Skip to main content

Showing 1–50 of 105 results for author: Sadeghi, P

  1. arXiv:2407.11774  [pdf, other

    cs.CL cs.AI

    Sharif-MGTD at SemEval-2024 Task 8: A Transformer-Based Approach to Detect Machine Generated Text

    Authors: Seyedeh Fatemeh Ebrahimi, Karim Akhavan Azari, Amirmasoud Iravani, Arian Qazvini, Pouya Sadeghi, Zeinab Sadat Taghavi, Hossein Sameti

    Abstract: Detecting Machine-Generated Text (MGT) has emerged as a significant area of study within Natural Language Processing. While language models generate text, they often leave discernible traces, which can be scrutinized using either traditional feature-based methods or more advanced neural language models. In this research, we explore the effectiveness of fine-tuning a RoBERTa-base transformer, a pow… ▽ More

    Submitted 16 July, 2024; originally announced July 2024.

    Comments: 8 pages, 3 figures, 2 tables. Proceedings of the 18th International Workshop on Semantic Evaluation (SemEval-2024)

  2. arXiv:2407.01167  [pdf, other

    cs.IT cs.CR

    Information Density Bounds for Privacy

    Authors: Sara Saeidian, Leonhard Grosse, Parastoo Sadeghi, Mikael Skoglund, Tobias J. Oechtering

    Abstract: This paper explores the implications of guaranteeing privacy by imposing a lower bound on the information density between the private and the public data. We introduce an operationally meaningful privacy measure called pointwise maximal cost (PMC) and demonstrate that imposing an upper bound on PMC is equivalent to enforcing a lower bound on the information density. PMC quantifies the information… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  3. arXiv:2406.13569  [pdf, other

    cs.LG cs.AI cs.CR cs.IT

    Bayes' capacity as a measure for reconstruction attacks in federated learning

    Authors: Sayan Biswas, Mark Dras, Pedro Faustini, Natasha Fernandes, Annabelle McIver, Catuscia Palamidessi, Parastoo Sadeghi

    Abstract: Within the machine learning community, reconstruction attacks are a principal attack of concern and have been identified even in federated learning, which was designed with privacy preservation in mind. In federated learning, it has been shown that an adversary with knowledge of the machine learning architecture is able to infer the exact value of a training element given an observation of the wei… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

  4. arXiv:2406.06990  [pdf, ps, other

    cs.IT

    Privacy-Utility Tradeoff Based on $α$-lift

    Authors: Mohammad Amin Zarrabian, Parastoo Sadeghi

    Abstract: Information density and its exponential form, known as lift, play a central role in information privacy leakage measures. $α$-lift is the power-mean of lift, which is tunable between the worst-case measure max-lift ($α=\infty$) and more relaxed versions ($α<\infty$). This paper investigates the optimization problem of the privacy-utility tradeoff (PUT) where $α$-lift and mutual information are pri… ▽ More

    Submitted 20 June, 2024; v1 submitted 11 June, 2024; originally announced June 2024.

    Comments: This version has developed algorithm representations and updated simulation results

  5. arXiv:2405.07151  [pdf, other

    cs.IT

    Group Complete-$\{s\}$ Pliable Index Coding

    Authors: Sina Eghbal, Badri N. Vellambi, Lawrence Ong, Parastoo Sadeghi

    Abstract: This paper introduces a novel class of PICOD($t$) problems referred to as $g$-group complete-$S$ PICOD($t$) problems. It constructs a multi-stage achievability scheme to generate pliable index codes for group complete PICOD problems when $S = \{s\}$ is a singleton set. Using the maximum acyclic induced subgraph bound, lower bounds on the broadcast rate are derived for singleton $S$, which establis… ▽ More

    Submitted 11 May, 2024; originally announced May 2024.

    Comments: Accepted for publication in 2024 IEEE International Symposium on Information Theory

  6. arXiv:2405.00423  [pdf, ps, other

    cs.IT

    $α$-leakage by Rényi Divergence and Sibson Mutual Information

    Authors: Ni Ding, Mohammad Amin Zarrabian, Parastoo Sadeghi

    Abstract: For $\tilde{f}(t) = \exp(\frac{α-1}αt)$, this paper proposes a $\tilde{f}$-mean information gain measure. Rényi divergence is shown to be the maximum $\tilde{f}$-mean information gain incurred at each elementary event $y$ of channel output $Y$ and Sibson mutual information is the $\tilde{f}$-mean of this $Y$-elementary information gain. Both are proposed as $α$-leakage measures, indicating the mos… ▽ More

    Submitted 2 July, 2024; v1 submitted 1 May, 2024; originally announced May 2024.

