Scalable methods for computing state similarity in deterministic markov decision processes
PS Castro - Proceedings of the AAAI Conference on Artificial …, 2020 - ojs.aaai.org
We present new algorithms for computing and approximating bisimulation metrics in Markov
Decision Processes (MDPs). Bisimulation metrics are an elegant formalism that capture …
Decision Processes (MDPs). Bisimulation metrics are an elegant formalism that capture …
Probabilistic relational reasoning for differential privacy
Differential privacy is a notion of confidentiality that protects the privacy of individuals while
allowing useful computations on their private data. Deriving differential privacy guarantees …
allowing useful computations on their private data. Deriving differential privacy guarantees …
Probabilistic relational reasoning for differential privacy
Differential privacy is a notion of confidentiality that allows useful computations on sensible
data while protecting the privacy of individuals. Proving differential privacy is a difficult and …
data while protecting the privacy of individuals. Proving differential privacy is a difficult and …
Beyond Differential Privacy: Composition Theorems and Relational Logic for f-divergences between Probabilistic Programs
Abstract f-divergences form a class of measures of distance between probability
distributions; they are widely used in areas such as information theory and signal …
distributions; they are widely used in areas such as information theory and signal …
Formal verification of differential privacy for interactive systems
Differential privacy is a promising approach to privacy preserving data analysis with a well-
developed theory for functions. Despite recent work on implementing systems that aim to …
developed theory for functions. Despite recent work on implementing systems that aim to …
Computational indistinguishability logic
Computational Indistinguishability Logic (CIL) is a logic for reasoning about cryptographic
primitives in computational models. It captures reasoning patterns that are common in …
primitives in computational models. It captures reasoning patterns that are common in …
Probabilistic relational Hoare logics for computer-aided security proofs
Provable security. The goal of provable security is to verify rigorously the security of
cryptographic systems. A provable security argument proceeds in three steps: 1 Define a …
cryptographic systems. A provable security argument proceeds in three steps: 1 Define a …
[图书][B] Probabilistic couplings for probabilistic reasoning
J Hsu - 2017 - search.proquest.com
This thesis explores proofs by coupling from the perspective of formal verification. Long
employed in probability theory and theoretical computer science, these proofs construct …
employed in probability theory and theoretical computer science, these proofs construct …
Computing distances between probabilistic automata
M Tracol, J Desharnais, A Zhioua - arXiv preprint arXiv:1107.1206, 2011 - arxiv.org
We present relaxed notions of simulation and bisimulation on Probabilistic Automata (PA),
that allow some error epsilon. When epsilon is zero we retrieve the usual notions of …
that allow some error epsilon. When epsilon is zero we retrieve the usual notions of …
Semantic analysis of gossip protocols for wireless sensor networks
Gossip protocols have been proposed as a robust and efficient method for disseminating
information throughout large-scale networks. In this paper, we propose a compositional …
information throughout large-scale networks. In this paper, we propose a compositional …