Skip to main content

Showing 1–37 of 37 results for author: Koyluoglu, O O

Searching in archive cs. Search in all archives.
.
  1. arXiv:2010.13829  [pdf, other

    cs.LG

    BEAR: Sketching BFGS Algorithm for Ultra-High Dimensional Feature Selection in Sublinear Memory

    Authors: Amirali Aghazadeh, Vipul Gupta, Alex DeWeese, O. Ozan Koyluoglu, Kannan Ramchandran

    Abstract: We consider feature selection for applications in machine learning where the dimensionality of the data is so large that it exceeds the working memory of the (local) computing machine. Unfortunately, current large-scale sketching algorithms show poor memory-accuracy trade-off due to the irreversible collision and accumulation of the stochastic gradient noise in the sketched domain. Here, we develo… ▽ More

    Submitted 26 May, 2021; v1 submitted 26 October, 2020; originally announced October 2020.

  2. arXiv:2009.11248  [pdf, other

    cs.CR cs.IT cs.LG stat.ML

    FastSecAgg: Scalable Secure Aggregation for Privacy-Preserving Federated Learning

    Authors: Swanand Kadhe, Nived Rajaraman, O. Ozan Koyluoglu, Kannan Ramchandran

    Abstract: Recent attacks on federated learning demonstrate that kee** the training data on clients' devices does not provide sufficient privacy, as the model parameters shared by clients can leak information about their training data. A 'secure aggregation' protocol enables the server to aggregate clients' models in a privacy-preserving manner. However, existing secure aggregation protocols incur high com… ▽ More

    Submitted 23 September, 2020; originally announced September 2020.

    Comments: Shorter version accepted in ICML Workshop on Federated Learning, July 2020, and CCS Workshop on Privacy-Preserving Machine Learning in Practice, November 2020

  3. arXiv:2005.07184  [pdf, other

    cs.IT cs.DC cs.LG

    Communication-Efficient Gradient Coding for Straggler Mitigation in Distributed Learning

    Authors: Swanand Kadhe, O. Ozan Koyluoglu, Kannan Ramchandran

    Abstract: Distributed implementations of gradient-based methods, wherein a server distributes gradient computations across worker machines, need to overcome two limitations: delays caused by slow running machines called 'stragglers', and communication overheads. Recently, Ye and Abbe [ICML 2018] proposed a coding-theoretic paradigm to characterize a fundamental trade-off between computation load per worker,… ▽ More

    Submitted 14 May, 2020; originally announced May 2020.

    Comments: Shorter version accepted in 2020 IEEE International Symposium on Information Theory (ISIT)

  4. arXiv:1907.00598  [pdf, ps, other

    cs.IT cs.CR

    On an Equivalence Between Single-Server PIR with Side Information and Locally Recoverable Codes

    Authors: Swanand Kadhe, Anoosheh Heidarzadeh, Alex Sprintson, O. Ozan Koyluoglu

    Abstract: Private Information Retrieval (PIR) problem has recently attracted a significant interest in the information-theory community. In this problem, a user wants to privately download one or more messages belonging to a database with copies stored on a single or multiple remote servers. In the single server scenario, the user must have prior side information, i.e., a subset of messages unknown to the s… ▽ More

    Submitted 1 July, 2019; originally announced July 2019.

  5. arXiv:1904.13373  [pdf, ps, other

    cs.IT cs.DC cs.LG stat.ML

    Gradient Coding Based on Block Designs for Mitigating Adversarial Stragglers

    Authors: Swanand Kadhe, O. Ozan Koyluoglu, Kannan Ramchandran

    Abstract: Distributed implementations of gradient-based methods, wherein a server distributes gradient computations across worker machines, suffer from slow running machines, called 'stragglers'. Gradient coding is a coding-theoretic framework to mitigate stragglers by enabling the server to recover the gradient sum in the presence of stragglers. 'Approximate gradient codes' are variants of gradient codes t… ▽ More

    Submitted 30 April, 2019; originally announced April 2019.

    Comments: Shorter version accepted in 2019 IEEE International Symposium on Information Theory (ISIT)

  6. arXiv:1712.04602  [pdf, other

    q-bio.NC cs.IT cs.LG cs.NE

    On the organization of grid and place cells: Neural de-noising via subspace learning

    Authors: David M. Schwartz, O. Ozan Koyluoglu

    Abstract: Place cells in the hippocampus are active when an animal visits a certain location (referred to as a place field) within an environment. Grid cells in the medial entorhinal cortex (MEC) respond at multiple locations, with firing fields that form a periodic and hexagonal tiling of the environment. The joint activity of grid and place cell populations, as a function of location, forms a neural code… ▽ More

    Submitted 15 May, 2018; v1 submitted 12 December, 2017; originally announced December 2017.

