Jörg Kliewer

    Abstract: We consider the straggler problem in decentralized learning over a logical ring while preserving user data privacy. Especially, we extend the recently proposed framework of differential privacy (DP) amplification by decentralization by Cyffers and Bellet to include overall training latency--comprising both computation and communication latency. Analytical results on both the convergence speed and… ▽ More

    Submitted 28 June, 2024; v1 submitted 6 December, 2022; originally announced December 2022.

    Comments: To appear in the IEEE Journal on Selected Areas in Information Theory (special issue on Information-Theoretic Methods for Trustworthy and Reliable Machine Learning)

  7. arXiv:2206.05759  [pdf, other

    cs.IT cs.IR

    Pliable Private Information Retrieval

    Authors: Sarah A. Obead, Jörg Kliewer

    Abstract: We formulate a new variant of the private information retrieval (PIR) problem where the user is pliable, i.e., interested in any message from a desired subset of the available dataset, denoted as pliable private information retrieval (PPIR). We consider a setup where a dataset consisting of $f$ messages is replicated in $n$ noncolluding databases and classified into $Γ$ classes. For this setup, th… ▽ More

    Submitted 12 June, 2022; originally announced June 2022.

    Comments: 23 pages, 3 figures, 3 tables, submitted for possible publication

  8. arXiv:2205.10827  [pdf, other

    cs.IT cs.CR

    Information Leakage in Index Coding With Sensitive and Non-Sensitive Messages

    Authors: Yucheng Liu, Lawrence Ong, Phee Lep Yeoh, Parastoo Sadeghi, Joerg Kliewer, Sarah Johnson

    Abstract: Information leakage to a guessing adversary in index coding is studied, where some messages in the system are sensitive and others are not. The non-sensitive messages can be used by the server like secret keys to mitigate leakage of the sensitive messages to the adversary. We construct a deterministic linear coding scheme, developed from the rank minimization method based on fitting matrices (Bar-… ▽ More

    Submitted 22 May, 2022; originally announced May 2022.

    Comments: Accepted by IEEE International Symposium on Information Theory (ISIT) 2022

  9. arXiv:2205.10821  [pdf, other

    cs.IT cs.CR

    Information Leakage in Index Coding

    Authors: Yucheng Liu, Lawrence Ong, Phee Lep Yeoh, Parastoo Sadeghi, Joerg Kliewer, Sarah Johnson

    Abstract: We study the information leakage to a guessing adversary in index coding with a general message distribution. Under both vanishing-error and zero-error decoding assumptions, we develop lower and upper bounds on the optimal leakage rate, which are based on the broadcast rate of the subproblem induced by the set of messages the adversary tries to guess. When the messages are independent and uniforml… ▽ More

    Submitted 22 May, 2022; originally announced May 2022.

    Comments: Published in Proceedings of IEEE Information Theory Workshop (ITW) 2021

  10. arXiv:2201.11891  [pdf, other

    cs.IT

    Function Computation Without Secure Links: Information and Leakage Rates

    Authors: Remi A. Chou, Joerg Kliewer

    Abstract: Consider L users, who each holds private data, and one fusion center who must compute a function of the private data of the L users. To accomplish this task, each user can make a single use of a public and noiseless broadcast channel. In this setting, and in the absence of any additional resources such as secure links, we study the optimal communication rates and minimum information leakages on th… ▽ More

    Submitted 27 January, 2022; originally announced January 2022.

    Comments: Submitted to the 2022 IEEE International Symposium on Information Theory

  11. arXiv:2112.13934  [pdf, other

    cs.IT cs.LG

    RELDEC: Reinforcement Learning-Based Decoding of Moderate Length LDPC Codes

    Authors: Salman Habib, Allison Beemer, Joerg Kliewer

    Abstract: In this work we propose RELDEC, a novel approach for sequential decoding of moderate length low-density parity-check (LDPC) codes. The main idea behind RELDEC is that an optimized decoding policy is subsequently obtained via reinforcement learning based on a Markov decision process (MDP). In contrast to our previous work, where an agent learns to schedule only a single check node (CN) within a gro… ▽ More

    Submitted 27 July, 2023; v1 submitted 27 December, 2021; originally announced December 2021.

