Skip to main content

Showing 1–11 of 11 results for author: Yakimenka, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.07316  [pdf, other

    cs.LG cs.IT

    VALID: a Validated Algorithm for Learning in Decentralized Networks with Possible Adversarial Presence

    Authors: Mayank Bakshi, Sara Ghasvarianjahromi, Yauhen Yakimenka, Allison Beemer, Oliver Kosut, Joerg Kliewer

    Abstract: We introduce the paradigm of validated decentralized learning for undirected networks with heterogeneous data and possible adversarial infiltration. We require (a) convergence to a global empirical loss minimizer when adversaries are absent, and (b) either detection of adversarial presence of convergence to an admissible consensus irrespective of the adversarial configuration. To this end, we prop… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

    Comments: This is an extended version of the paper at International Symposium on Information Theory 2024

  2. arXiv:2212.03080  [pdf, other

    cs.LG cs.CR cs.IT

    Straggler-Resilient Differentially-Private Decentralized Learning

    Authors: Yauhen Yakimenka, Chung-Wei Weng, Hsuan-Yin Lin, Eirik Rosnes, Jörg Kliewer

    Abstract: We consider the straggler problem in decentralized learning over a logical ring while preserving user data privacy. Especially, we extend the recently proposed framework of differential privacy (DP) amplification by decentralization by Cyffers and Bellet to include overall training latency--comprising both computation and communication latency. Analytical results on both the convergence speed and… ▽ More

    Submitted 28 June, 2024; v1 submitted 6 December, 2022; originally announced December 2022.

    Comments: To appear in the IEEE Journal on Selected Areas in Information Theory (special issue on Information-Theoretic Methods for Trustworthy and Reliable Machine Learning)

  3. arXiv:2111.05160  [pdf, ps, other

    cs.IT

    Optimal Rate-Distortion-Leakage Tradeoff for Single-Server Information Retrieval

    Authors: Yauhen Yakimenka, Hsuan-Yin Lin, Eirik Rosnes, Jörg Kliewer

    Abstract: Private information retrieval protocols guarantee that a user can privately and losslessly retrieve a single file from a database stored across multiple servers. In this work, we propose to simultaneously relax the conditions of perfect retrievability and privacy in order to obtain improved download rates when all files are stored uncoded on a single server. Information leakage is measured in term… ▽ More

    Submitted 6 January, 2022; v1 submitted 9 November, 2021; originally announced November 2021.

    Comments: 14 pages, 3 figures. Accepted for publication in IEEE Journal on Selected Areas in Communications, Special Issue on Private Information Retrieval, Private Coded Computing over Distributed Servers, and Privacy in Distributed Learning

  4. Generative Adversarial User Privacy in Lossy Single-Server Information Retrieval

    Authors: Chung-Wei Weng, Yauhen Yakimenka, Hsuan-Yin Lin, Eirik Rosnes, Joerg Kliewer

    Abstract: We propose to extend the concept of private information retrieval by allowing for distortion in the retrieval process and relaxing the perfect privacy requirement at the same time. In particular, we study the trade-off between download rate, distortion, and user privacy leakage, and show that in the limit of large file sizes this trade-off can be captured via a novel information-theoretical formul… ▽ More

    Submitted 19 October, 2022; v1 submitted 7 December, 2020; originally announced December 2020.

    Comments: Accepted for Publication in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (TIFS)

    Journal ref: IEEE Transactions on Information Forensics and Security, vol. 17, pp. 3495-3510, 2022

  5. arXiv:2001.06320  [pdf, ps, other

    cs.IT

    On the Capacity of Private Monomial Computation

    Authors: Yauhen Yakimenka, Hsuan-Yin Lin, Eirik Rosnes

    Abstract: In this work, we consider private monomial computation (PMC) for replicated noncolluding databases. In PMC, a user wishes to privately retrieve an arbitrary multivariate monomial from a candidate set of monomials in $f$ messages over a finite field $\mathbb F_q$, where $q=p^k$ is a power of a prime $p$ and $k \ge 1$, replicated over $n$ databases. We derive the PMC capacity under a technical condi… ▽ More

    Submitted 17 January, 2020; originally announced January 2020.

