Analyzing privacy leakage in machine learning via multiple hypothesis testing: A lesson from fano
C Guo, A Sablayrolles… - … Conference on Machine …, 2023 - proceedings.mlr.press
Differential privacy (DP) is by far the most widely accepted framework for mitigating privacy
risks in machine learning. However, exactly how small the privacy parameter $\epsilon …
risks in machine learning. However, exactly how small the privacy parameter $\epsilon …
A rate-distortion framework for characterizing semantic information
A rate-distortion problem motivated by the consideration of semantic information is
formulated and solved. The starting point is to model an information source as a pair …
formulated and solved. The starting point is to model an information source as a pair …
On the information bottleneck problems: Models, connections, applications and information theoretic views
A Zaidi, I Estella-Aguerri, S Shamai - Entropy, 2020 - mdpi.com
This tutorial paper focuses on the variants of the bottleneck problem taking an information
theoretic perspective and discusses practical methods to solve it, as well as its connection to …
theoretic perspective and discusses practical methods to solve it, as well as its connection to …
An indirect rate-distortion characterization for semantic sources: General model and the case of gaussian observation
A new source model, which consists of an intrinsic state part and an extrinsic observation
part, is proposed and its information-theoretic characterization, namely its rate-distortion …
part, is proposed and its information-theoretic characterization, namely its rate-distortion …
Optimal utility-privacy trade-off with total variation distance as a privacy measure
B Rassouli, D Gündüz - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
The total variation distance is proposed as a privacy measure in an information disclosure
scenario when the goal is to reveal some information about available data in return of utility …
scenario when the goal is to reveal some information about available data in return of utility …
Privacy-preserving adversarial networks
We propose a data-driven framework for optimizing privacy-preserving data release
mechanisms to attain the information-theoretically optimal tradeoff between minimizing …
mechanisms to attain the information-theoretically optimal tradeoff between minimizing …
Semidefinite programming approach to Gaussian sequential rate-distortion trade-offs
Sequential rate-distortion (SRD) theory provides a framework for studying the fundamental
trade-off between data-rate and data-quality in real-time communication systems. In this …
trade-off between data-rate and data-quality in real-time communication systems. In this …
Estimation efficiency under privacy constraints
We investigate the problem of estimating a random variable Y under a privacy constraint
dictated by another correlated random variable X. When X and Y are discrete, we express …
dictated by another correlated random variable X. When X and Y are discrete, we express …
An operational measure of information leakage
Given two discrete random variables X and Y, an operational approach is undertaken to
quantify the “leakage” of information from X to Y. The resulting measure ℒ (X→ Y) is called …
quantify the “leakage” of information from X to Y. The resulting measure ℒ (X→ Y) is called …
Deep joint source-channel and encryption coding: Secure semantic communications
Deep learning driven joint source-channel coding (JSCC) for wireless image or video
transmission, also called DeepJSCC, has been a topic of interest recently with very …
transmission, also called DeepJSCC, has been a topic of interest recently with very …