    Comments: Accepted for publication in IEEE Transactions on Communications

  12. arXiv:2111.06386  [pdf, ps, other

    cs.IT

    Keyless Authentication for AWGN Channels

    Authors: Eric Graves, Allison Beemer, Jorg Kliewer, Oliver Kosut, Paul Yu

    Abstract: This work establishes that the physical layer can be used to perform information-theoretic authentication in additive white Gaussian noise channels, as long as the adversary is not omniscient. The model considered consists of an encoder, decoder, and adversary, where the adversary has access to the message, a non-causal noisy observation of the encoder's transmission, and unlimited transmission po… ▽ More

    Submitted 11 November, 2021; originally announced November 2021.

    Comments: Submitted for possible publication

  13. arXiv:2111.05160  [pdf, ps, other

    cs.IT

    Optimal Rate-Distortion-Leakage Tradeoff for Single-Server Information Retrieval

    Authors: Yauhen Yakimenka, Hsuan-Yin Lin, Eirik Rosnes, Jörg Kliewer

    Abstract: Private information retrieval protocols guarantee that a user can privately and losslessly retrieve a single file from a database stored across multiple servers. In this work, we propose to simultaneously relax the conditions of perfect retrievability and privacy in order to obtain improved download rates when all files are stored uncoded on a single server. Information leakage is measured in term… ▽ More

    Submitted 6 January, 2022; v1 submitted 9 November, 2021; originally announced November 2021.

    Comments: 14 pages, 3 figures. Accepted for publication in IEEE Journal on Selected Areas in Communications, Special Issue on Private Information Retrieval, Private Coded Computing over Distributed Servers, and Privacy in Distributed Learning

  14. arXiv:2107.08496  [pdf, other

    cs.IT cs.DC

    A Practical Algorithm Design and Evaluation for Heterogeneous Elastic Computing with Stragglers

    Authors: Nicholas Woolsey, Joerg Kliewer, Rong-Rong Chen, Mingyue Ji

    Abstract: Our extensive real measurements over Amazon EC2 show that the virtual instances often have different computing speeds even if they share the same configurations. This motivates us to study heterogeneous Coded Storage Elastic Computing (CSEC) systems where machines, with different computing speeds, join and leave the network arbitrarily over different computing steps. In CSEC systems, a Maximum Dis… ▽ More

    Submitted 15 September, 2021; v1 submitted 18 July, 2021; originally announced July 2021.

    Comments: 6 pages, 2 figures, accepted by IEEE Globecom 2021

  15. arXiv:2106.13495  [pdf, other

    cs.IT math.PR

    Doubly-Exponential Identification via Channels: Code Constructions and Bounds

    Authors: Onur Günlü, Joerg Kliewer, Rafael F. Schaefer, Vladimir Sidorenko

    Abstract: Consider the identification (ID) via channels problem, where a receiver wants to decide whether the transmitted identifier is its identifier, rather than decoding the identifier. This model allows to transmit identifiers whose size scales doubly-exponentially in the blocklength, unlike common transmission (or channel) codes whose size scales exponentially. It suffices to use binary constant-weight… ▽ More

    Submitted 25 June, 2021; originally announced June 2021.

    Comments: To appear in the IEEE International Symposium on Information Theory 2021

  16. arXiv:2102.10623  [pdf, other

    cs.IT

    Nested Array-Based Spatially Coupled LDPC Codes

    Authors: Salman Habib, David G. M. Mitchell, Joerg Kliewer

    Abstract: Linear nested codes, where two or more sub-codes are nested in a global code, have been proposed as candidates for reliable multi-terminal communication. In this paper, we consider nested array-based spatially coupled low-density parity-check (SC-LDPC) codes and propose a line-counting based optimization scheme for minimizing the number of dominant absorbing sets in order to improve its performanc… ▽ More

    Submitted 21 February, 2021; originally announced February 2021.

    Comments: Accepted for publication in IEEE Transactions on Communications

  17. arXiv:2102.01908  [pdf, other

    cs.IT cs.CR

    Information Leakage in Zero-Error Source Coding: A Graph-Theoretic Perspective

    Authors: Yucheng Liu, Lawrence Ong, Sarah Johnson, Joerg Kliewer, Parastoo Sadeghi, Phee Lep Yeoh

    Abstract: We study the information leakage to a guessing adversary in zero-error source coding. The source coding problem is defined by a confusion graph capturing the distinguishability between source symbols. The information leakage is measured by the ratio of the adversary's successful guessing probability after and before eavesdrop** the codeword, maximized over all possible source distributions. Such… ▽ More

    Submitted 3 February, 2021; originally announced February 2021.

