Skip to main content

Showing 1–25 of 25 results for author: Rassouli, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2301.11754  [pdf, ps, other

    cs.IT

    Information-Theoretic Privacy-Preserving Schemes Based On Perfect Privacy

    Authors: Borzoo Rassouli, Deniz Gündüz

    Abstract: Consider a pair of random variables $(X,Y)$ distributed according to a given joint distribution $p_{XY}$. A curator wishes to maximally disclose information about $Y$, while limiting the information leakage incurred on $X$. Adopting mutual information to measure both utility and privacy of this information disclosure, the problem is to maximize $I(Y;U)$, subject to $I(X;U)\leqε$, where $U$ denotes… ▽ More

    Submitted 27 January, 2023; originally announced January 2023.

  2. arXiv:2207.11788  [pdf, other

    cs.LG cs.CR cs.IT

    Privacy Against Inference Attacks in Vertical Federated Learning

    Authors: Borzoo Rassouli, Morteza Varasteh, Deniz Gunduz

    Abstract: Vertical federated learning is considered, where an active party, having access to true class labels, wishes to build a classification model by utilizing more features from a passive party, which has no access to the labels, to improve the model accuracy. In the prediction phase, with logistic regression as the classification model, several inference attack techniques are proposed that the adversa… ▽ More

    Submitted 7 September, 2022; v1 submitted 24 July, 2022; originally announced July 2022.

  3. arXiv:2001.10387  [pdf, other

    cs.IT physics.data-an

    An operational information decomposition via synergistic disclosure

    Authors: Fernando Rosas, Pedro Mediano, Borzoo Rassouli, Adam Barrett

    Abstract: Multivariate information decompositions hold promise to yield insight into complex systems, and stand out for their ability to identify synergistic phenomena. However, the adoption of these approaches has been hindered by there being multiple possible decompositions, and no precise guidance for preferring one over the others. At the heart of this disagreement lies the absence of a clear operationa… ▽ More

    Submitted 13 March, 2020; v1 submitted 28 January, 2020; originally announced January 2020.

    Comments: 14 pages, 8 figures

  4. arXiv:1904.01711  [pdf, other

    cs.IT

    Data Disclosure under Perfect Sample Privacy

    Authors: Borzoo Rassouli, Fernando E. Rosas, Deniz Gunduz

    Abstract: Perfect data privacy seems to be in fundamental opposition to the economical and scientific opportunities associated with extensive data exchange. Defying this intuition, this paper develops a framework that allows the disclosure of collective properties of datasets without compromising the privacy of individual data samples. We present an algorithm to build an optimal disclosure strategy/map**,… ▽ More

    Submitted 2 April, 2019; originally announced April 2019.

    Comments: 34 pages, 6 Figures, 1 Table

  5. arXiv:1902.00329  [pdf, other

    cs.IT cs.CR

    Privacy Against Brute-Force Inference Attacks

    Authors: Seyed Ali Osia, Borzoo Rassouli, Hamed Haddadi, Hamid R. Rabiee, Deniz Gündüz

    Abstract: Privacy-preserving data release is about disclosing information about useful data while retaining the privacy of sensitive data. Assuming that the sensitive data is threatened by a brute-force adversary, we define Guessing Leakage as a measure of privacy, based on the concept of guessing. After investigating the properties of this measure, we derive the optimal utility-privacy trade-off via a line… ▽ More

    Submitted 1 February, 2019; originally announced February 2019.

  6. arXiv:1901.01740  [pdf, other

    cs.IT

    SWIPT Signalling over Frequency-Selective Channels with a Nonlinear Energy Harvester: Non-Zero Mean and Asymmetric Inputs

    Authors: Morteza Varasteh, Borzoo Rassouli, Bruno Clerckx

    Abstract: Simultaneous Wireless Information and Power Transfer (SWIPT) over a point-to-point frequency-selective Additive White Gaussian Noise (AWGN) channel is studied. Considering an approximation of the nonlinearity of the harvester, a general form of delivered power in terms of system baseband parameters is derived, which demonstrates the dependency of the delivered power on higher order moment of the b… ▽ More

    Submitted 7 January, 2019; originally announced January 2019.

  7. arXiv:1805.03979  [pdf, other

    cs.IT

    SWIPT Signalling over Complex AWGN Channels with Two Nonlinear Energy Harvester Models

    Authors: Morteza Varasteh, Borzoo Rassouli, Hamdi Joudeh, Bruno Clerckx

    Abstract: Simultaneous Wireless Information and Power Transfer (SWIPT) is subject to nonlinearity at the energy harvester that leads to significant changes to transmit signal designs compared to conventional wireless communications. In this paper, the capacity of a discrete time, memoryless and complex Additive White Gaussian Noise (AWGN) channel in the presence of a nonlinear energy harvester at the receiv… ▽ More

    Submitted 9 May, 2018; originally announced May 2018.