    Comments: authorship dispute

  7. arXiv:2404.04845  [pdf, other

    cs.CL cs.AI

    SLPL SHROOM at SemEval2024 Task 06: A comprehensive study on models ability to detect hallucination

    Authors: Pouya Fallah, Soroush Gooran, Mohammad Jafarinasab, Pouya Sadeghi, Reza Farnia, Amirreza Tarabkhah, Zainab Sadat Taghavi, Hossein Sameti

    Abstract: Language models, particularly generative models, are susceptible to hallucinations, generating outputs that contradict factual knowledge or the source text. This study explores methods for detecting hallucinations in three SemEval-2024 Task 6 tasks: Machine Translation, Definition Modeling, and Paraphrase Generation. We evaluate two methods: semantic similarity between the generated text and factu… ▽ More

    Submitted 9 April, 2024; v1 submitted 7 April, 2024; originally announced April 2024.

  8. arXiv:2404.02474  [pdf, other

    cs.CL cs.AI cs.IR cs.LG

    uTeBC-NLP at SemEval-2024 Task 9: Can LLMs be Lateral Thinkers?

    Authors: Pouya Sadeghi, Amirhossein Abaskohi, Yadollah Yaghoobzadeh

    Abstract: Inspired by human cognition, Jiang et al.(2023c) create a benchmark for assessing LLMs' lateral thinking-thinking outside the box. Building upon this benchmark, we investigate how different prompting methods enhance LLMs' performance on this task to reveal their inherent power for outside-the-box thinking ability. Through participating in SemEval-2024, task 9, Sentence Puzzle sub-task, we explore… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

    Comments: 12 pages, 5 figures, 6 tables, Proceedings of the 18th International Workshop on Semantic Evaluation (SemEval-2024) @ NAACL 2024

  9. arXiv:2404.02403  [pdf, other

    cs.CL cs.LG

    Benchmarking Large Language Models for Persian: A Preliminary Study Focusing on ChatGPT

    Authors: Amirhossein Abaskohi, Sara Baruni, Mostafa Masoudi, Nesa Abbasi, Mohammad Hadi Babalou, Ali Edalat, Sepehr Kamahi, Samin Mahdizadeh Sani, Nikoo Naghavian, Danial Namazifard, Pouya Sadeghi, Yadollah Yaghoobzadeh

    Abstract: This paper explores the efficacy of large language models (LLMs) for Persian. While ChatGPT and consequent LLMs have shown remarkable performance in English, their efficiency for more low-resource languages remains an open question. We present the first comprehensive benchmarking study of LLMs across diverse Persian language tasks. Our primary focus is on GPT-3.5-turbo, but we also include GPT-4 a… ▽ More

    Submitted 2 April, 2024; originally announced April 2024.

    Comments: 14 pages, 1 figure, 6 tables, Proceeding of the 2024 Joint International Conference on Computational Linguistics, Language Resources and Evaluation (LREC-COLING)

  10. arXiv:2403.10342  [pdf, other

    cs.NI

    Cooperative Jamming for Physical Layer Security Enhancement Using Deep Reinforcement Learning

    Authors: Sayed Amir Hoseini, Faycal Bouhafs, Neda Aboutorab, Parastoo Sadeghi, Frank den Hartog

    Abstract: Wireless data communications are always facing the risk of eavesdropping and interception. Conventional protection solutions which are based on encryption may not always be practical as is the case for wireless IoT networks or may soon become ineffective against quantum computers. In this regard, Physical Layer Security (PLS) presents a promising approach to secure wireless communications through… ▽ More

    Submitted 15 March, 2024; originally announced March 2024.

  11. arXiv:2402.12967  [pdf, other

    cs.IT cs.CR

    Quantifying Privacy via Information Density

    Authors: Leonhard Grosse, Sara Saeidian, Parastoo Sadeghi, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We examine the relationship between privacy metrics that utilize information density to measure information leakage between a private and a disclosed random variable. Firstly, we prove that bounding the information density from above or below in turn implies a lower or upper bound on the information density, respectively. Using this result, we establish new relationships between local information… ▽ More

    Submitted 20 February, 2024; originally announced February 2024.