    Comments: A shortened version has been submitted to ISIT 2021

  18. Generative Adversarial User Privacy in Lossy Single-Server Information Retrieval

    Authors: Chung-Wei Weng, Yauhen Yakimenka, Hsuan-Yin Lin, Eirik Rosnes, Joerg Kliewer

    Abstract: We propose to extend the concept of private information retrieval by allowing for distortion in the retrieval process and relaxing the perfect privacy requirement at the same time. In particular, we study the trade-off between download rate, distortion, and user privacy leakage, and show that in the limit of large file sizes this trade-off can be captured via a novel information-theoretical formul… ▽ More

    Submitted 19 October, 2022; v1 submitted 7 December, 2020; originally announced December 2020.

    Comments: Accepted for Publication in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (TIFS)

    Journal ref: IEEE Transactions on Information Forensics and Security, vol. 17, pp. 3495-3510, 2022

  19. arXiv:2010.05637  [pdf, ps, other

    cs.IT

    Learning to Decode: Reinforcement Learning for Decoding of Sparse Graph-Based Channel Codes

    Authors: Salman Habib, Allison Beemer, Joerg Kliewer

    Abstract: We show in this work that reinforcement learning can be successfully applied to decoding short to moderate length sparse graph-based channel codes. Specifically, we focus on low-density parity check (LDPC) codes, which for example have been standardized in the context of 5G cellular communication systems due to their excellent error correcting performance. These codes are typically decoded via bel… ▽ More

    Submitted 17 October, 2020; v1 submitted 12 October, 2020; originally announced October 2020.

    Comments: Accepted for publication in 34th Conference on Neural Information Processing Systems (NeurIPS 2020), Vancouver, Canada

  20. arXiv:2003.10007  [pdf, other

    cs.IT

    Private Function Computation for Noncolluding Coded Databases

    Authors: Sarah A. Obead, Hsuan-Yin Lin, Eirik Rosnes, Jörg Kliewer

    Abstract: Private computation in a distributed storage system (DSS) is a generalization of the private information retrieval (PIR) problem. In such setting a user wishes to compute a function of $f$ messages stored in $n$ noncolluding coded databases, i.e., databases storing data encoded with an $[n,k]$ linear storage code, while revealing no information about the desired function to the databases. We consi… ▽ More

    Submitted 4 August, 2021; v1 submitted 22 March, 2020; originally announced March 2020.

    Comments: 41 pages, 4 figures, 11 tables, submitted for publication. Some overlap with arXiv:1810.04230, arXiv:1901.10286

  21. arXiv:2001.04241  [pdf, ps, other

    cs.IT

    Secure Distributed Storage: Rate-Privacy Trade-Off and XOR-Based Coding Scheme

    Authors: Remi A. Chou, Joerg Kliewer

    Abstract: We consider the problem of storing data in a distributed manner over $T$ servers. We require the data (i) to be recoverable from the $T$ servers, and (ii) to remain private from any $T-1$ colluding servers, where privacy is quantified in terms of mutual information between the data and all the information available at the $T-1$ colluding servers. For this model, we determine (i) the fundamental tr… ▽ More

    Submitted 28 May, 2020; v1 submitted 13 January, 2020; originally announced January 2020.

    Comments: 6 pages, full version of paper accepted to the 2020 IEEE International Symposium on Information Theory

  22. arXiv:2001.03593  [pdf, ps, other

    cs.IT

    Authentication Against a Myopic Adversary

    Authors: Allison Beemer, Eric Graves, Joerg Kliewer, Oliver Kosut, Paul Yu

    Abstract: We consider keyless authentication for point-to-point communication in the presence of a myopic adversary. In particular, the adversary has access to a non-causal noisy version of the transmission and may use this knowledge to choose the channel state of an arbitrarily-varying channel between legitimate users; the receiver is successful if it either decodes to the correct message or correctly dete… ▽ More

    Submitted 22 January, 2020; v1 submitted 10 January, 2020; originally announced January 2020.

