Skip to main content

Showing 1–16 of 16 results for author: Kurri, G R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.02585  [pdf, ps, other

    cs.IT

    Maximal Guesswork Leakage

    Authors: Gowtham R. Kurri, Malhar Managoli, Vinod M. Prabhakaran

    Abstract: We introduce the study of information leakage through \emph{guesswork}, the minimum expected number of guesses required to guess a random variable. In particular, we define \emph{maximal guesswork leakage} as the multiplicative decrease, upon observing $Y$, of the guesswork of a randomized function of $X$, maximized over all such randomized functions. We also study a pointwise form of the leakage… ▽ More

    Submitted 4 May, 2024; originally announced May 2024.

    Comments: 6 pages. Extended version of a paper accepted to ISIT 2024

  2. arXiv:2310.18291  [pdf, other

    cs.LG cs.IT stat.ML

    Addressing GAN Training Instabilities via Tunable Classification Losses

    Authors: Monica Welfert, Gowtham R. Kurri, Kyle Otstot, Lalitha Sankar

    Abstract: Generative adversarial networks (GANs), modeled as a zero-sum game between a generator (G) and a discriminator (D), allow generating synthetic data with formal guarantees. Noting that D is a classifier, we begin by reformulating the GAN value function using class probability estimation (CPE) losses. We prove a two-way correspondence between CPE loss GANs and $f$-GANs which minimize $f$-divergences… ▽ More

    Submitted 27 October, 2023; originally announced October 2023.

    Comments: arXiv admin note: text overlap with arXiv:2302.14320

  3. arXiv:2304.07456  [pdf, other

    cs.IT

    Unifying Privacy Measures via Maximal $(α,β)$-Leakage (M$α$beL)

    Authors: Atefeh Gilani, Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar

    Abstract: We introduce a family of information leakage measures called maximal $(α,β)$-leakage (M$α$beL), parameterized by real numbers $α$ and $β$ greater than or equal to 1. The measure is formalized via an operational definition involving an adversary guessing an unknown (randomized) function of the data given the released data. We obtain a simplified computable expression for the measure and show that i… ▽ More

    Submitted 4 April, 2024; v1 submitted 14 April, 2023; originally announced April 2023.

  4. arXiv:2302.14320  [pdf, other

    cs.LG cs.IT stat.ML

    $(α_D,α_G)$-GANs: Addressing GAN Training Instabilities via Dual Objectives

    Authors: Monica Welfert, Kyle Otstot, Gowtham R. Kurri, Lalitha Sankar

    Abstract: In an effort to address the training instabilities of GANs, we introduce a class of dual-objective GANs with different value functions (objectives) for the generator (G) and discriminator (D). In particular, we model each objective using $α$-loss, a tunable classification loss, to obtain $(α_D,α_G)$-GANs, parameterized by $(α_D,α_G)\in (0,\infty]^2$. For sufficiently large number of samples and ca… ▽ More

    Submitted 3 May, 2023; v1 submitted 28 February, 2023; originally announced February 2023.

    Comments: Extended version of a paper accepted to ISIT 2023

  5. arXiv:2211.15453  [pdf, other

    cs.IT

    An Alphabet of Leakage Measures

    Authors: Atefeh Gilani, Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar

    Abstract: We introduce a family of information leakage measures called maximal $α,β$-leakage, parameterized by real numbers $α$ and $β$. The measure is formalized via an operational definition involving an adversary guessing an unknown function of the data given the released data. We obtain a simple, computable expression for the measure and show that it satisfies several basic properties such as monotonici… ▽ More

    Submitted 28 November, 2022; originally announced November 2022.

  6. arXiv:2209.13862  [pdf, other

    cs.IT

    An Operational Approach to Information Leakage via Generalized Gain Functions

    Authors: Gowtham R. Kurri, Lalitha Sankar, Oliver Kosut

    Abstract: We introduce a \emph{gain function} viewpoint of information leakage by proposing \emph{maximal $g$-leakage}, a rich class of operationally meaningful leakage measures that subsumes recently introduced leakage measures -- {maximal leakage} and {maximal $α$-leakage}. In maximal $g$-leakage, the gain of an adversary in guessing an unknown random variable is measured using a {gain function} applied t… ▽ More

    Submitted 7 December, 2023; v1 submitted 28 September, 2022; originally announced September 2022.

    Comments: 27 pages, 1 Figure. New results are added. Some results of this paper were presented at ISIT 2021 and ISIT 2022

  7. arXiv:2205.06393  [pdf, other

    cs.LG cs.IT stat.ML

    $α$-GAN: Convergence and Estimation Guarantees

    Authors: Gowtham R. Kurri, Monica Welfert, Tyler Sypherd, Lalitha Sankar

    Abstract: We prove a two-way correspondence between the min-max optimization of general CPE loss function GANs and the minimization of associated $f$-divergences. We then focus on $α$-GAN, defined via the $α$-loss, which interpolates several GANs (Hellinger, vanilla, Total Variation) and corresponds to the minimization of the Arimoto divergence. We show that the Arimoto divergences induced by $α$-GAN equiva… ▽ More

    Submitted 12 May, 2022; originally announced May 2022.

    Comments: Extended version of a paper accepted to ISIT 2022. 12 pages, 7 figures

  8. arXiv:2202.06040  [pdf, ps, other

    cs.IT

    A Variational Formula for Infinity-Rényi Divergence with Applications to Information Leakage

    Authors: Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar

    Abstract: We present a variational characterization for the Rényi divergence of order infinity. Our characterization is related to guessing: the objective functional is a ratio of maximal expected values of a gain function applied to the probability of correctly guessing an unknown random variable. An important aspect of our variational characterization is that it remains agnostic to the particular gain fun… ▽ More

    Submitted 2 May, 2022; v1 submitted 12 February, 2022; originally announced February 2022.