  7. Vulnerabilities of Massive MIMO Systems Against Pilot Contamination Attacks

    Authors: Berk Akgun, Marwan Krunz, O. Ozan Koyluoglu

    Abstract: We consider a single-cell massive MIMO system in which a base station (BS) with a large number of antennas transmits simultaneously to several single-antenna users in the presence of an attacker.The BS acquires the channel state information (CSI) based on uplink pilot transmissions. In this work, we demonstrate the vulnerability of CSI estimation phase to malicious attacks. For that purpose, we st… ▽ More

    Submitted 8 October, 2017; originally announced October 2017.

  8. arXiv:1703.00428  [pdf, other

    cs.NI cs.IT

    Repair Strategies for Storage on Mobile Clouds

    Authors: Gokhan Calis, Swetha Shivaramaiah, O. Ozan Koyluoglu, Loukas Lazos

    Abstract: We study the data reliability problem for a community of devices forming a mobile cloud storage system. We consider the application of regenerating codes for file maintenance within a geographically-limited area. Such codes require lower bandwidth to regenerate lost data fragments compared to file replication or reconstruction. We investigate threshold-based repair strategies where data repair is… ▽ More

    Submitted 1 March, 2017; originally announced March 2017.

    Comments: 23 pages, 11 figures

  9. arXiv:1701.06187  [pdf, other

    cs.IT

    Joint secrecy over the K-Transmitter Multiple Access Channel

    Authors: Yanling Chen, O. Ozan Koyluoglu, A. J. Han Vinck

    Abstract: This paper studies the problem of secure communication over a K-transmitter multiple access channel in the presence of an external eavesdropper, subject to a joint secrecy constraint (i.e., information leakage rate from the collection of K messages to an eavesdropper is made vanishing). As a result, we establish the joint secrecy achievable rate region. To this end, our results build upon two tech… ▽ More

    Submitted 22 January, 2017; originally announced January 2017.

    Comments: 6 pages, 1 figure

    MSC Class: 94A15; 97E60

  10. arXiv:1605.04989  [pdf, other

    cs.IT

    Architecture-aware Coding for Distributed Storage: Repairable Block Failure Resilient Codes

    Authors: Gokhan Calis, O. Ozan Koyluoglu

    Abstract: In large scale distributed storage systems (DSS) deployed in cloud computing, correlated failures resulting in simultaneous failure (or, unavailability) of blocks of nodes are common. In such scenarios, the stored data or a content of a failed node can only be reconstructed from the available live nodes belonging to the available blocks. To analyze the resilience of the system against such block f… ▽ More

    Submitted 21 February, 2017; v1 submitted 16 May, 2016; originally announced May 2016.

    Comments: Updated with the latest version

  11. Exploiting Full-duplex Receivers for Achieving Secret Communications in Multiuser MISO Networks

    Authors: Berk Akgun, O. Ozan Koyluoglu, Marwan Krunz

    Abstract: We consider a broadcast channel, in which a multi-antenna transmitter (Alice) sends $K$ confidential information signals to $K$ legitimate users (Bobs) in the presence of $L$ eavesdroppers (Eves). Alice uses MIMO precoding to generate the information signals along with her own (Tx-based) friendly jamming. Interference at each Bob is removed by MIMO zero-forcing. This, however, leaves a "vulnerabil… ▽ More

    Submitted 9 January, 2017; v1 submitted 6 April, 2016; originally announced April 2016.

    Comments: IEEE Transactions on Communications

  12. arXiv:1603.04822  [pdf, other

    cs.IT

    Centralized Repair of Multiple Node Failures with Applications to Communication Efficient Secret Sharing

    Authors: Ankit Singh Rawat, O. Ozan Koyluoglu, Sriram Vishwanath

    Abstract: This paper considers a distributed storage system, where multiple storage nodes can be reconstructed simultaneously at a centralized location. This centralized multi-node repair (CMR) model is a generalization of regenerating codes that allow for bandwidth-efficient repair of a single failed node. This work focuses on the trade-off between the amount of data stored and repair bandwidth in this CMR… ▽ More

    Submitted 15 March, 2016; originally announced March 2016.