    MSC Class: 94A17 ACM Class: H.1.1

  12. arXiv:2401.15202  [pdf, ps, other

    cs.IT

    A Cross Entropy Interpretation of R{é}nyi Entropy for $α$-leakage

    Authors: Ni Ding, Mohammad Amin Zarrabian, Parastoo Sadeghi

    Abstract: This paper proposes an $α$-leakage measure for $α\in[0,\infty)$ by a cross entropy interpretation of R{é}nyi entropy. While Rényi entropy was originally defined as an $f$-mean for $f(t) = \exp((1-α)t)$, we reveal that it is also a $\tilde{f}$-mean cross entropy measure for $\tilde{f}(t) = \exp(\frac{1-α}αt)$. Minimizing this Rényi cross-entropy gives Rényi entropy, by which the prior and posterior… ▽ More

    Submitted 26 January, 2024; originally announced January 2024.

    Comments: 7 pages; 1 figure

  13. arXiv:2310.20486  [pdf, ps, other

    cs.IT

    Optimal Binary Differential Privacy via Graphs

    Authors: Sahel Torkamani, Javad B. Ebrahimi, Parastoo Sadeghi, Rafael G. L. D'Oliveira, Muriel Médard

    Abstract: We present the notion of \emph{reasonable utility} for binary mechanisms, which applies to all utility functions in the literature. This notion induces a partial ordering on the performance of all binary differentially private (DP) mechanisms. DP mechanisms that are maximal elements of this ordering are optimal DP mechanisms for every reasonable utility. By looking at differential privacy as a ran… ▽ More

    Submitted 31 October, 2023; originally announced October 2023.

  14. arXiv:2309.05871  [pdf, other

    cs.CR cs.IR cs.IT

    Generalized Rainbow Differential Privacy

    Authors: Yuzhou Gu, Ziqi Zhou, Onur Günlü, Rafael G. L. D'Oliveira, Parastoo Sadeghi, Muriel Médard, Rafael F. Schaefer

    Abstract: We study a new framework for designing differentially private (DP) mechanisms via randomized graph colorings, called rainbow differential privacy. In this framework, datasets are nodes in a graph, and two neighboring datasets are connected by an edge. Each dataset in the graph has a preferential ordering for the possible outputs of the mechanism, and these orderings are called rainbows. Different… ▽ More

    Submitted 5 April, 2024; v1 submitted 11 September, 2023; originally announced September 2023.

    Comments: arXiv admin note: text overlap with arXiv:2202.03974

  15. arXiv:2305.06577  [pdf, other

    cs.IT

    Preferential Pliable Index Coding

    Authors: Daniel Byrne, Lawrence Ong, Parastoo Sadeghi, Badri N. Vellambi

    Abstract: We propose and study a variant of pliable index coding (PICOD) where receivers have preferences for their unknown messages and give each unknown message a preference ranking. We call this the preferential pliable index-coding (PPICOD) problem and study the Pareto trade-off between the code length and overall satisfaction metric among all receivers. We derive theoretical characteristics of the PPIC… ▽ More

    Submitted 15 May, 2023; v1 submitted 11 May, 2023; originally announced May 2023.

    Comments: An extended version of the same-titled paper accepted for presentation at the 2023 IEEE International Symposium on Information Theory (ISIT)

  16. arXiv:2303.13771  [pdf, other

    cs.IT cs.CR

    On the connection between the ABS perturbation methodology and differential privacy

    Authors: Parastoo Sadeghi, Chien-Hung Chien

    Abstract: This paper explores analytical connections between the perturbation methodology of the Australian Bureau of Statistics (ABS) and the differential privacy (DP) framework. We consider a single static counting query function and find the analytical form of the perturbation distribution with symmetric support for the ABS perturbation methodology. We then analytically measure the DP parameters, namely… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

  17. On the Lift, Related Privacy Measures, and Applications to Privacy-Utility Tradeoffs

    Authors: Mohammad Amin Zarrabian, Ni Ding, Parastoo Sadeghi

    Abstract: This paper investigates lift, the likelihood ratio between the posterior and prior belief about sensitive features in a dataset. Maximum and minimum lifts over sensitive features quantify the adversary's knowledge gain and should be bounded to protect privacy. We demonstrate that max and min lifts have a distinct range of values and probability of appearance in the dataset, referred to as \emph{li… ▽ More

    Submitted 2 March, 2023; originally announced March 2023.

  18. Age of Information in Downlink Systems: Broadcast or Unicast Transmission?

    Authors: Zhifeng Tang, Nan Yang, Parastoo Sadeghi, Xiangyun Zhou

    Abstract: We analytically decide whether the broadcast transmission scheme or the unicast transmission scheme achieves the optimal age of information (AoI) performance of a multiuser system where a base station (BS) generates and transmits status updates to multiple user equipments (UEs). In the broadcast transmission scheme, the status update for all UEs is jointly encoded into a packet for transmission, w… ▽ More

    Submitted 7 July, 2023; v1 submitted 26 October, 2022; originally announced October 2022.