    Comments: Accepted to ISIT 2022, 6 pages

  9. arXiv:2108.08774  [pdf, ps, other

    cs.IT

    Evaluating Multiple Guesses by an Adversary via a Tunable Loss Function

    Authors: Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar

    Abstract: We consider a problem of guessing, wherein an adversary is interested in knowing the value of the realization of a discrete random variable $X$ on observing another correlated random variable $Y$. The adversary can make multiple (say, $k$) guesses. The adversary's guessing strategy is assumed to minimize $α$-loss, a class of tunable loss functions parameterized by $α$. It has been shown before tha… ▽ More

    Submitted 19 August, 2021; originally announced August 2021.

    Comments: 6 pages

  10. arXiv:2106.05232  [pdf, ps, other

    cs.LG cs.IT stat.ML

    Realizing GANs via a Tunable Loss Function

    Authors: Gowtham R. Kurri, Tyler Sypherd, Lalitha Sankar

    Abstract: We introduce a tunable GAN, called $α$-GAN, parameterized by $α\in (0,\infty]$, which interpolates between various $f$-GANs and Integral Probability Metric based GANs (under constrained discriminator set). We construct $α$-GAN using a supervised loss function, namely, $α$-loss, which is a tunable loss function capturing several canonical losses. We show that $α$-GAN is intimately related to the Ar… ▽ More

    Submitted 18 October, 2021; v1 submitted 9 June, 2021; originally announced June 2021.

    Comments: Extended version of a paper accepted to ITW 2021. 8 pages, 2 figures

  11. Multiple Access Channel Simulation

    Authors: Gowtham R. Kurri, Viswanathan Ramachandran, Sibi Raj B. Pillai, Vinod M. Prabhakaran

    Abstract: We study the problem of simulating a two-user multiple-access channel (MAC) over a multiple access network of noiseless links. Two encoders observe independent and identically distributed (i.i.d.) copies of a source random variable each, while a decoder observes i.i.d. copies of a side-information random variable. There are rate-limited noiseless communication links between each encoder and the de… ▽ More

    Submitted 16 June, 2022; v1 submitted 23 February, 2021; originally announced February 2021.

    Comments: 30 pages, 3 figures

  12. arXiv:2005.05111  [pdf, other

    cs.IT

    Secure Computation to Hide Functions of Inputs

    Authors: Gowtham R. Kurri, Vinod M. Prabhakaran

    Abstract: We consider a two-user secure computation problem in which Alice and Bob communicate interactively in order to compute some deterministic functions of the inputs. The privacy requirement is that each user should not learn any additional information about a function of the inputs other than what can be inferred from its own input and output. For the distribution-free setting, i.e., when the protoco… ▽ More

    Submitted 11 May, 2020; originally announced May 2020.

    Comments: Extended version of a paper to appear at International Symposium on Information Theory (ISIT) 2020. 7 pages, 3 figures

  13. Coordination Through Shared Randomness

    Authors: Gowtham R. Kurri, Vinod M. Prabhakaran, Anand D. Sarwate

    Abstract: We study a distributed sampling problem where a set of processors want to output (approximately) independent and identically distributed samples from a joint distribution with the help of a common message from a coordinator. Each processor has access to a subset of sources from a set of independent sources of "shared" randomness. We consider two cases -- in the "omniscient coordinator setting", th… ▽ More

    Submitted 17 June, 2021; v1 submitted 22 August, 2019; originally announced August 2019.

    Comments: 27 pages, 7 figures. Some results of this paper were presented at ISIT 2018 and ITW 2019. This paper subsumes arXiv:1805.03193

  14. arXiv:1904.03271  [pdf, ps, other

    cs.IT cs.DC math.CO

    Optimal Communication Rates and Combinatorial Properties for Common Randomness Generation

    Authors: Yanjun Han, Kedar Tatwawadi, Gowtham R. Kurri, Zhengqing Zhou, Vinod M. Prabhakaran, Tsachy Weissman

    Abstract: We study common randomness generation problems where $n$ players aim to generate same sequences of random coin flips where some subsets of the players share an independent common coin which can be tossed multiple times, and there is a publicly seen blackboard through which the players communicate with each other. We provide a tight representation of the optimal communication rates via linear progr… ▽ More

    Submitted 6 October, 2021; v1 submitted 5 April, 2019; originally announced April 2019.

    Comments: 17 pages, 10 figures

  15. Interactive Secure Function Computation

    Authors: Deepesh Data, Gowtham R. Kurri, Jithin Ravi, Vinod M. Prabhakaran

    Abstract: We consider interactive computation of randomized functions between two users with the following privacy requirement: the interaction should not reveal to either user any extra information about the other user's input and output other than what can be inferred from the user's own input and output. We also consider the case where privacy is required against only one of the users. For both cases, we… ▽ More

    Submitted 9 March, 2020; v1 submitted 10 December, 2018; originally announced December 2018.

    Comments: 30 pages. Revised based on comments from the reviewers

  16. arXiv:1805.03193  [pdf, other

    cs.IT

    Coordination Using Individually Shared Randomness

    Authors: Gowtham R. Kurri, Vinod M. Prabhakaran, Anand D. Sarwate

    Abstract: Two processors output correlated sequences using the help of a coordinator with whom they individually share independent randomness. For the case of unlimited shared randomness, we characterize the rate of communication required from the coordinator to the processors over a broadcast link. We also give an achievable trade-off between the communication and shared randomness rates.

    Submitted 8 May, 2018; originally announced May 2018.

    Comments: Extended version of a paper accepted for presentation at ISIT 2018. 8 pages, 3 figures