An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

Review of results on smart‐meter privacy by data manipulation, demand shaping, and load scheduling

F Farokhi - IET Smart Grid, 2020 - Wiley Online Library
Simple analysis of energy consumption patterns recorded by smart meters can be used to
deduce household occupancy. With access to higher‐resolution smart‐meter readings, we …

No free lunch theorem for security and utility in federated learning

X Zhang, H Gu, L Fan, K Chen, Q Yang - ACM Transactions on Intelligent …, 2022 - dl.acm.org
In a federated learning scenario where multiple parties jointly learn a model from their
respective data, there exist two conflicting goals for the choice of appropriate algorithms. On …

Generalization bounds: Perspectives from information theory and PAC-Bayes

F Hellström, G Durisi, B Guedj, M Raginsky - arXiv preprint arXiv …, 2023 - arxiv.org
A fundamental question in theoretical machine learning is generalization. Over the past
decades, the PAC-Bayesian approach has been established as a flexible framework to …

Visual privacy attacks and defenses in deep learning: a survey

G Zhang, B Liu, T Zhu, A Zhou, W Zhou - Artificial Intelligence Review, 2022 - Springer
The concerns on visual privacy have been increasingly raised along with the dramatic
growth in image and video capture and sharing. Meanwhile, with the recent breakthrough in …

Privacy-preserving aggregate mobility data release: An information-theoretic deep reinforcement learning approach

W Zhang, B Jiang, M Li, X Lin - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
It is crucial to protect users' location traces against inference attacks on aggregate mobility
data collected from multiple users in various real-world applications. Most of the existing …

Generalization Error Bounds via Rényi-, f-Divergences and Maximal Leakage

AR Esposito, M Gastpar, I Issa - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this work, the probability of an event under some joint distribution is bounded by
measuring it with the product of the marginals instead (which is typically easier to analyze) …

Generalization bounds via information density and conditional information density

F Hellström, G Durisi - IEEE Journal on Selected Areas in …, 2020 - ieeexplore.ieee.org
We present a general approach, based on an exponential inequality, to derive bounds on
the generalization error of randomized learning algorithms. Using this approach, we provide …

Tunable measures for information leakage and applications to privacy-utility tradeoffs

J Liao, O Kosut, L Sankar… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We introduce a tunable measure for information leakage called maximal-leakage. This
measure quantifies the maximal gain of an adversary in inferring any (potentially random) …

Formal security proofs via Doeblin coefficients: optimal side-channel factorization from noisy leakage to random probing

J Béguinot, W Cheng, S Guilley, O Rioul - Annual International Cryptology …, 2024 - Springer
Masking is one of the most popular countermeasures to side-channel attacks, because it can
offer provable security. However, depending on the adversary's model, useful security …