On the robustness of information-theoretic privacy measures and mechanisms
Consider a data publishing setting for a dataset composed by both private and non-private
features. The publisher uses an empirical distribution, estimated from n iid samples, to …
features. The publisher uses an empirical distribution, estimated from n iid samples, to …
Data disclosure with non-zero leakage and non-invertible leakage matrix
A Zamani, TJ Oechtering… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
We study a statistical signal processing privacy problem, where an agent observes useful
data and wants to reveal the information to a user. Since the useful data is correlated with …
data and wants to reveal the information to a user. Since the useful data is correlated with …
On the privacy-utility trade-off with and without direct access to the private data
A Zamani, TJ Oechtering… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
We study an information theoretic privacy mechanism design problem for two scenarios
where the private data is either observable or hidden. In the hidden private data scenario, an …
where the private data is either observable or hidden. In the hidden private data scenario, an …
On the lift, related privacy measures, and applications to privacy–utility trade-offs
This paper investigates lift, the likelihood ratio between the posterior and prior belief about
sensitive features in a dataset. Maximum and minimum lifts over sensitive features quantify …
sensitive features in a dataset. Maximum and minimum lifts over sensitive features quantify …
Privacy with estimation guarantees
We study the central problem in data privacy: how to share data with an analyst while
providing both privacy and utility guarantees to the user that owns the data. In this setting …
providing both privacy and utility guarantees to the user that owns the data. In this setting …
An estimation-theoretic view of privacy
We study the central problem in data privacy: how to share data with an analyst while
providing both privacy and utility guarantees to the user that owns the data. We present an …
providing both privacy and utility guarantees to the user that owns the data. We present an …
Bounds for privacy-utility trade-off with non-zero leakage
A Zamani, TJ Oechtering… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
The design of privacy mechanisms for two scenarios is studied where the private data is
hidden or observable. In the first scenario, an agent observes useful data Y, which is …
hidden or observable. In the first scenario, an agent observes useful data Y, which is …
A compression perspective on secrecy measures
The relationships among secrecy, compression rate and shared secret key rate in lossless
data compression are studied through the lenses of perfect secrecy, mutual information …
data compression are studied through the lenses of perfect secrecy, mutual information …
Cache-aided private variable-length coding with zero and non-zero leakage
A private cache-aided compression problem is studied, where a server has access to a
database of N files, (Y_1,...,Y_N), each of size F bits and is connected through a shared link …
database of N files, (Y_1,...,Y_N), each of size F bits and is connected through a shared link …
Private Variable-Length Coding with Non-Zero Leakage
A Zamani, TJ Oechtering… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
A private compression design problem is studied, where an encoder observes useful data Y,
wishes to compress it using variable length code and communicates it through an …
wishes to compress it using variable length code and communicates it through an …