  19. arXiv:2210.12916  [pdf, ps, other

    cs.IT cs.CR

    Explaining epsilon in local differential privacy through the lens of quantitative information flow

    Authors: Natasha Fernandes, Annabelle McIver, Parastoo Sadeghi

    Abstract: The study of leakage measures for privacy has been a subject of intensive research and is an important aspect of understanding how privacy leaks occur in computer systems. Differential privacy has been a focal point in the privacy community for some years and yet its leakage characteristics are not completely understood. In this paper we bring together two areas of research -- information theory a… ▽ More

    Submitted 18 May, 2023; v1 submitted 23 October, 2022; originally announced October 2022.

  20. arXiv:2206.06646  [pdf, other

    cs.NI cs.CR

    Network-Controlled Physical-Layer Security: Enhancing Secrecy Through Friendly Jamming

    Authors: Sayed Amir Hoseini, Parastoo Sadeghi, Faycal Bouhafs, Neda Aboutorab, Frank den Hartog

    Abstract: The broadcasting nature of the wireless medium makes exposure to eavesdroppers a potential threat. Physical Layer Security (PLS) has been widely recognized as a promising security measure complementary to encryption. It has recently been demonstrated that PLS can be implemented using off-the-shelf equipment by spectrum-programming enhanced Software-Defined Networking (SDN), where a network control… ▽ More

    Submitted 14 June, 2022; originally announced June 2022.

  21. arXiv:2205.14549  [pdf, ps, other

    cs.IT

    Asymmetric Local Information Privacy and the Watchdog Mechanism

    Authors: Mohammad Amin Zarrabian, Ni Ding, Parastoo Sadeghi

    Abstract: This paper proposes a novel watchdog privatization scheme by generalizing local information privacy (LIP) to enhance data utility. To protect the sensitive features $S$ correlated with some useful data $X$, LIP restricts the lift, the ratio of the posterior belief to the prior on $S$ after and before accessing $X$. For each $x$, both maximum and minimum lift over sensitive features are measures of… ▽ More

    Submitted 28 May, 2022; originally announced May 2022.

  22. arXiv:2205.10827  [pdf, other

    cs.IT cs.CR

    Information Leakage in Index Coding With Sensitive and Non-Sensitive Messages

    Authors: Yucheng Liu, Lawrence Ong, Phee Lep Yeoh, Parastoo Sadeghi, Joerg Kliewer, Sarah Johnson

    Abstract: Information leakage to a guessing adversary in index coding is studied, where some messages in the system are sensitive and others are not. The non-sensitive messages can be used by the server like secret keys to mitigate leakage of the sensitive messages to the adversary. We construct a deterministic linear coding scheme, developed from the rank minimization method based on fitting matrices (Bar-… ▽ More

    Submitted 22 May, 2022; originally announced May 2022.

    Comments: Accepted by IEEE International Symposium on Information Theory (ISIT) 2022

  23. arXiv:2205.10821  [pdf, other

    cs.IT cs.CR

    Information Leakage in Index Coding

    Authors: Yucheng Liu, Lawrence Ong, Phee Lep Yeoh, Parastoo Sadeghi, Joerg Kliewer, Sarah Johnson

    Abstract: We study the information leakage to a guessing adversary in index coding with a general message distribution. Under both vanishing-error and zero-error decoding assumptions, we develop lower and upper bounds on the optimal leakage rate, which are based on the broadcast rate of the subproblem induced by the set of messages the adversary tries to guess. When the messages are independent and uniforml… ▽ More

    Submitted 22 May, 2022; originally announced May 2022.

    Comments: Published in Proceedings of IEEE Information Theory Workshop (ITW) 2021

  24. arXiv:2203.15429  [pdf, ps, other

    cs.DS cs.IT

    Heterogeneous Differential Privacy via Graphs

    Authors: Sahel Torkamani, Javad B. Ebrahimi, Parastoo Sadeghi, Rafael G. L. D'Oliveira, Muriel Medard

    Abstract: We generalize a previous framework for designing utility-optimal differentially private (DP) mechanisms via graphs, where datasets are vertices in the graph and edges represent dataset neighborhood. The boundary set contains datasets where an individual's response changes the binary-valued query compared to its neighbors. Previous work was limited to the homogeneous case where the privacy paramete… ▽ More

    Submitted 29 March, 2022; originally announced March 2022.