  13. arXiv:1601.06362  [pdf, ps, other

    cs.IT

    Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes

    Authors: Ankit Singh Rawat, O. Ozan Koyluoglu, Sriram Vishwanath

    Abstract: This paper presents a construction for high-rate MDS codes that enable bandwidth-efficient repair of a single node. Such MDS codes are also referred to as the minimum storage regenerating (MSR) codes in the distributed storage literature. The construction presented in this paper generates MSR codes for all possible number of helper nodes $d$ as $d$ is a design parameter in the construction. Furthe… ▽ More

    Submitted 24 January, 2016; originally announced January 2016.

  14. arXiv:1511.09070  [pdf, other

    cs.IT

    Individual Secrecy for the Broadcast Channel

    Authors: Yanling Chen, O. Ozan Koyluoglu, Aydin Sezgin

    Abstract: This paper studies the problem of secure communication over broadcast channels under the individual secrecy constraints. That is, the transmitter wants to send two independent messages to two legitimate receivers in the presence of an eavesdropper, while kee** the eavesdropper ignorant of each message (i.e., the information leakage from each message to the eavesdropper is made vanishing). Buildi… ▽ More

    Submitted 29 November, 2015; originally announced November 2015.

    Comments: 49 pages, 13 figures, this paper was presented in part at IEEE International Symposium on Information Theory, Hong Kong, Jun. 2015

  15. arXiv:1511.01212  [pdf, ps, other

    cs.IT

    Hierarchical Polar Coding for Achieving Secrecy over Fading Wiretap Channels without any Instantaneous CSI

    Authors: Hongbo Si, O. Ozan Koyluoglu, Sriram Vishwanath

    Abstract: This paper presents a polar coding scheme to achieve secrecy in block fading binary symmetric wiretap channels without the knowledge of instantaneous channel state information (CSI) at the transmitter. For this model, a coding scheme that hierarchically utilizes polar codes is presented. In particular, on polarization of different binary symmetric channels over different fading blocks, each channe… ▽ More

    Submitted 4 November, 2015; originally announced November 2015.

  16. arXiv:1505.05481  [pdf, other

    cs.IT

    Expansion Coding for Channel and Source Coding

    Authors: Hongbo Si, O. Ozan Koyluoglu, Kumar Appaiah, Sriram Vishwanath

    Abstract: A general method of coding over expansion is proposed,which allows one to reduce the highly non-trivial problems of coding over analog channels and compressing analog sources to a set of much simpler subproblems, coding over discrete channels and compressing discrete sources. More specifically, the focus of this paper is on the additive exponential noise (AEN) channel, and lossy compression of exp… ▽ More

    Submitted 20 May, 2015; originally announced May 2015.

    Comments: 42 pages, 10 figures

  17. arXiv:1501.07547  [pdf, ps, other

    cs.IT

    Individual secrecy for broadcast channels with receiver side information

    Authors: Yanling Chen, O. Ozan Koyluoglu, Aydin Sezgin

    Abstract: This paper studies the problem of secure communication over the broadcast channel with receiver side information under the lens of individual secrecy constraints. That is, the transmitter wants to send two independent messages to two receivers which have, respectively, the desired message of the other receiver as side information, while kee** the eavesdropper ignorant of each message (i.e., the… ▽ More

    Submitted 25 February, 2015; v1 submitted 29 January, 2015; originally announced January 2015.

  18. arXiv:1406.7264  [pdf, other

    cs.IT

    Repairable Block Failure Resilient Codes

    Authors: Gokhan Calis, O. Ozan Koyluoglu

    Abstract: In large scale distributed storage systems (DSS) deployed in cloud computing, correlated failures resulting in simultaneous failure (or, unavailability) of blocks of nodes are common. In such scenarios, the stored data or a content of a failed node can only be reconstructed from the available live nodes belonging to available blocks. To analyze the resilience of the system against such block failu… ▽ More

    Submitted 27 June, 2014; originally announced June 2014.

