An operational approach to information leakage

I Issa, AB Wagner, S Kamath - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Given two random variables X and Y, an operational approach is undertaken to quantify the
“leakage” of information from X to Y. The resulting measure L (X→ Y) is called maximal …

An operational measure of information leakage

I Issa, S Kamath, AB Wagner - 2016 Annual Conference on …, 2016 - ieeexplore.ieee.org
Given two discrete random variables X and Y, an operational approach is undertaken to
quantify the “leakage” of information from X to Y. The resulting measure ℒ (X→ Y) is called …

Importance of small probability events in big data: Information measures, applications, and challenges

R She, S Liu, S Wan, K Xiong, P Fan - IEEE Access, 2019 - ieeexplore.ieee.org
In many applications (eg, anomaly detection and security systems) of smart cities, rare
events dominate the importance of the total information on big data collected by the Internet …

Maximal leakage minimization for the Shannon cipher system

I Issa, S Kamath, AB Wagner - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
A variation of the Shannon cipher system, in which lossy communication is allowed and
performance of an encryption scheme is measured in terms of maximal leakage (recently …

Measuring secrecy by the probability of a successful guess

I Issa, AB Wagner - IEEE Transactions on Information Theory, 2017 - ieeexplore.ieee.org
The secrecy of a communication system in which both the legitimate receiver and an
eavesdropper are allowed some distortion is investigated. The secrecy metric considered is …

On the reliability function of distributed hypothesis testing under optimal detection

N Weinberger, Y Kochman - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
The distributed hypothesis testing problem with full side-information is studied. The trade-off
(reliability function) between the two types of error exponents under limited rate is studied in …

Exploring light-weight cryptography for efficient and secure lossy data compression

R Shan, S Di, JC Calhoun… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
The enormous volume of data generated by large-scale instruments and simulations poses
significant challenges in archiving, transferring, sharing and analyzing data for various …

A Correlation Measure Based on Vector-Valued -Norms

MM Mojahedian, S Beigi, A Gohari… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
In this paper, we introduce a new measure of correlation for bipartite quantum states. This
measure depends on a parameter, and is defined in terms of vector-valued-norms. The …

A Toolbox for Refined Information-Theoretic Analyses with Applications

N Merhav, N Weinberger - arXiv preprint arXiv:2406.00744, 2024 - arxiv.org
This monograph offers a toolbox of mathematical techniques, which have been effective and
widely applicable in information-theoretic analysis. The first tool is a generalization of the …

Successive refinement of shannon cipher system under maximal leakage

Z Wu, L Bai, L Zhou - 2023 IEEE International Symposium on …, 2023 - ieeexplore.ieee.org
We study the successive refinement problem of Shannon cipher system under maximal
leakage for a discrete memoryless source with arbitrary bounded distortion measures …