    Comments: Accepted for publication. arXiv admin note: substantial text overlap with arXiv:1712.01226

  8. arXiv:1801.02505  [pdf, other

    cs.IT

    Optimal Utility-Privacy Trade-off with Total Variation Distance as a Privacy Measure

    Authors: Borzoo Rassouli, Deniz Gündüz

    Abstract: The total variation distance is proposed as a privacy measure in an information disclosure scenario when the goal is to reveal some information about available data in return of utility, while retaining the privacy of certain sensitive latent variables from the legitimate receiver. The total variation distance is introduced as a measure of privacy-leakage by showing that: i) it satisfies the post-… ▽ More

    Submitted 4 March, 2019; v1 submitted 5 January, 2018; originally announced January 2018.

    Comments: To appear in IEEE Transactions on Information Forensics and Security (TIFS) arXiv admin note: text overlap with arXiv:1712.08500

  9. arXiv:1712.08500  [pdf, ps, other

    cs.IT

    On Perfect Privacy

    Authors: Borzoo Rassouli, Deniz Gunduz

    Abstract: The problem of private data disclosure is studied from an information theoretic perspective. Considering a pair of dependent random variables $(X,Y)$, where $X$ and $Y$ denote the private and useful data, respectively, the following problem is addressed: What is the maximum information that can be revealed about $Y$ (measured by mutual information $I(Y;U)$, in which $U$ is the revealed data), whil… ▽ More

    Submitted 21 January, 2021; v1 submitted 22 December, 2017; originally announced December 2017.

    Comments: The longer version of the journal paper accepted for publication in IEEE Journal of Selected Areas in Information Theory (JSAIT)

  10. arXiv:1712.01226  [pdf, other

    cs.IT

    On Capacity-Achieving Distributions for Complex AWGN Channels Under Nonlinear Power Constraints and their Applications to SWIPT

    Authors: Morteza Varasteh, Borzoo Rassouli, Bruno Clerckx

    Abstract: The capacity of a complex and discrete-time memoryless additive white Gaussian noise (AWGN) channel under three constraints, namely, input average power, input amplitude and output delivered power is studied. The output delivered power constraint is modelled as the average of linear combination of even moments of the channel input being larger than a threshold. It is shown that the capacity of an… ▽ More

    Submitted 24 April, 2020; v1 submitted 4 December, 2017; originally announced December 2017.

  11. arXiv:1705.06350  [pdf, ps, other

    cs.IT

    Wireless Information and Power Transfer over an AWGN channel: Nonlinearity and Asymmetric Gaussian Signaling

    Authors: Morteza Varasteh, Borzoo Rassouli, Bruno Clerckx

    Abstract: Simultaneous transmission of information and power over a point-to-point flat-fading complex Additive White Gaussian Noise (AWGN) channel is studied. In contrast with the literature that relies on an inaccurate linear model of the energy harvester, an experimentally-validated nonlinear model is considered. A general form of the delivered Direct Current (DC) power in terms of system baseband parame… ▽ More

    Submitted 31 May, 2017; v1 submitted 17 May, 2017; originally announced May 2017.

  12. Gaussian Multiple Access Channels with One-Bit Quantizer at the Receiver

    Authors: Borzoo Rassouli, Morteza Varasteh, Deniz Gunduz

    Abstract: The capacity region of a two-transmitter Gaussian multiple access channel (MAC) under average input power constraints is studied, when the receiver employs a zero-threshold one-bit analog-to-digital converter (ADC). It is proved that the input distributions of the two transmitters that achieve the boundary points of the capacity region are discrete. Based on the position of a boundary point, upper… ▽ More

    Submitted 1 October, 2017; v1 submitted 7 March, 2017; originally announced March 2017.

    Comments: 25 pages, 3 figures, revised version submitted to IEEE Transactions on Information Theory

  13. arXiv:1703.01092  [pdf, other

    cs.IT

    Zero-Delay Source-Channel Coding with a One-Bit ADC Front End and Correlated Side Information at the Receiver

    Authors: Morteza Varasteh, Borzoo Rassouli, Osvaldo Simeone, Deniz Gunduz

    Abstract: Zero-delay transmission of a Gaussian source over an additive white Gaussian noise (AWGN) channel is considered with a one-bit analog-to-digital converter (ADC) front end and a correlated side information at the receiver. The design of the optimal encoder and decoder is studied for two performance criteria, namely, the mean squared error (MSE) distortion and the distortion outage probability (DOP)… ▽ More

    Submitted 17 December, 2019; v1 submitted 3 March, 2017; originally announced March 2017.