  19. arXiv:1311.4941  [pdf, ps, other

    cs.IT

    Polar Coding for Fading Channels: Binary and Exponential Channel Cases

    Authors: Hongbo Si, O. Ozan Koyluoglu, Sriram Vishwanath

    Abstract: This work presents a polar coding scheme for fading channels, focusing primarily on fading binary symmetric and additive exponential noise channels. For fading binary symmetric channels, a hierarchical coding scheme is presented, utilizing polar coding both over channel uses and over fading blocks. The receiver uses its channel state information (CSI) to distinguish states, thus constructing an ov… ▽ More

    Submitted 15 August, 2014; v1 submitted 19 November, 2013; originally announced November 2013.

    Comments: 31 pages, 8 figures, journal

  20. arXiv:1308.2338  [pdf, other

    cs.IT

    Lossy Compression of Exponential and Laplacian Sources using Expansion Coding

    Authors: Hongbo Si, O. Ozan Koyluoglu, Sriram Vishwanath

    Abstract: A general method of source coding over expansion is proposed in this paper, which enables one to reduce the problem of compressing an analog (continuous-valued source) to a set of much simpler problems, compressing discrete sources. Specifically, the focus is on lossy compression of exponential and Laplacian sources, which is subsequently expanded using a finite alphabet prior to being quantized.… ▽ More

    Submitted 10 August, 2013; originally announced August 2013.

    Comments: 8 pages, 3 figures

  21. arXiv:1304.3850  [pdf, other

    cs.IT

    Polar Coding for Fading Channels

    Authors: Hongbo Si, O. Ozan Koyluoglu, Sriram Vishwanath

    Abstract: A polar coding scheme for fading channels is proposed in this paper. More specifically, the focus is Gaussian fading channel with a BPSK modulation technique, where the equivalent channel could be modeled as a binary symmetric channel with varying cross-over probabilities. To deal with variable channel states, a coding scheme of hierarchically utilizing polar codes is proposed. In particular, by o… ▽ More

    Submitted 13 April, 2013; originally announced April 2013.

    Comments: 6 pages, 4 figures, conference

  22. arXiv:1302.0744  [pdf, other

    cs.IT

    Explicit MBR All-Symbol Locality Codes

    Authors: Govinda M. Kamath, Natalia Silberstein, N. Prakash, Ankit S. Rawat, V. Lalitha, O. Ozan Koyluoglu, P. Vijay Kumar, Sriram Vishwanath

    Abstract: Node failures are inevitable in distributed storage systems (DSS). To enable efficient repair when faced with such failures, two main techniques are known: Regenerating codes, i.e., codes that minimize the total repair bandwidth; and codes with locality, which minimize the number of nodes participating in the repair process. This paper focuses on regenerating codes with locality, using pre-coding… ▽ More

    Submitted 27 May, 2013; v1 submitted 4 February, 2013; originally announced February 2013.

  23. arXiv:1301.6331  [pdf, other

    cs.IT

    Optimal Locally Repairable Codes via Rank-Metric Codes

    Authors: Natalia Silberstein, Ankit Singh Rawat, O. Ozan Koyluoglu, Sriram Vishwanath

    Abstract: This paper presents a new explicit construction for locally repairable codes (LRCs) for distributed storage systems which possess all-symbols locality and maximal possible minimum distance, or equivalently, can tolerate the maximal number of node failures. This construction, based on maximum rank distance (MRD) Gabidulin codes, provides new optimal vector and scalar LRCs. In addition, the paper al… ▽ More

    Submitted 27 January, 2013; originally announced January 2013.

  24. Optimal Locally Repairable and Secure Codes for Distributed Storage Systems

    Authors: Ankit Singh Rawat, O. Ozan Koyluoglu, Natalia Silberstein, Sriram Vishwanath

    Abstract: This paper aims to go beyond resilience into the study of security and local-repairability for distributed storage systems (DSS). Security and local-repairability are both important as features of an efficient storage system, and this paper aims to understand the trade-offs between resilience, security, and local-repairability in these systems. In particular, this paper first investigates security… ▽ More

    Submitted 6 August, 2013; v1 submitted 25 October, 2012; originally announced October 2012.

    Comments: Submitted to IEEE Transactions on Information Theory

  25. arXiv:1210.3664  [pdf, other

    cs.IT

    Secure Cooperative Regenerating Codes for Distributed Storage Systems

    Authors: O. Ozan Koyluoglu, Ankit Singh Rawat, Sriram Vishwanath

    Abstract: Regenerating codes enable trading off repair bandwidth for storage in distributed storage systems (DSS). Due to their distributed nature, these systems are intrinsically susceptible to attacks, and they may also be subject to multiple simultaneous node failures. Cooperative regenerating codes allow bandwidth efficient repair of multiple simultaneous node failures. This paper analyzes storage syste… ▽ More

    Submitted 8 July, 2014; v1 submitted 12 October, 2012; originally announced October 2012.