  25. arXiv:2202.03974  [pdf, other

    cs.CR cs.IR cs.IT cs.LG

    Rainbow Differential Privacy

    Authors: Ziqi Zhou, Onur Günlü, Rafael G. L. D'Oliveira, Muriel Médard, Parastoo Sadeghi, Rafael F. Schaefer

    Abstract: We extend a previous framework for designing differentially private (DP) mechanisms via randomized graph colorings that was restricted to binary functions, corresponding to colorings in a graph, to multi-valued functions. As before, datasets are nodes in the graph and any two neighboring datasets are connected by an edge. In our setting, we assume that each dataset has a preferential ordering for… ▽ More

    Submitted 13 May, 2022; v1 submitted 8 February, 2022; originally announced February 2022.

    Comments: To appear in the 2022 IEEE International Symposium on Information Theory

  26. arXiv:2201.10057  [pdf, ps, other

    cs.IT

    On the Optimality of Linear Index Coding over the Fields with Characteristic Three

    Authors: Arman Sharififar, Parastoo Sadeghi, Neda Aboutorab

    Abstract: It has been known that the insufficiency of linear coding in achieving the optimal rate of the general index coding problem is rooted in its rate's dependency on the field size. However, this dependency has been described only through the two well-known matroid instances, namely the Fano and non-Fano matroids, which, in turn, limits its scope only to the fields with characteristic two. In this pap… ▽ More

    Submitted 1 May, 2022; v1 submitted 24 January, 2022; originally announced January 2022.

  27. arXiv:2111.02638  [pdf, ps, other

    cs.IT eess.SP

    The Age of Information of Short-Packet Communications: Joint or Distributed Encoding?

    Authors: Zhifeng Tang, Nan Yang, Parastoo Sadeghi, Xiangyun Zhou

    Abstract: In this paper, we analyze the impact of different encoding schemes on the age of information (AoI) performance in a point-to-point system, where a source generates packets based on the status updates collected from multiple sensors and transmits the packets to a destination. In this system, we consider two encoding schemes, namely, the joint encoding scheme and the distributed encoding scheme. In… ▽ More

    Submitted 4 November, 2021; originally announced November 2021.

  28. arXiv:2110.06412  [pdf, other

    cs.CR cs.IT

    Offset-Symmetric Gaussians for Differential Privacy

    Authors: Parastoo Sadeghi, Mehdi Korki

    Abstract: The Gaussian distribution is widely used in mechanism design for differential privacy (DP). Thanks to its sub-Gaussian tail, it significantly reduces the chance of outliers when responding to queries. However, it can only provide approximate $(ε, δ(ε))$-DP. In practice, $δ(ε)$ must be much smaller than the size of the dataset, which may limit the use of the Gaussian mechanism for large datasets wi… ▽ More

    Submitted 12 October, 2021; originally announced October 2021.

  29. arXiv:2110.04724  [pdf, ps, other

    cs.IT

    Enhancing Utility in the Watchdog Privacy Mechanism

    Authors: Mohammad Amin Zarrabian, Ni Ding, Parastoo Sadeghi, Thierry Rakotoarivelo

    Abstract: This paper is concerned with enhancing data utility in the privacy watchdog method for attaining information-theoretic privacy. For a specific privacy constraint, the watchdog method filters out the high-risk data symbols through applying a uniform data regulation scheme, e.g., merging all high-risk symbols together. While this method entirely trades the symbols resolution off for privacy, we show… ▽ More

    Submitted 10 October, 2021; originally announced October 2021.

    Comments: 5 pages, 3 figures

    MSC Class: 68P27;

  30. arXiv:2105.07211  [pdf, other

    cs.IT

    On Converse Results for Secure Index Coding

    Authors: Yucheng Liu, Lawrence Ong, Parastoo Sadeghi, Neda Aboutorab, Arman Sharififar

    Abstract: In this work, we study the secure index coding problem where there are security constraints on both legitimate receivers and eavesdroppers. We develop two performance bounds (i.e., converse results) on the symmetric secure capacity. The first one is an extended version of the basic acyclic chain bound (Liu and Sadeghi, 2019) that takes security constraints into account. The second converse result… ▽ More

    Submitted 15 May, 2021; originally announced May 2021.

    Comments: A shortened version submitted to IEEE Information Theory Workshop (ITW) 2021

  31. arXiv:2102.05172  [pdf, ps, other

    cs.IT

    Differential Privacy for Binary Functions via Randomized Graph Colorings

    Authors: Rafael G. L. D'Oliveira, Muriel Medard, Parastoo Sadeghi

    Abstract: We present a framework for designing differentially private (DP) mechanisms for binary functions via a graph representation of datasets. Datasets are nodes in the graph and any two neighboring datasets are connected by an edge. The true binary function we want to approximate assigns a value (or true color) to a dataset. Randomized DP mechanisms are then equivalent to randomized colorings of the gr… ▽ More

    Submitted 9 February, 2021; originally announced February 2021.

