An operational approach to information leakage
Given two random variables X and Y, an operational approach is undertaken to quantify the
“leakage” of information from X to Y. The resulting measure L (X→ Y) is called maximal …
“leakage” of information from X to Y. The resulting measure L (X→ Y) is called maximal …
An operational measure of information leakage
Given two discrete random variables X and Y, an operational approach is undertaken to
quantify the “leakage” of information from X to Y. The resulting measure ℒ (X→ Y) is called …
quantify the “leakage” of information from X to Y. The resulting measure ℒ (X→ Y) is called …
Importance of small probability events in big data: Information measures, applications, and challenges
In many applications (eg, anomaly detection and security systems) of smart cities, rare
events dominate the importance of the total information on big data collected by the Internet …
events dominate the importance of the total information on big data collected by the Internet …
Maximal leakage minimization for the Shannon cipher system
A variation of the Shannon cipher system, in which lossy communication is allowed and
performance of an encryption scheme is measured in terms of maximal leakage (recently …
performance of an encryption scheme is measured in terms of maximal leakage (recently …
Measuring secrecy by the probability of a successful guess
The secrecy of a communication system in which both the legitimate receiver and an
eavesdropper are allowed some distortion is investigated. The secrecy metric considered is …
eavesdropper are allowed some distortion is investigated. The secrecy metric considered is …
On the reliability function of distributed hypothesis testing under optimal detection
N Weinberger, Y Kochman - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
The distributed hypothesis testing problem with full side-information is studied. The trade-off
(reliability function) between the two types of error exponents under limited rate is studied in …
(reliability function) between the two types of error exponents under limited rate is studied in …
Exploring light-weight cryptography for efficient and secure lossy data compression
R Shan, S Di, JC Calhoun… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
The enormous volume of data generated by large-scale instruments and simulations poses
significant challenges in archiving, transferring, sharing and analyzing data for various …
significant challenges in archiving, transferring, sharing and analyzing data for various …
A Correlation Measure Based on Vector-Valued -Norms
In this paper, we introduce a new measure of correlation for bipartite quantum states. This
measure depends on a parameter, and is defined in terms of vector-valued-norms. The …
measure depends on a parameter, and is defined in terms of vector-valued-norms. The …
A Toolbox for Refined Information-Theoretic Analyses with Applications
N Merhav, N Weinberger - arXiv preprint arXiv:2406.00744, 2024 - arxiv.org
This monograph offers a toolbox of mathematical techniques, which have been effective and
widely applicable in information-theoretic analysis. The first tool is a generalization of the …
widely applicable in information-theoretic analysis. The first tool is a generalization of the …
Successive refinement of shannon cipher system under maximal leakage
We study the successive refinement problem of Shannon cipher system under maximal
leakage for a discrete memoryless source with arbitrary bounded distortion measures …
leakage for a discrete memoryless source with arbitrary bounded distortion measures …