    Comments: 22 pages; minor changes to notation and proofs of technical lemmas, results unchanged

  23. arXiv:1909.11850  [pdf, other

    cs.IT

    Improved Lower Bounds for Pliable Index Coding using Absent Receivers

    Authors: Lawrence Ong, Badri N. Vellambi, Jörg Kliewer, Parastoo Sadeghi

    Abstract: This paper studies pliable index coding, in which a sender broadcasts information to multiple receivers through a shared broadcast medium, and the receivers each have some message a priori and want any message they do not have. An approach, based on receivers that are absent from the problem, was previously proposed to find lower bounds on the optimal broadcast rate. In this paper, we introduce ne… ▽ More

    Submitted 1 October, 2019; v1 submitted 25 September, 2019; originally announced September 2019.

    Comments: An extended version of the same-titled paper submitted to a conference

  24. Optimal-Rate Characterisation for Pliable Index Coding using Absent Receivers

    Authors: Lawrence Ong, Badri N. Vellambi, Jörg Kliewer

    Abstract: We characterise the optimal broadcast rate for a few classes of pliable-index-coding problems. This is achieved by devising new lower bounds that utilise the set of absent receivers to construct decoding chains with skipped messages. This work complements existing works by considering problems that are not complete-S, i.e., problems considered in this work do not require that all receivers with a… ▽ More

    Submitted 25 September, 2019; originally announced September 2019.

    Comments: Authors' copy

    Journal ref: in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Paris, France, July 7-12 2019, pp. 522-526

  25. arXiv:1909.00407  [pdf, other

    cs.IT

    Private and Secure Distributed Matrix Multiplication with Flexible Communication Load

    Authors: Malihe Aliasgari, Osvaldo Simeone, Joerg Kliewer

    Abstract: Large matrix multiplications are central to large-scale machine learning applications. These operations are often carried out on a distributed computing platform with a master server and multiple workers in the cloud operating in parallel. For such distributed platforms, it has been recently shown that coding over the input data matrices can reduce the computational delay, yielding a trade-off bet… ▽ More

    Submitted 18 December, 2019; v1 submitted 1 September, 2019; originally announced September 2019.

    Comments: 12 pages, 9 figures, this submission subsumes arXiv:1901.07705. This work has been submitted to the IEEE for possible publication

  26. arXiv:1905.00405  [pdf, ps, other

    cs.IT

    LDPC Coded Multiuser Sha** for the Gaussian Multiple Access Channel

    Authors: Alexios Balatsoukas-Stimming, Stefano Rini, Joerg Kliewer

    Abstract: The joint design of input constellation and low-density parity-check (LDPC) codes to approach the symmetric capacity of the two-user Gaussian multiple access channel is studied. More specifically, multilevel coding is employed at each user to construct a high-order input constellation and the constellations of the users are jointly designed so as to maximize the multiuser sha** gain. At the rece… ▽ More

    Submitted 1 May, 2019; originally announced May 2019.

    Comments: To be presented at ISIT 2019

  27. Private Polynomial Computation for Noncolluding Coded Databases

    Authors: Sarah A. Obead, Hsuan-Yin Lin, Eirik Rosnes, Jörg Kliewer

    Abstract: We consider private polynomial computation (PPC) over noncolluding coded databases. In such a setting a user wishes to compute a multivariate polynomial of degree at most $g$ over $f$ variables (or messages) stored in multiple databases while revealing no information about the desired polynomial to the databases. We construct two novel PPC schemes, where the first is a generalization of our previo… ▽ More

    Submitted 7 May, 2019; v1 submitted 29 January, 2019; originally announced January 2019.

    Comments: 5 pages, 2 tables, 1 figure, to be presented at 2019 IEEE International Symposium on Information Theory (ISIT)

    Journal ref: IEEE International Symposium on Information Theory (ISIT), Paris, France, July 2019, pp. 1677-1681

  28. arXiv:1901.07705  [pdf, other

    cs.IT

    Distributed and Private Coded Matrix Computation with Flexible Communication Load

    Authors: Malihe Aliasgari, Osvaldo Simeone, Joerg Kliewer

    Abstract: Tensor operations, such as matrix multiplication, are central to large-scale machine learning applications. For user-driven tasks these operations can be carried out on a distributed computing platform with a master server at the user side and multiple workers in the cloud operating in parallel. For distributed platforms, it has been recently shown that coding over the input data matrices can redu… ▽ More

    Submitted 22 January, 2019; originally announced January 2019.