    Comments: Submitted to IEEE ISIT 2021

  32. arXiv:2102.01908  [pdf, other

    cs.IT cs.CR

    Information Leakage in Zero-Error Source Coding: A Graph-Theoretic Perspective

    Authors: Yucheng Liu, Lawrence Ong, Sarah Johnson, Joerg Kliewer, Parastoo Sadeghi, Phee Lep Yeoh

    Abstract: We study the information leakage to a guessing adversary in zero-error source coding. The source coding problem is defined by a confusion graph capturing the distinguishability between source symbols. The information leakage is measured by the ratio of the adversary's successful guessing probability after and before eavesdropping the codeword, maximized over all possible source distributions. Such… ▽ More

    Submitted 3 February, 2021; originally announced February 2021.

    Comments: A shortened version has been submitted to ISIT 2021

  33. arXiv:2102.01526  [pdf, ps, other

    cs.IT

    Broadcast Rate Requires Nonlinear Coding in a Unicast Index Coding Instance of Size 36

    Authors: Arman Sharififar, Parastoo Sadeghi, Neda Aboutorab

    Abstract: Insufficiency of linear coding for the network coding problem was first proved by providing an instance which is solvable only by nonlinear network coding (Dougherty et al., 2005).Based on the work of Effros, et al., 2015, this specific network coding instance can be modeled as a groupcast index coding (GIC)instance with 74 messages and 80 users (where a message can be requested by multiple users)… ▽ More

    Submitted 5 February, 2023; v1 submitted 2 February, 2021; originally announced February 2021.

  34. arXiv:2101.10551  [pdf, ps, other

    cs.IT

    $α$-Information-theoretic Privacy Watchdog and Optimal Privatization Scheme

    Authors: Ni Ding, Mohammad Amin Zarrabian, Parastoo Sadeghi

    Abstract: This paper proposes an $α$-lift measure for data privacy and determines the optimal privatization scheme that minimizes the $α$-lift in the watchdog method. To release data $X$ that is correlated with sensitive information $S$, the ratio $l(s,x) = \frac{p(s|x)}{p(s)} $ denotes the `lift' of the posterior belief on $S$ and quantifies data privacy. The $α$-lift is proposed as the $L_α$-norm of the l… ▽ More

    Submitted 25 January, 2021; originally announced January 2021.

  35. arXiv:2101.08970  [pdf, other

    cs.IT

    An Update-based Maximum Column Distance Coding Scheme for Index Coding

    Authors: Arman Sharififar, Neda Aboutorab, Parastoo Sadeghi

    Abstract: In this paper, we propose a new scalar linear coding scheme for the index coding problem called update-based maximum column distance (UMCD) coding scheme. The central idea in each transmission is to code messages such that one of the receivers with the minimum size of side information is instantaneously eliminated from unsatisfied receivers. One main contribution of the paper is to prove that the… ▽ More

    Submitted 5 February, 2023; v1 submitted 22 January, 2021; originally announced January 2021.

  36. arXiv:2010.09367  [pdf, other

    cs.IT

    On Properties and Optimization of Information-theoretic Privacy Watchdog

    Authors: Parastoo Sadeghi, Ni Ding, Thierry Rakotoarivelo

    Abstract: We study the problem of privacy preservation in data sharing, where $S$ is a sensitive variable to be protected and $X$ is a non-sensitive useful variable correlated with $S$. Variable $X$ is randomized into variable $Y$, which will be shared or released according to $p_{Y|X}(y|x)$. We measure privacy leakage by \emph{information privacy} (also known as \emph{log-lift} in the literature), which gu… ▽ More

    Submitted 19 October, 2020; originally announced October 2020.

  37. arXiv:2008.09702  [pdf, ps, other

    cs.IT cs.CR

    Low Influence, Utility, and Independence in Differential Privacy: A Curious Case of $3 \choose 2$

    Authors: Rafael G. L. D'Oliveira, Salman Salamatian, Muriel Médard, Parastoo Sadeghi

    Abstract: We study the relationship between randomized low influence functions and differentially private mechanisms. Our main aim is to formally determine whether differentially private mechanisms are low influence and whether low influence randomized functions can be differentially private. We show that differential privacy does not necessarily imply low influence in a formal sense. However, low influence… ▽ More

    Submitted 7 February, 2021; v1 submitted 21 August, 2020; originally announced August 2020.

