Privacy-preserving aggregate mobility data release: An information-theoretic deep reinforcement learning approach
It is crucial to protect users' location traces against inference attacks on aggregate mobility
data collected from multiple users in various real-world applications. Most of the existing …
data collected from multiple users in various real-world applications. Most of the existing …
Pointwise maximal leakage
We introduce a privacy measure called pointwise maximal leakage, generalizing the pre-
existing notion of maximal leakage, which quantifies the amount of information leaking about …
existing notion of maximal leakage, which quantifies the amount of information leaking about …
Extremal mechanisms for pointwise maximal leakage
L Grosse, S Saeidian… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Data publishing under privacy constraints can be achieved with mechanisms that add
randomness to data points when released to an untrusted party, thereby decreasing the …
randomness to data points when released to an untrusted party, thereby decreasing the …
Information Density Bounds for Privacy
This paper explores the implications of guaranteeing privacy by imposing a lower bound on
the information density between the private and the public data. We introduce an …
the information density between the private and the public data. We introduce an …
Quantifying Privacy via Information Density
We examine the relationship between privacy metrics that utilize information density to
measure information leakage between a private and a disclosed random variable. Firstly, we …
measure information leakage between a private and a disclosed random variable. Firstly, we …
Privacy-utility trade-off
H Zhong, K Bu - arXiv preprint arXiv:2204.12057, 2022 - arxiv.org
In this paper, we investigate the privacy-utility trade-off (PUT) problem, which considers the
minimal privacy loss at a fixed expense of utility. Several different kinds of privacy in the PUT …
minimal privacy loss at a fixed expense of utility. Several different kinds of privacy in the PUT …
Unifying Privacy Measures via Maximal (α, β)-Leakage (MαbeL)
We introduce a family of information leakage measures called maximal-leakage (beL),
parameterized by real numbers and greater than or equal to 1. The measure is formalized …
parameterized by real numbers and greater than or equal to 1. The measure is formalized …
A Generalization of Axiomatic Approach to Information Leakage
MA Zarrabian, P Sadeghi - arXiv preprint arXiv:2409.04108, 2024 - arxiv.org
In this paper, we extend the framework of quantitative information flow (QIF) to include
adversaries that use Kolmogorov-Nagumo $ f $-mean to infer secrets of a private system …
adversaries that use Kolmogorov-Nagumo $ f $-mean to infer secrets of a private system …
Pointwise Maximal Leakage: Robust, Flexible and Explainable Privacy
S Saeidian - 2024 - diva-portal.org
For several decades now, safeguarding sensitive information from disclosure has been a
key focus in computer science and information theory. Especially, in the past two decades …
key focus in computer science and information theory. Especially, in the past two decades …