    Comments: Accepted for 2020 International Zurich Seminar on Information and Communication

  6. arXiv:1806.05110  [pdf, ps, other

    cs.IT

    Failure Analysis of the Interval-Passing Algorithm for Compressed Sensing

    Authors: Yauhen Yakimenka, Eirik Rosnes

    Abstract: In this work, we perform a complete failure analysis of the interval-passing algorithm (IPA) for compressed sensing, an efficient iterative algorithm for reconstructing a $k$-sparse nonnegative $n$-dimensional real signal $\boldsymbol{x}$ from a small number of linear measurements $\boldsymbol{y}$. In particular, we show that the IPA fails to recover $\boldsymbol{x}$ from $\boldsymbol{y}$ if and o… ▽ More

    Submitted 19 December, 2019; v1 submitted 13 June, 2018; originally announced June 2018.

    Comments: Accepted for publication in IEEE Transactions on Information Theory. arXiv admin note: text overlap with arXiv:1607.05001

  7. arXiv:1804.06770  [pdf, other

    cs.IT

    Stop** Redundancy Hierarchy Beyond the Minimum Distance

    Authors: Yauhen Yakimenka, Vitaly Skachek, Irina E. Bocharova, Boris D. Kudryashov

    Abstract: Stop** sets play a crucial role in failure events of iterative decoders over a binary erasure channel (BEC). The $\ell$-th stop** redundancy is the minimum number of rows in the parity-check matrix of a code, which contains no stop** sets of size up to $\ell$. In this work, a notion of coverable stop** sets is defined. In order to achieve maximum-likelihood performance under iterative deco… ▽ More

    Submitted 29 September, 2018; v1 submitted 18 April, 2018; originally announced April 2018.

    Comments: Accepted for publication in IEEE Transactions on Information Theory

    MSC Class: 94B65

  8. arXiv:1707.01025  [pdf, other

    cs.IT

    Distance Properties of Short LDPC Codes and their Impact on the BP, ML and Near-ML Decoding Performance

    Authors: Irina E. Bocharova, Boris D. Kudryashov, Vitaly Skachek, Yauhen Yakimenka

    Abstract: Parameters of LDPC codes, such as minimum distance, stop** distance, stop** redundancy, girth of the Tanner graph, and their influence on the frame error rate performance of the BP, ML and near-ML decoding over a BEC and an AWGN channel are studied. Both random and structured LDPC codes are considered. In particular, the BP decoding is applied to the code parity-check matrices with an increasi… ▽ More

    Submitted 4 July, 2017; originally announced July 2017.

  9. arXiv:1705.09507  [pdf, other

    cs.IT

    BP-LED decoding algorithm for LDPC codes over AWGN channels

    Authors: Irina E. Bocharova, Boris D. Kudryashov, Vitaly Skachek, Yauhen Yakimenka

    Abstract: A new method for low-complexity near-maximum-likelihood (ML) decoding of low-density parity-check (LDPC) codes over the additive white Gaussian noise channel is presented. The proposed method termed belief-propagation--list erasure decoding (BP-LED) is based on erasing carefully chosen unreliable bits performed in case of BP decoding failure. A strategy of introducing erasures into the received ve… ▽ More

    Submitted 26 May, 2017; originally announced May 2017.

    Comments: Submitted to IEEE Transactions on Information Theory

  10. arXiv:1607.05001  [pdf, ps, other

    cs.IT

    On Failing Sets of the Interval-Passing Algorithm for Compressed Sensing

    Authors: Yauhen Yakimenka, Eirik Rosnes

    Abstract: In this work, we analyze the failing sets of the interval-passing algorithm (IPA) for compressed sensing. The IPA is an efficient iterative algorithm for reconstructing a k-sparse nonnegative n-dimensional real signal x from a small number of linear measurements y. In particular, we show that the IPA fails to recover x from y if and only if it fails to recover a corresponding binary vector of the… ▽ More

    Submitted 4 October, 2016; v1 submitted 18 July, 2016; originally announced July 2016.

    Comments: Presented at the 54th Annual Allerton Conference on Communication, Control, and Computing

  11. Refined Upper Bounds on Stop** Redundancy of Binary Linear Codes

    Authors: Yauhen Yakimenka, Vitaly Skachek

    Abstract: The $l$-th stop** redundancy $ρ_l(\mathcal C)$ of the binary $[n, k, d]$ code $\mathcal C$, $1 \le l \le d$, is defined as the minimum number of rows in the parity-check matrix of $\mathcal C$, such that the smallest stop** set is of size at least $l$. The stop** redundancy $ρ(\mathcal C)$ is defined as $ρ_d(\mathcal C)$. In this work, we improve on the probabilistic analysis of stop** red… ▽ More

    Submitted 27 February, 2015; v1 submitted 31 October, 2014; originally announced October 2014.

    Comments: 5 pages; ITW 2015