  38. arXiv:2007.09374  [pdf, other

    cs.IT

    Differentially Private Mechanisms for Count Queries

    Authors: Parastoo Sadeghi, Shahab Asoodeh, Flavio du Pin Calmon

    Abstract: In this paper, we consider the problem of responding to a count query (or any other integer-valued queries) evaluated on a dataset containing sensitive attributes. To protect the privacy of individuals in the dataset, a standard practice is to add continuous noise to the true count. We design a differentially-private mechanism which adds integer-valued noise allowing the released output to remain… ▽ More

    Submitted 18 July, 2020; originally announced July 2020.

  39. arXiv:2004.02076  [pdf, ps, other

    cs.IT

    Independent User Partition Multicast Scheme for the Groupcast Index Coding Problem

    Authors: Arman Sharififar, Neda Aboutorab, Yucheng Liu, Parastoo Sadeghi

    Abstract: The groupcast index coding (GIC) problem is a generalization of the index coding problem, where one packet can be demanded by multiple users. In this paper, we propose a new coding scheme called independent user partition multicast (IUPM) for the GIC problem. The novelty of this scheme compared to the user partition multicast (UPM) (Shanmugam \textit{et al.}, 2015) is in removing redundancies in t… ▽ More

    Submitted 4 April, 2020; originally announced April 2020.

  40. arXiv:2001.07296  [pdf, ps, other

    cs.IT

    Secure Index Coding with Security Constraints on Receivers

    Authors: Yucheng Liu, Parastoo Sadeghi, Neda Aboutorab, Arman Sharififar

    Abstract: Index coding is concerned with efficient broadcast of a set of messages to receivers in the presence of receiver side information. In this paper, we study the secure index coding problem with security constraints on the receivers themselves. That is, for each receiver there is a single legitimate message it needs to decode and a prohibited message list, none of which should be decoded by that rece… ▽ More

    Submitted 15 April, 2020; v1 submitted 20 January, 2020; originally announced January 2020.

    Comments: 6 pages; a shorted version submitted to the International Symposium on Information Theory and Its Applications (ISITA) 2020

  41. arXiv:2001.06828  [pdf, ps, other

    cs.IT

    Privacy-Utility Tradeoff in a Guessing Framework Inspired by Index Coding

    Authors: Yucheng Liu, Ni Ding, Parastoo Sadeghi, Thierry Rakotoarivelo

    Abstract: This paper studies the tradeoff in privacy and utility in a single-trial multi-terminal guessing (estimation) framework using a system model that is inspired by index coding. There are $n$ independent discrete sources at a data curator. There are $m$ legitimate users and one adversary, each with some side information about the sources. The data curator broadcasts a distorted function of sources to… ▽ More

    Submitted 18 June, 2020; v1 submitted 19 January, 2020; originally announced January 2020.

    Comments: 6 pages; accepted by IEEE International Symposium on Information Theory (ISIT) 2020

  42. arXiv:1912.11814  [pdf, ps, other

    cs.IT

    Part II: A Practical Approach for Successive Omniscience

    Authors: Ni Ding, Parastoo Sadeghi, Thierry Rakotoarivelo

    Abstract: In Part I, we studied the communication for omniscience (CO) problem and proposed a parametric (PAR) algorithm to determine the minimum sum-rate at which a set of users indexed by a finite set $V$ attain omniscience. The omniscience in CO refers to the status that each user in $V$ recovers the observations of a multiple random source. It is called the global omniscience in this paper in contrast t… ▽ More

    Submitted 26 December, 2019; originally announced December 2019.

    Comments: 12 pages, 2 figures

  43. arXiv:1912.11808  [pdf, ps, other

    cs.IT

    Part I: Improving Computational Efficiency of Communication for Omniscience

    Authors: Ni Ding, Parastoo Sadeghi, Thierry Rakotoarivelo

    Abstract: Communication for omniscience (CO) refers to the problem where the users in a finite set $V$ observe a discrete multiple random source and want to exchange data over broadcast channels to reach omniscience, the state where everyone recovers the entire source. This paper studies how to improve the computational complexity for the problem of minimizing the sum-rate for attaining omniscience in $V$.… ▽ More

    Submitted 18 December, 2020; v1 submitted 26 December, 2019; originally announced December 2019.

    Comments: 16 pages, 3 figures

  44. arXiv:1909.11850  [pdf, other

    cs.IT

    Improved Lower Bounds for Pliable Index Coding using Absent Receivers

    Authors: Lawrence Ong, Badri N. Vellambi, Jörg Kliewer, Parastoo Sadeghi

    Abstract: This paper studies pliable index coding, in which a sender broadcasts information to multiple receivers through a shared broadcast medium, and the receivers each have some message a priori and want any message they do not have. An approach, based on receivers that are absent from the problem, was previously proposed to find lower bounds on the optimal broadcast rate. In this paper, we introduce ne… ▽ More

    Submitted 1 October, 2019; v1 submitted 25 September, 2019; originally announced September 2019.