    Comments: 8 pages, 6 figures, submitted to 2019 IEEE International Symposium on Information Theory (ISIT)

  29. Capacity of Private Linear Computation for Coded Databases

    Authors: Sarah A. Obead, Hsuan-Yin Lin, Eirik Rosnes, Jörg Kliewer

    Abstract: We consider the problem of private linear computation (PLC) in a distributed storage system. In PLC, a user wishes to compute a linear combination of $f$ messages stored in noncolluding databases while revealing no information about the coefficients of the desired linear combination to the databases. In extension of our previous work we employ linear codes to encode the information on the database… ▽ More

    Submitted 9 October, 2018; originally announced October 2018.

    Comments: 8 pages. This work has been presented at the 56th Annual Allerton Conference on Communication, Control, and Computing, October 2018

    Journal ref: 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA , Oct. 2018, pp. 813-820

  30. arXiv:1809.05647  [pdf, other

    cs.IT

    Algebraic Optimization of Binary Spatially Coupled Measurement Matrices for Interval Passing

    Authors: Salman Habib, Joerg Kliewer

    Abstract: We consider binary spatially coupled (SC) low density measurement matrices for low complexity reconstruction of sparse signals via the interval passing algorithm (IPA). The IPA is known to fail due to the presence of harmful sub-structures in the Tanner graph of a binary sparse measurement matrix, so called termatiko sets. In this work we construct array-based (AB) SC sparse measurement matrices v… ▽ More

    Submitted 15 September, 2018; originally announced September 2018.

    Comments: 5 pages, 2 figures, To appear in the Proceedings of 2018 IEEE Information Theory Workshop, Guangzhou, China

  31. Strong Coordination over Noisy Channels

    Authors: Sarah A. Obead, Badri N. Vellambi, Jörg Kliewer

    Abstract: We study the problem of strong coordination of the actions of two nodes $X$ and $Y$ that communicate over a discrete memoryless channel (DMC) such that the actions follow a prescribed joint probability distribution. We propose two novel random coding schemes and a polar coding scheme for this noisy strong coordination problem, and derive inner bounds for the respective strong coordination capacity… ▽ More

    Submitted 15 August, 2018; originally announced August 2018.

    Comments: 30 pages, 9 figures, submitted for publication. arXiv admin note: substantial text overlap with arXiv:1704.08771, arXiv:1710.03210

    Journal ref: IEEE Transactions on Information Theory, vol. 67, no. 5, pp. 2716-2738, May 2021

  32. arXiv:1805.11698  [pdf, other

    cs.IT

    Coded Computation Against Distributed Straggling Channel Decoders in the Cloud for Gaussian Uplink Channels

    Authors: **wen Shi, Cong Ling, Osvaldo Simeone, Jörg Kliewer

    Abstract: The uplink of a Cloud Radio Access Network (CRAN) architecture is studied, where decoding at the cloud takes place at distributed decoding processors. To mitigate the impact of straggling decoders in the cloud, the cloud re-encodes the received frames via a linear code before distributing them to the decoding processors. Focusing on Gaussian channels, and assuming the use of lattice codes at the u… ▽ More

    Submitted 12 July, 2018; v1 submitted 29 May, 2018; originally announced May 2018.

  33. arXiv:1804.09888  [pdf, ps, other

    cs.IT

    A Code Equivalence between Secure Network and Index Coding

    Authors: Lawrence Ong, Jörg Kliewer, Badri N. Vellambi, Phee Lep Yeoh

    Abstract: A code equivalence between index coding and network coding was established, which shows that any index-coding instance can be mapped to a network-coding instance, for which any index code can be translated to a network code with the same decoding-error performance, and vice versa. Also, any network-coding instance can be mapped to an index-coding instance with a similar code translation. In this p… ▽ More

    Submitted 26 April, 2018; originally announced April 2018.

