Scalable methods for computing state similarity in deterministic markov decision processes

PS Castro - Proceedings of the AAAI Conference on Artificial …, 2020 - ojs.aaai.org
We present new algorithms for computing and approximating bisimulation metrics in Markov
Decision Processes (MDPs). Bisimulation metrics are an elegant formalism that capture …

Probabilistic relational reasoning for differential privacy

G Barthe, B Köpf, F Olmedo… - Proceedings of the 39th …, 2012 - dl.acm.org
Differential privacy is a notion of confidentiality that protects the privacy of individuals while
allowing useful computations on their private data. Deriving differential privacy guarantees …

Probabilistic relational reasoning for differential privacy

G Barthe, B Köpf, F Olmedo… - ACM Transactions on …, 2013 - dl.acm.org
Differential privacy is a notion of confidentiality that allows useful computations on sensible
data while protecting the privacy of individuals. Proving differential privacy is a difficult and …

Beyond Differential Privacy: Composition Theorems and Relational Logic for f-divergences between Probabilistic Programs

G Barthe, F Olmedo - International Colloquium on Automata, Languages …, 2013 - Springer
Abstract f-divergences form a class of measures of distance between probability
distributions; they are widely used in areas such as information theory and signal …

Formal verification of differential privacy for interactive systems

MC Tschantz, D Kaynar, A Datta - Electronic Notes in Theoretical Computer …, 2011 - Elsevier
Differential privacy is a promising approach to privacy preserving data analysis with a well-
developed theory for functions. Despite recent work on implementing systems that aim to …

Computational indistinguishability logic

G Barthe, M Daubignard, B Kapron… - Proceedings of the 17th …, 2010 - dl.acm.org
Computational Indistinguishability Logic (CIL) is a logic for reasoning about cryptographic
primitives in computational models. It captures reasoning patterns that are common in …

Probabilistic relational Hoare logics for computer-aided security proofs

G Barthe, B Grégoire, S Zanella Béguelin - Mathematics of Program …, 2012 - Springer
Provable security. The goal of provable security is to verify rigorously the security of
cryptographic systems. A provable security argument proceeds in three steps: 1 Define a …

[图书][B] Probabilistic couplings for probabilistic reasoning

J Hsu - 2017 - search.proquest.com
This thesis explores proofs by coupling from the perspective of formal verification. Long
employed in probability theory and theoretical computer science, these proofs construct …

Computing distances between probabilistic automata

M Tracol, J Desharnais, A Zhioua - arXiv preprint arXiv:1107.1206, 2011 - arxiv.org
We present relaxed notions of simulation and bisimulation on Probabilistic Automata (PA),
that allow some error epsilon. When epsilon is zero we retrieve the usual notions of …

Semantic analysis of gossip protocols for wireless sensor networks

R Lanotte, M Merro - International Conference on Concurrency Theory, 2011 - Springer
Gossip protocols have been proposed as a robust and efficient method for disseminating
information throughout large-scale networks. In this paper, we propose a compositional …