    Journal ref: Published at IEEE TRANSACTIONS ON COMMUNICATIONS, DECEMBER 2017

  14. arXiv:1605.03779  [pdf, ps, other

    cs.IT

    Constant Envelope Signaling in MIMO Channels

    Authors: Borzoo Rassouli, Bruno Clerckx

    Abstract: The capacity of the point-to-point vector Gaussian channel under the peak power constraint is not known in general. This paper considers a simpler scenario in which the input signal vector is forced to have a constant envelope (or norm). The capacity-achieving distribution for the non-identity $2\times 2$ MIMO channel when the input vector lies on a circle in $\mathbb{R}^2$ is obtained and is show… ▽ More

    Submitted 12 May, 2016; originally announced May 2016.

    Comments: Submitted to IEEE Trans. on Information Theory July 2015

  15. arXiv:1605.01211  [pdf, ps, other

    cs.IT

    An Upper Bound for the Capacity of Amplitude-Constrained Scalar AWGN Channel

    Authors: Borazon Rassouli, Bruno Clerckx

    Abstract: This paper slightly improves the upper bound in Thangaraj et al. for the capacity of the amplitude-constrained scalar AWGN channel. This improvement makes the upper bound within 0.002 bits of the capacity for $\frac{E_b}{N_0}\leq 2.5$ dB.

    Submitted 4 May, 2016; originally announced May 2016.

    Comments: 4 pages, 2 figures, Accepted for publication in IEEE Comm. Letters

  16. arXiv:1604.06578  [pdf, other

    cs.IT

    Joint Source-Channel Coding with One-Bit ADC Front End

    Authors: Morteza Varasteh, Borzoo Rassouli, Osvaldo Simeone, Deniz Gunduz

    Abstract: Motivated by the practical constraints arising in emerging sensor network and Internet-of-Things (IoT) applications, the zero-delay transmission of a Gaussian measurement over a real single-input multiple-output (SIMO) additive white Gaussian noise (AWGN) channel is studied with a low-resolution analog-to-digital converter (ADC) front end. Joint optimization of the encoder and the decoder map**… ▽ More

    Submitted 31 May, 2017; v1 submitted 22 April, 2016; originally announced April 2016.

    Comments: To be published in Transactions on Information Theory

  17. arXiv:1603.07513  [pdf, ps, other

    cs.IT

    Achievable DoF Regions of MIMO Networks with Imperfect CSIT

    Authors: Chenxi Hao, Borzoo Rassouli, Bruno Clerckx

    Abstract: We focus on a two-receiver Multiple-Input-Multiple-Output (MIMO) Broadcast Channel (BC) and Interference Channel (IC) with an arbitrary number of antennas at each node. We assume an imperfect knowledge of local Channel State Information at the Transmitters (CSIT), whose error decays with the Signal-to-Noise-Ratio. With such configuration, we characterize the achievable Degrees-of-Freedom (DoF) reg… ▽ More

    Submitted 5 June, 2017; v1 submitted 24 March, 2016; originally announced March 2016.

    Comments: accepted to Transactions on Information Theory

  18. Rate Splitting for MIMO Wireless Networks: A Promising PHY-Layer Strategy for LTE Evolution

    Authors: Bruno Clerckx, Hamdi Joudeh, Chenxi Hao, Mingbo Dai, Borzoo Rassouli

    Abstract: MIMO processing plays a central part towards the recent increase in spectral and energy efficiencies of wireless networks. MIMO has grown beyond the original point-to-point channel and nowadays refers to a diverse range of centralized and distributed deployments. The fundamental bottleneck towards enormous spectral and energy efficiency benefits in multiuser MIMO networks lies in a huge demand for… ▽ More

    Submitted 3 March, 2016; originally announced March 2016.

    Comments: accepted to IEEE Communication Magazine, special issue on LTE Evolution

  19. DoF Analysis of the MIMO Broadcast Channel with Alternating/Hybrid CSIT

    Authors: Borzoo Rassouli, Chenxi Hao, Bruno Clerckx

    Abstract: We consider a $K$-user multiple-input single-output (MISO) broadcast channel (BC) where the channel state information (CSI) of user $i(i=1,2,\ldots,K)$ may be instantaneously perfect (P), delayed (D) or not known (N) at the transmitter with probabilities $λ_P^i$, $λ_D^i$ and $λ_N^i$, respectively. In this setting, according to the three possible CSIT for each user, knowledge of the joint CSIT of t… ▽ More

    Submitted 27 January, 2016; originally announced January 2016.