    Comments: The journal version of conference papers "An Equivalence Between Secure Network and Index Coding" (Globecom-NetCod 2016) and "Secure Network-Index Code Equivalence: Extension to Non-zero Error and Leakage" (ISIT 2018)

    MSC Class: 94A15

  34. Achievable Rate of Private Function Retrieval from MDS Coded Databases

    Authors: Sarah A. Obead, Jörg Kliewer

    Abstract: We study the problem of private function retrieval (PFR) in a distributed storage system. In PFR the user wishes to retrieve a linear combination of $M$ messages stored in non-colluding $(N,K)$ MDS coded databases while revealing no information about the coefficients of the intended linear combination to any of the individual databases. We present an achievable scheme for MDS coded PFR with a rate… ▽ More

    Submitted 22 February, 2018; originally announced February 2018.

    Comments: 5 pages, 1 table, submitted for publication

    Journal ref: IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, June 2018, pp. 2117-2121

  35. arXiv:1801.03594  [pdf, ps, other

    cs.IT

    Finite Blocklength and Dispersion Bounds for the Arbitrarily-Varying Channel

    Authors: Oliver Kosut, Joerg Kliewer

    Abstract: Finite blocklength and second-order (dispersion) results are presented for the arbitrarily-varying channel (AVC), a classical model wherein an adversary can transmit arbitrary signals into the channel. A novel finite blocklength achievability bound is presented, roughly analogous to the random coding union bound for non-adversarial channels. This finite blocklength bound, along with a known conver… ▽ More

    Submitted 10 January, 2018; originally announced January 2018.

    Comments: 7 pages, full version of paper submitted to the 2018 IEEE International Symposium on Information Theory

  36. arXiv:1710.03619  [pdf, other

    cs.IT

    A Generalized Algebraic Approach to Optimizing SC-LDPC Codes

    Authors: Allison Beemer, Salman Habib, Christine A. Kelley, Joerg Kliewer

    Abstract: Spatially coupled low-density parity-check (SC-LDPC) codes are sparse graph codes that have recently become of interest due to their capacity-approaching performance on memoryless binary input channels. In this paper, we unify all existing SC-LDPC code construction methods under a new generalized description of SC-LDPC codes based on algebraic lifts of graphs. We present an improved low-complexity… ▽ More

    Submitted 10 October, 2017; originally announced October 2017.

    Comments: 8 pages, to appear in the Proceedings of the 55th Annual Allerton Conference on Communication, Control, and Computing, 2017

  37. Joint Coordination-Channel Coding for Strong Coordination over Noisy Channels Based on Polar Codes

    Authors: Sarah A. Obead, Jörg Kliewer, Badri N. Vellambi

    Abstract: We construct a joint coordination-channel polar coding scheme for strong coordination of actions between two agents $\mathsf X$ and $\mathsf Y$, which communicate over a discrete memoryless channel (DMC) such that the joint distribution of actions follows a prescribed probability distribution. We show that polar codes are able to achieve our previously established inner bound to the strong noisy c… ▽ More

    Submitted 9 October, 2017; originally announced October 2017.

    Comments: 8 pages, 6 figures. Accepted in the 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2017

    Journal ref: 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, Oct 2017, pp. 580-587

  38. arXiv:1709.01031  [pdf, other

    cs.IT

    Coded Computation Against Processing Delays for Virtualized Cloud-Based Channel Decoding

    Authors: Malihe Aliasgari, Jörg Kliewer, Osvaldo Simeone

    Abstract: The uplink of a cloud radio access network architecture is studied in which decoding at the cloud takes place via network function virtualization on commercial off-the-shelf servers. In order to mitigate the impact of straggling decoders in this platform, a novel coding strategy is proposed, whereby the cloud re-encodes the received frames via a linear code before distributing them to the decoding… ▽ More

    Submitted 28 August, 2018; v1 submitted 4 September, 2017; originally announced September 2017.

    Comments: 11 pages and 12 figures, Submitted

    MSC Class: 68P30

  39. arXiv:1706.08172  [pdf, ps, other

    cs.IT

    Strong Converses Are Just Edge Removal Properties

    Authors: Oliver Kosut, Joerg Kliewer

    Abstract: This paper explores the relationship between two ideas in network information theory: edge removal and strong converses. Edge removal properties state that if an edge of small capacity is removed from a network, the capacity region does not change too much. Strong converses state that, for rates outside the capacity region, the probability of error converges to 1 as the blocklength goes to infinit… ▽ More

    Submitted 11 December, 2018; v1 submitted 25 June, 2017; originally announced June 2017.