    Comments: An extended version of the same-titled paper submitted to a conference

  45. arXiv:1903.01001  [pdf, ps, other

    cs.IT

    Improving Computational Efficiency of Communication for Omniscience and Successive Omniscience

    Authors: Ni Ding, Parastoo Sadeghi, Thierry Rakotoarivelo

    Abstract: For a group of users in $V$ where everyone observes a component of a discrete multiple random source, the process that users exchange data so as to reach omniscience, the state where everyone recovers the entire source, is called communication for omniscience (CO). We first consider how to improve the existing complexity $O(|V|^2 \cdot \text{SFM}(|V|)$ of minimizing the sum of communication rates… ▽ More

    Submitted 3 March, 2019; originally announced March 2019.

    Comments: 8 pages, 3 figures

  46. arXiv:1902.03706  [pdf, ps, other

    cs.IT

    Attaining Fairness in Communication for Omniscience

    Authors: Ni Ding, Parastoo Sadeghi, David Smith, Thierry Rakotoarivelo

    Abstract: This paper studies how to attain fairness in communication for omniscience, where a set of users exchange their observations of a discrete multiple random source to attain omniscience---the state that all users recover the entire source. The optimal rate region containing all source coding rate vectors that achieve the omniscience with the minimum sum rate is shown to coincide with the core (the s… ▽ More

    Submitted 10 February, 2019; originally announced February 2019.

    Comments: 12 pages, 5 figures

  47. arXiv:1901.09183  [pdf, other

    cs.IT

    Generalized Alignment Chain: Improved Converse Results for Index Coding

    Authors: Yucheng Liu, Parastoo Sadeghi

    Abstract: In this paper, we study the information-theoretic converse for the index coding problem. We generalize the definition for the alignment chain, introduced by Maleki et al., to capture more flexible relations among interfering messages at each receiver. Based on this, we derive improved converse results for the single-server index coding problem. Compared to the maximum acyclic induced subgraph (MAI… ▽ More

    Submitted 28 May, 2019; v1 submitted 26 January, 2019; originally announced January 2019.

    Comments: A shorter version has been accepted by the 2019 IEEE International Symposium on Information Theory (ISIT)

  48. arXiv:1901.06629  [pdf, ps, other

    cs.IT

    A Submodularity-based Agglomerative Clustering Algorithm for the Privacy Funnel

    Authors: Ni Ding, Parastoo Sadeghi

    Abstract: For the privacy funnel (PF) problem, we propose an efficient iterative agglomerative clustering algorithm based on the minimization of the difference of submodular functions (IAC-MDSF). For a data curator that wants to share the data $X$ correlated with the sensitive information $S$, the PF problem is to generate the sanitized data $\hat{X}$ that maintains a specified utility/fidelity threshold on… ▽ More

    Submitted 12 February, 2019; v1 submitted 20 January, 2019; originally announced January 2019.

    Comments: 6 pages, 4 figures

  49. arXiv:1809.03615  [pdf, other

    cs.IT

    On the Capacity Region for Secure Index Coding

    Authors: Yuxin Liu, Badri N. Vellambi, Young-Han Kim, Parastoo Sadeghi

    Abstract: We study the index coding problem in the presence of an eavesdropper, where the aim is to communicate without allowing the eavesdropper to learn any single message aside from the messages it may already know as side information. We establish an outer bound on the underlying secure capacity region of the index coding problem, which includes polymatroidal and security constraints, as well as the set… ▽ More

    Submitted 10 September, 2018; originally announced September 2018.

  50. arXiv:1805.01583  [pdf, ps, other

    cs.IT

    Fairness in Multiterminal Data Compression: A Splitting Method for The Egalitarian Solution

    Authors: Ni Ding, David Smith, Parastoo Sadeghi, Thierry Rakotoarivelo

    Abstract: This paper proposes a novel splitting (SPLIT) algorithm to achieve fairness in the multiterminal lossless data compression problem. It finds the egalitarian solution in the Slepian-Wolf region and completes in strongly polynomial time. We show that the SPLIT algorithm adaptively updates the source coding rates to the optimal solution, while recursively splitting the terminal set, enabling parallel… ▽ More

    Submitted 3 May, 2018; originally announced May 2018.

    Comments: 5 pages, 4 figures

    Journal ref: ICASSP2018 proceedings