    Comments: 14 pages, accepted for publication in IEEE Trans. on Information Theory. arXiv admin note: substantial text overlap with arXiv:1311.6647

  20. arXiv:1503.00916  [pdf, other

    cs.IT

    DoF Analysis of the K-user MISO Broadcast Channel with Hybrid CSIT

    Authors: Borzoo Rassouli, Chenxi Hao, Bruno Clerckx

    Abstract: We consider a $K$-user multiple-input single-output (MISO) broadcast channel (BC) where the channel state information (CSI) of user $i(i=1,2,\ldots,K)$ may be either instantaneously perfect (P), delayed (D) or not known (N) at the transmitter with probabilities $λ_P^i$, $λ_D^i$ and $λ_N^i$, respectively. In this setting, according to the three possible CSIT for each user, knowledge of the joint CS… ▽ More

    Submitted 3 March, 2015; originally announced March 2015.

    Comments: To appear in ICC 2015

  21. A New Proof for the DoF Region of the MIMO Networks with No CSIT

    Authors: Borzoo Rassouli, Chenxi Hao, Bruno Clerckx

    Abstract: In this paper, a new proof for the degrees of freedom (DoF) region of the K-user multiple-input multiple-output (MIMO) broadcast channel (BC) with no channel state information at the transmitter (CSIT) and perfect channel state information at the receivers (CSIR) is provided. Based on this proof, the capacity region of a certain class of MIMO BC with channel distribution information at the transmi… ▽ More

    Submitted 7 January, 2015; originally announced January 2015.

    Comments: Accepted to IEEE Communications Letters. arXiv admin note: substantial text overlap with arXiv:1401.5676

  22. arXiv:1410.7189  [pdf, ps, other

    cs.IT

    On the Capacity of Vector Gaussian Channels With Bounded Inputs

    Authors: Borzoo Rassouli, Bruno Clerckx

    Abstract: The capacity of a deterministic multiple-input multiple-output (MIMO) channel under the peak and average power constraints is investigated. For the identity channel matrix, the approach of Shamai et al. is generalized to the higher dimension settings to derive the necessary and sufficient conditions for the optimal input probability density function. This approach prevents the usage of the identit… ▽ More

    Submitted 28 September, 2016; v1 submitted 27 October, 2014; originally announced October 2014.

    Comments: 20 pages, 12 figures, accepted for publication in IEEE Trans. on Information Theory

  23. arXiv:1401.5676  [pdf, ps, other

    cs.IT

    A Novel Proof for the DoF Region of the MIMO Broadcast Channel with No CSIT

    Authors: Borzoo Rassouli, Chenxi Hao, Bruno Clerckx

    Abstract: In this paper, a new proof for the degrees of freedom (DoF) region of the K-user multiple-input multiple-output (MIMO) broadcast channel (BC) with no channel state information at the transmitter (CSIT) and perfect channel state information at the receivers (CSIR) is provided. Based on this proof, the capacity region of a certain class of MIMO BC with channel distribution information at the transmi… ▽ More

    Submitted 24 January, 2014; v1 submitted 22 January, 2014; originally announced January 2014.

    Comments: 5 pages, submitted to the IEEE International Symposium on Information Theory 2014

  24. arXiv:1311.6647  [pdf, other

    cs.IT

    DoF Analysis of the K-user MISO Broadcast Channel with Alternating CSIT

    Authors: Borzoo Rassouli, Chenxi Hao, Bruno Clerckx

    Abstract: We consider a $K$-user multiple-input single-output (MISO) broadcast channel (BC) where the channel state information (CSI) of user $i(i=1,2,\ldots,K)$ may be either perfect (P), delayed (D) or not known (N) at the transmitter with probabilities $λ_P^i$, $λ_D^i$ and $λ_N^i$, respectively. In this channel, according to the three possible CSIT for each user, joint CSIT of the $K$ users could have at… ▽ More

    Submitted 26 November, 2013; originally announced November 2013.

    Comments: 24 pages, submitted to IEEE Trans. on Information Theory

  25. arXiv:1310.6669  [pdf, ps, other

    cs.IT

    Degrees-of-Freedom Region of MISO-OFDMA Broadcast Channel with Imperfect CSIT

    Authors: Chenxi Hao, Borzoo Rassouli, Bruno Clerckx

    Abstract: This contribution investigates the Degrees-of-Freedom region of a two-user frequency correlated Multiple-Input-Single-Output (MISO) Broadcast Channel (BC) with imperfect Channel State Information at the transmitter (CSIT). We assume that the system consists of an arbitrary number of subbands, denoted as $L$. Besides, the CSIT state varies across users and subbands. A tight outer-bound is found as… ▽ More

    Submitted 24 October, 2013; originally announced October 2013.

    Comments: Submitted to IEEE Transactions on Information Theory