    Comments: (v4) Addition of Table I clarifying notation, corrected proof of Proposition 3, and other minor improvements

  40. Strong Coordination over Noisy Channels: Is Separation Sufficient?

    Authors: Sarah A. Obead, Badri N. Vellambi, Jörg Kliewer

    Abstract: We study the problem of strong coordination of actions of two agents $X$ and $Y$ that communicate over a noisy communication channel such that the actions follow a given joint probability distribution. We propose two novel schemes for this noisy strong coordination problem, and derive inner bounds for the underlying strong coordination capacity region. The first scheme is a joint coordination-chan… ▽ More

    Submitted 27 April, 2017; originally announced April 2017.

    Comments: 9 pages, 4 figures. An extended version of a paper accepted for the IEEE International Symposium on Information Theory (ISIT), 2017

    Journal ref: IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, June 2017, pp. 2840-2844

  41. An Equivalence Between Secure Network and Index Coding

    Authors: Lawrence Ong, Badri N. Vellambi, Jörg Kliewer, Phee Lep Yeoh

    Abstract: We extend the equivalence between network coding and index coding by Effros, El Rouayheb, and Langberg to the secure communication setting in the presence of an eavesdropper. Specifically, we show that the most general versions of secure network-coding setup by Chan and Grant and the secure index-coding setup by Dau, Skachek, and Chee, which also include the randomised encoding setting, are equiva… ▽ More

    Submitted 15 February, 2017; originally announced February 2017.

    Journal ref: Proceedings of the 2016 IEEE Globecom Workshop on Network Coding and Applications (NetCod), Washington, USA, Dec. 4-8, 2016

  42. arXiv:1608.08474  [pdf, other

    cs.IT

    Empirical and Strong Coordination via Soft Covering with Polar Codes

    Authors: Remi A. Chou, Matthieu Bloch, Joerg Kliewer

    Abstract: We design polar codes for empirical coordination and strong coordination in two-node networks. Our constructions hinge on the fact that polar codes enable explicit low-complexity schemes for soft covering. We leverage this property to propose explicit and low-complexity coding schemes that achieve the capacity regions of both empirical coordination and strong coordination for sequences of actions… ▽ More

    Submitted 6 June, 2018; v1 submitted 30 August, 2016; originally announced August 2016.

    Comments: 14 pages, two-column, 5 figures, accepted to IEEE Transactions on Information Theory

  43. Coded Network Function Virtualization: Fault Tolerance via In-Network Coding

    Authors: Ali Al-Shuwaili, Osvaldo Simeone, Joerg Kliewer, Petar Popovski

    Abstract: Network Function Virtualization (NFV) prescribes the instantiation of network functions on general-purpose network devices, such as servers and switches. While yielding a more flexible and cost-effective network architecture, NFV is potentially limited by the fact that commercial off-the-shelf hardware is less reliable than the dedicated network elements used in conventional cellular deployments.… ▽ More

    Submitted 16 September, 2016; v1 submitted 12 August, 2016; originally announced August 2016.

    Comments: 4 pages, 4 figures. To appear in IEEE Wireless Communication Letter

  44. Strong Coordination over Multi-hop Line Networks

    Authors: Badri N Vellambi, Joerg Kliewer, Matthieu Bloch

    Abstract: We analyze the problem of strong coordination over a multi-hop line network in which the node initiating the coordination is a terminal network node. We assume that each node has access to a certain amount of randomness that is local to the node, and that the nodes share some common randomness, which are used together with explicit hop-by-hop communication to achieve strong coordination. We derive… ▽ More

    Submitted 8 April, 2016; v1 submitted 29 February, 2016; originally announced February 2016.

    Comments: 35 pages, 9 Figures, 4 Tables. A part of this work were published in the 2015 IEEE Information Theory Workshop, and a part was accepted for publication in the 50th Annual Conference on Information Sciences and Systems

  45. arXiv:1602.06902  [pdf, other

    cs.IT

    Lossy Compression with Near-uniform Encoder Outputs

    Authors: Badri N Vellambi, Joerg Kliewer, Matthieu Bloch

    Abstract: It is well known that lossless compression of a discrete memoryless source with near-uniform encoder output is possible at a rate above its entropy if and only if the encoder is randomized. This work focuses on deriving conditions for near-uniform encoder output(s) in the Wyner-Ziv and the distributed lossy compression problems. We show that in the Wyner-Ziv problem, near-uniform encoder output an… ▽ More

    Submitted 9 July, 2016; v1 submitted 22 February, 2016; originally announced February 2016.