  26. arXiv:1202.1572  [pdf, ps, other

    cs.IT

    Expansion coding: Achieving the capacity of an AEN channel

    Authors: O. Ozan Koyluoglu, Kumar Appaiah, Hongbo Si, Sriram Vishwanath

    Abstract: A general method of coding over expansions is proposed, which allows one to reduce the highly non-trivial problem of coding over continuous channels to a much simpler discrete ones. More specifically, the focus is on the additive exponential noise (AEN) channel, for which the (binary) expansion of the (exponential) noise random variable is considered. It is shown that each of the random variables… ▽ More

    Submitted 7 February, 2012; originally announced February 2012.

  27. arXiv:1112.4090  [pdf, ps, other

    cs.IT cs.CR

    State Amplification Subject To Masking Constraints

    Authors: O. Ozan Koyluoglu, Rajiv Soundararajan, Sriram Vishwanath

    Abstract: This paper considers a state dependent broadcast channel with one transmitter, Alice, and two receivers, Bob and Eve. The problem is to effectively convey ("amplify") the channel state sequence to Bob while "masking" it from Eve. The extent to which the state sequence cannot be masked from Eve is referred to as leakage. This can be viewed as a secrecy problem, where we desire that the channel stat… ▽ More

    Submitted 23 October, 2015; v1 submitted 17 December, 2011; originally announced December 2011.

    Comments: Revised version

  28. arXiv:1006.0778  [pdf, ps, other

    cs.IT

    The Two-Way Wiretap Channel: Achievable Regions and Experimental Results

    Authors: Aly El Gamal, O. Ozan Koyluoglu, Moustafa Youssef, Hesham El Gamal

    Abstract: This work considers the two-way wiretap channel in which two legitimate users, Alice and Bob, wish to exchange messages securely in the presence of a passive eavesdropper Eve. In the full-duplex scenario, where each node can transmit and receive simultaneously, we obtain new achievable secrecy rate regions based on the idea of allowing the two users to jointly optimize their channel prefixing dist… ▽ More

    Submitted 1 October, 2011; v1 submitted 4 June, 2010; originally announced June 2010.

    Comments: submitted to IEEE Transactions on Information Theory

  29. arXiv:1003.1422  [pdf, ps, other

    cs.IT cs.CR

    Polar Coding for Secure Transmission and Key Agreement

    Authors: O. Ozan Koyluoglu, Hesham El Gamal

    Abstract: Wyner's work on wiretap channels and the recent works on information theoretic security are based on random codes. Achieving information theoretical security with practical coding schemes is of definite interest. In this note, the attempt is to overcome this elusive task by employing the polar coding technique of Arıkan. It is shown that polar codes achieve non-trivial perfect secrecy rates for bi… ▽ More

    Submitted 6 March, 2010; originally announced March 2010.

    Comments: Proceedings of the 21st Annual IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC 2010), Sept. 2010, Istanbul, Turkey

  30. arXiv:0908.0898  [pdf, ps, other

    cs.IT cs.CR

    On Secrecy Capacity Scaling in Wireless Networks

    Authors: O. Ozan Koyluoglu, C. Emre Koksal, Hesham El Gamal

    Abstract: This work studies the achievable secure rate per source-destination pair in wireless networks. First, a path loss model is considered, where the legitimate and eavesdropper nodes are assumed to be placed according to Poisson point processes with intensities $λ$ and $λ_e$, respectively. It is shown that, as long as $λ_e/λ=o((\log n)^{-2})$, almost all of the nodes achieve a perfectly secure rate of… ▽ More

    Submitted 9 April, 2010; v1 submitted 6 August, 2009; originally announced August 2009.

    Comments: Submitted to IEEE Transactions on Information Theory

  31. Opportunistic Secrecy with a Strict Delay Constraint

    Authors: Karim Khalil, O. Ozan Koyluoglu, Hesham El Gamal, Moustafa Youssef

    Abstract: We investigate the delay limited secrecy capacity of the flat fading channel under two different assumptions on the available transmitter channel state information (CSI). The first scenario assumes perfect prior knowledge of both the main and eavesdropper channel gains. Here, upper and lower bounds on the delay limited secrecy capacity are derived, and shown to be tight in the high signal-to-noi… ▽ More

    Submitted 20 July, 2009; originally announced July 2009.

