no code implementations • 14 Sep 2023 • Benjamin D. Kim, Vipindev Adat Vasudevan, Jongchan Woo, Alejandro Cohen, Rafael G. L. D'Oliveira, Thomas Stahlbuhk, Muriel Médard
The use of Mutual Information (MI) as a measure to evaluate the efficiency of cryptosystems has an extensive history.
no code implementations • 11 Sep 2023 • Yuzhou Gu, Ziqi Zhou, Onur Günlü, Rafael G. L. D'Oliveira, Parastoo Sadeghi, Muriel Médard, Rafael F. Schaefer
In this framework, datasets are nodes in a graph, and two neighboring datasets are connected by an edge.
no code implementations • 8 Jun 2023 • Martin H. Nielsen, Chia-Yi Yeh, Ming Shen, Muriel Médard
We propose to use a liquid time constant (LTC) network to predict the future blockage status of a millimeter wave (mmWave) link using only the received signal power as the input to the system.
no code implementations • 31 Mar 2023 • Homa Esfahanizadeh, Adam Yala, Rafael G. L. D'Oliveira, Andrea J. D. Jaba, Victor Quach, Ken R. Duffy, Tommi S. Jaakkola, Vinod Vaikuntanathan, Manya Ghobadi, Regina Barzilay, Muriel Médard
Allowing organizations to share their data for training of machine learning (ML) models without unintended information leakage is an open problem in practice.
no code implementations • 8 Feb 2022 • Ziqi Zhou, Onur Günlü, Rafael G. L. D'Oliveira, Muriel Médard, Parastoo Sadeghi, Rafael F. Schaefer
We extend a previous framework for designing differentially private (DP) mechanisms via randomized graph colorings that was restricted to binary functions, corresponding to colorings in a graph, to multi-valued functions.
no code implementations • 28 Jan 2022 • Adam Yala, Victor Quach, Homa Esfahanizadeh, Rafael G. L. D'Oliveira, Ken R. Duffy, Muriel Médard, Tommi S. Jaakkola, Regina Barzilay
We quantify privacy as the number of attacker guesses required to re-identify a single image (guesswork).
no code implementations • 2 Mar 2021 • Alejandro Cohen, Guillaume Thiran, Homa Esfahanizadeh, Muriel Médard
The contribution of this paper is to devise a novel framework for joint scheduling-coding, in a setting where the workers and the arrival of stream computational jobs are based on stochastic models.
Information Theory Information Theory
no code implementations • 9 Dec 2020 • Maice Costa, Yalin Sagduyu, Tugba Erpek, Muriel Médard
We consider a wireless communication network with an adaptive scheme to select the number of packets to be admitted and encoded for each transmission, and characterize the information timeliness.
Information Theory Information Theory H.1.1, E.4
no code implementations • 12 Oct 2020 • Amit Solomon, Alejandro Cohen, Nir Shlezinger, Yonina C. Eldar, Muriel Médard
A key requirement in containing contagious diseases, such as the Coronavirus disease 2019 (COVID-19) pandemic, is the ability to efficiently carry out mass diagnosis over large populations.
no code implementations • 8 Jun 2020 • Alejandro Cohen, Amit Solomon, Ken R. Duffy, Muriel Médard
The estimate is recycled to reduce the Signal to Noise Ratio (SNR) of an orthogonal channel that is experiencing correlated noise and so improve the accuracy of its decoding.
Information Theory Information Theory
no code implementations • NeurIPS 2019 • Wasim Huleihel, Arya Mazumdar, Muriel Médard, Soumyabrata Pal
In this paper, we look at the more practical scenario of overlapping clusters, and provide upper bounds (with algorithms) on the sufficient number of queries.
1 code implementation • 27 Jan 2018 • Ahmad Beirami, Robert Calderbank, Mark Christiansen, Ken Duffy, Muriel Médard
We show that the tilt operation on a memoryless string-source parametrizes an exponential family of memoryless string-sources, which we refer to as the tilted family.
Information Theory Information Theory
no code implementations • 2 Oct 2017 • Hao Wang, Lisa Vo, Flavio P. Calmon, Muriel Médard, Ken R. Duffy, Mayank Varia
Here, an analyst is allowed to reconstruct (in a mean-squared error sense) certain functions of the data (utility), while other private functions should not be reconstructed with distortion below a certain threshold (privacy).
no code implementations • 3 Oct 2015 • Luke O'Connor, Muriel Médard, Soheil Feizi
A latent space model of particular interest is the Random Dot Product Graph (RDPG), which can be fit using an efficient spectral method; however, this method is based on a heuristic that can fail, even in simple cases.