Review of results on smart‐meter privacy by data manipulation, demand shaping, and load scheduling
F Farokhi - IET Smart Grid, 2020 - Wiley Online Library
Simple analysis of energy consumption patterns recorded by smart meters can be used to
deduce household occupancy. With access to higher‐resolution smart‐meter readings, we …
deduce household occupancy. With access to higher‐resolution smart‐meter readings, we …
Privacy against statistical inference
F du Pin Calmon, N Fawaz - 2012 50th annual Allerton …, 2012 - ieeexplore.ieee.org
We propose a general statistical inference framework to capture the privacy threat incurred
by a user that releases data to a passive but curious adversary, given utility constraints. We …
by a user that releases data to a passive but curious adversary, given utility constraints. We …
Utility-privacy tradeoffs in databases: An information-theoretic approach
L Sankar, SR Rajagopalan… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Ensuring the usefulness of electronic data sources while providing necessary privacy
guarantees is an important unsolved problem. This problem drives the need for an analytical …
guarantees is an important unsolved problem. This problem drives the need for an analytical …
Context-aware generative adversarial privacy
Preserving the utility of published datasets while simultaneously providing provable privacy
guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such …
guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such …
From the information bottleneck to the privacy funnel
We focus on the privacy-utility trade-off encountered by users who wish to disclose some
information to an analyst, that is correlated with their private data, in the hope of receiving …
information to an analyst, that is correlated with their private data, in the hope of receiving …
Smart meter privacy: A utility-privacy framework
End-user privacy in smart meter measurements is a well-known challenge in the smart grid.
The solutions offered thus far have been tied to specific technologies such as batteries or …
The solutions offered thus far have been tied to specific technologies such as batteries or …
Privacy-preserving adversarial networks
We propose a data-driven framework for optimizing privacy-preserving data release
mechanisms to attain the information-theoretically optimal tradeoff between minimizing …
mechanisms to attain the information-theoretically optimal tradeoff between minimizing …
Semidefinite programming approach to Gaussian sequential rate-distortion trade-offs
Sequential rate-distortion (SRD) theory provides a framework for studying the fundamental
trade-off between data-rate and data-quality in real-time communication systems. In this …
trade-off between data-rate and data-quality in real-time communication systems. In this …
Estimation efficiency under privacy constraints
We investigate the problem of estimating a random variable Y under a privacy constraint
dictated by another correlated random variable X. When X and Y are discrete, we express …
dictated by another correlated random variable X. When X and Y are discrete, we express …
Rate-distortion theory for the Shannon cipher system
H Yamamoto - IEEE Transactions on Information Theory, 1997 - ieeexplore.ieee.org
Rate distortion theory is considered for the Shannon cipher system (SCS). The admissible
region of cryptogram rate R, key rate R/sub k/, legitimate receiver's distortion D, and …
region of cryptogram rate R, key rate R/sub k/, legitimate receiver's distortion D, and …