    Comments: Submitted to IEEE Transactions on Information Theory

  32. arXiv:0905.3934  [pdf, ps, other

    cs.IT

    Cooperative encoding for secrecy in interference channels

    Authors: O. Ozan Koyluoglu, Hesham El Gamal

    Abstract: This paper investigates the fundamental performance limits of the two-user interference channel in the presence of an external eavesdropper. In this setting, we construct an inner bound, to the secrecy capacity region, based on the idea of cooperative encoding in which the two users cooperatively design their randomized codebooks and jointly optimize their channel prefixing distributions. Our achi… ▽ More

    Submitted 21 April, 2011; v1 submitted 24 May, 2009; originally announced May 2009.

    Comments: Submitted to IEEE Transactions on Information Theory (submitted May 2009 and revised September 2010)

  33. arXiv:0905.0036  [pdf, ps, other

    cs.IT

    On the Secrecy Rate Region for the Interference Channel

    Authors: O. Ozan Koyluoglu, Hesham El Gamal

    Abstract: This paper studies interference channels with security constraints. The existence of an external eavesdropper in a two-user interference channel is assumed, where the network users would like to secure their messages from the external eavesdropper. The cooperative binning and channel prefixing scheme is proposed for this system model which allows users to cooperatively add randomness to the chan… ▽ More

    Submitted 30 April, 2009; originally announced May 2009.

    Comments: Proceedings of the 2008 IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2008), Cannes, France, Sept. 2008

  34. On the Delay Limited Secrecy Capacity of Fading Channels

    Authors: Karim Khalil, Moustafa Youssef, O. Ozan Koyluoglu, Hesham El Gamal

    Abstract: In this paper, the delay limited secrecy capacity of the flat fading channel is investigated under two different assumptions on the available transmitter channel state information (CSI). The first scenario assumes perfect prior knowledge of both the main and eavesdropper channel gains. Here, upper and lower bounds on the secure delay limited capacity are derived and shown to be tight in the high… ▽ More

    Submitted 30 April, 2009; v1 submitted 19 January, 2009; originally announced January 2009.

    Comments: Proceedings of the 2009 IEEE International Symposium on Information Theory (ISIT 2009), Seoul, Korea, June 28-July 3, 2009

  35. arXiv:0810.2953  [pdf, ps, other

    cs.IT

    On Power Control and Frequency Reuse in the Two User Cognitive Channel

    Authors: Onur Ozan Koyluoglu, Hesham El Gamal

    Abstract: This paper considers the generalized cognitive radio channel where the secondary user is allowed to reuse the frequency during both the idle and active periods of the primary user, as long as the primary rate remains the same. In this setting, the optimal power allocation policy with single-input single-output (SISO) primary and secondary channels is explored. Interestingly, the offered gain res… ▽ More

    Submitted 16 October, 2008; originally announced October 2008.

    Comments: Submitted to IEEE Transactions on Wireless Communications (revised on October 16, 2008)

  36. Interference Alignment for Secrecy

    Authors: Onur Ozan Koyluoglu, Hesham El Gamal, Lifeng Lai, H. Vincent Poor

    Abstract: This paper studies the frequency/time selective $K$-user Gaussian interference channel with secrecy constraints. Two distinct models, namely the interference channel with confidential messages and the one with an external eavesdropper, are analyzed. The key difference between the two models is the lack of channel state information (CSI) about the external eavesdropper. Using interference alignme… ▽ More

    Submitted 7 October, 2008; originally announced October 2008.

    Comments: Submitted to IEEE Transactions on Information Theory

  37. On the Secure Degrees of Freedom in the K-User Gaussian Interference Channel

    Authors: Onur Ozan Koyluoglu, Hesham El Gamal, Lifeng Lai, H. Vincent Poor

    Abstract: This paper studies the K-user Gaussian interference channel with secrecy constraints. Two distinct network models, namely the interference channel with confidential messages and the one with an external eavesdropper, are analyzed. Using interference alignment along with secrecy pre-coding at each transmitter, it is shown that each user in the network can achieve non-zero secure Degrees of Freedo… ▽ More

    Submitted 9 May, 2008; originally announced May 2008.

    Comments: Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008