    Comments: Submitted to the 2016 IEEE International Symposium on Information Theory (11 Pages, 3 Figures)

  46. Secure Index Coding: Existence and Construction

    Authors: Lawrence Ong, Badri N. Vellambi, Phee Lep Yeoh, Jörg Kliewer, **hong Yuan

    Abstract: We investigate the construction of weakly-secure index codes for a sender to send messages to multiple receivers with side information in the presence of an eavesdropper. We derive a sufficient and necessary condition for the existence of index codes that are secure against an eavesdropper with access to any subset of messages of cardinality $t$, for any fixed $t$. In contrast to the benefits of u… ▽ More

    Submitted 31 May, 2016; v1 submitted 2 February, 2016; originally announced February 2016.

    Comments: Author final manuscript (to be presented at the 2016 IEEE International Symposium on Information Theory)

  47. arXiv:1509.03937  [pdf, other

    cs.IT q-bio.NC

    An Information Theoretic Approach Towards Assessing Perceptual Audio Quality using EEG

    Authors: Ketan Mehta, Jörg Kliewer

    Abstract: In this paper, we propose a novel information theoretic model to interpret the entire "transmission chain" comprising stimulus generation, brain processing by the human subject, and the electroencephalograph (EEG) response measurements as a nonlinear, time-varying communication channel with memory. We use mutual information (MI) as a measure to assess audio quality perception by directly measuring… ▽ More

    Submitted 13 September, 2015; originally announced September 2015.

    Comments: 29 pages, 10 figures, IEEE Transactions on Molecular, Biological and Multi-scale Communications

  48. arXiv:1508.07920  [pdf, other

    cs.IT

    Coding Schemes for Achieving Strong Secrecy at Negligible Cost

    Authors: Remi A. Chou, Badri Vellambi, Matthieu Bloch, Joerg Kliewer

    Abstract: We study the problem of achieving strong secrecy over wiretap channels at negligible cost, in the sense of maintaining the overall communication rate of the same channel without secrecy constraints. Specifically, we propose and analyze two source-channel coding architectures, in which secrecy is achieved by multiplexing public and confidential messages. In both cases, our main contribution is to s… ▽ More

    Submitted 5 December, 2016; v1 submitted 31 August, 2015; originally announced August 2015.

    Comments: 15 pages, two-column, 5 figures, accepted to IEEE Transactions on Information Theory

  49. arXiv:1505.07515  [pdf, other

    cs.IT cs.CR

    Communication Efficient Secret Sharing

    Authors: Wentao Huang, Michael Langberg, Joerg Kliewer, Jehoshua Bruck

    Abstract: A secret sharing scheme is a method to store information securely and reliably. Particularly, in a threshold secret sharing scheme, a secret is encoded into $n$ shares, such that any set of at least $t_1$ shares suffice to decode the secret, and any set of at most $t_2 < t_1$ shares reveal no information about the secret. Assuming that each party holds a share and a user wishes to decode the secre… ▽ More

    Submitted 1 April, 2016; v1 submitted 27 May, 2015; originally announced May 2015.

    Comments: submitted to the IEEE Transactions on Information Theory. New references and a new construction added

  50. arXiv:1504.05616  [pdf, ps, other

    cs.IT

    Lossy Compression with Privacy Constraints: Optimality of Polar Codes

    Authors: Farshid Mokhtarinezhad, Joerg Kliewer, Osvaldo Simeone

    Abstract: A lossy source coding problem with privacy constraint is studied in which two correlated discrete sources $X$ and $Y$ are compressed into a reconstruction $\hat{X}$ with some prescribed distortion $D$. In addition, a privacy constraint is specified as the equivocation between the lossy reconstruction $\hat{X}$ and $Y$. This models the situation where a certain amount of source information from one… ▽ More

    Submitted 21 April, 2015; originally announced April 2015.

    Comments: Submitted for publication