Privacy-Aware Distributed Hypothesis Testing †
暂无分享,去创建一个
[1] Pablo Piantanida,et al. Secure Multiterminal Source Coding With Side Information at the Eavesdropper , 2011, IEEE Transactions on Information Theory.
[2] Paul W. Cuff,et al. Distributed Channel Synthesis , 2012, IEEE Transactions on Information Theory.
[3] Ye Wang,et al. Privacy-Utility Tradeoffs under Constrained Data Release Mechanisms , 2017, ArXiv.
[4] H. Vincent Poor,et al. The Likelihood Encoder for Lossy Compression , 2014, IEEE Transactions on Information Theory.
[5] S. Amari,et al. Error bound of hypothesis testing with data compression , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[6] Sergio Verdú,et al. Approximation theory of output statistics , 1993, IEEE Trans. Inf. Theory.
[7] Ryan M. Rogers,et al. Differentially Private Chi-Squared Hypothesis Testing: Goodness of Fit and Independence Testing , 2016, ICML 2016.
[8] Mérouane Debbah,et al. Distributed Binary Detection With Lossy Data Compression , 2016, IEEE Transactions on Information Theory.
[9] Yue Wang,et al. Differentially Private Hypothesis Testing, Revisited , 2015, ArXiv.
[10] Lizhong Zheng,et al. Unequal Error Protection: An Information-Theoretic Perspective , 2008, IEEE Transactions on Information Theory.
[11] Ronitt Rubinfeld,et al. Private Testing of Distributions via Sample Permutations , 2019, NeurIPS.
[12] Te Sun Han,et al. Exponential-type error probabilities for multiterminal hypothesis testing , 1989, IEEE Trans. Inf. Theory.
[13] Haim H. Permuter,et al. Semantic-security capacity for wiretap channels of type II , 2015, 2016 IEEE International Symposium on Information Theory (ISIT).
[14] Adam D. Smith,et al. The structure of optimal private tests for simple hypotheses , 2018, STOC.
[15] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[16] Donald F. Towsley,et al. Resisting structural re-identification in anonymized social networks , 2010, The VLDB Journal.
[17] Naftali Tishby,et al. The information bottleneck method , 2000, ArXiv.
[18] Neri Merhav,et al. On the error exponent and capacity games of private watermarking systems , 2003, IEEE Trans. Inf. Theory.
[19] Michele A. Wigger,et al. Distributed Hypothesis Testing Based on Unequal-Error Protection Codes , 2020, IEEE Transactions on Information Theory.
[20] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[21] H. Vincent Poor,et al. Secure lossless compression with side information , 2008, 2008 IEEE Information Theory Workshop.
[22] Sudeep Kamath,et al. An operational measure of information leakage , 2016, 2016 Annual Conference on Information Science and Systems (CISS).
[23] Sofya Raskhodnikova,et al. What Can We Learn Privately? , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.
[24] Te Han,et al. Hypothesis testing with multiterminal data compression , 1987, IEEE Trans. Inf. Theory.
[25] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[26] H. Vincent Poor,et al. Channel coding: non-asymptotic fundamental limits , 2010 .
[27] Muriel Médard,et al. Fundamental limits of perfect privacy , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[28] Constantinos Daskalakis,et al. Priv'IT: Private and Sample Efficient Identity Testing , 2017, ICML.
[29] Eli Haim,et al. On Binary Distributed Hypothesis Testing , 2017, ArXiv.
[30] Paul W. Cuff,et al. Rate-distortion theory for secrecy systems , 2013, 2013 IEEE International Symposium on Information Theory.
[31] David Eckhoff,et al. Metrics : a Systematic Survey , 2018 .
[32] Martin J. Wainwright,et al. Privacy Aware Learning , 2012, JACM.
[33] Deniz Gündüz,et al. Distributed Hypothesis Testing Under Privacy Constraints , 2018, 2018 IEEE Information Theory Workshop (ITW).
[34] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[35] Aaron D. Wyner,et al. The common information of two dependent random variables , 1975, IEEE Trans. Inf. Theory.
[36] Hirosuke Yamamoto. A rate-distortion problem for a communication system with a secondary decoder to be hindered , 1988, IEEE Trans. Inf. Theory.
[37] Roberto J. Bayardo,et al. Data privacy through optimal k-anonymization , 2005, 21st International Conference on Data Engineering (ICDE'05).
[38] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[39] M. Eric Johnson,et al. Information security and privacy in healthcare: current state of research , 2010, Int. J. Internet Enterp. Manag..
[40] Shlomo Shamai,et al. The Secrecy Capacity of Cost-Constrained Wiretap Channels , 2020, IEEE Transactions on Information Theory.
[41] Vincent Y. F. Tan,et al. Hypothesis Testing Under Mutual Information Privacy Constraints in the High Privacy Regime , 2017, IEEE Transactions on Information Forensics and Security.
[42] Huanyu Zhang,et al. Differentially Private Testing of Identity and Closeness of Discrete Distributions , 2017, NeurIPS.
[43] Pablo Piantanida,et al. On secure distributed hypothesis testing , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[44] Hossam M. H. Shalaby,et al. Multiterminal detection with zero-rate data compression , 1992, IEEE Trans. Inf. Theory.
[45] Anthony D. Miyazaki,et al. Consumer Perceptions of Privacy and Security Risks for Online Shopping , 2001 .
[46] Deniz Gündüz,et al. Distributed Hypothesis Testing Over Discrete Memoryless Channels , 2018, IEEE Transactions on Information Theory.
[47] Martin J. Wainwright,et al. Local privacy and statistical minimax rates , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[48] Tobias J. Oechtering,et al. Privacy Against a Hypothesis Testing Adversary , 2018, IEEE Transactions on Information Forensics and Security.
[49] Deniz Gündüz,et al. Optimal Utility-Privacy Trade-off with the Total Variation Distance as the Privacy Measure , 2018, ArXiv.
[50] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[51] Muriel Médard,et al. From the Information Bottleneck to the Privacy Funnel , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).
[52] Imre Csiszár,et al. Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .
[53] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[54] Gaurav Kumar Agarwal. On Information Theoretic and Distortion-based Security , 2019 .
[55] Robert G. Gallager,et al. A simple derivation of the coding theorem and some applications , 1965, IEEE Trans. Inf. Theory.
[56] Alexander Vardy,et al. Semantic Security for the Wiretap Channel , 2012, CRYPTO.
[57] Giuseppe Caire,et al. Optimum Power Control at Finite Blocklength , 2014, IEEE Transactions on Information Theory.
[58] H. Vincent Poor,et al. Privacy-Aware Smart Metering: Progress and Challenges , 2018, IEEE Signal Processing Magazine.
[59] Or Sheffet,et al. Locally Private Hypothesis Testing , 2018, ICML.
[60] H. Vincent Poor,et al. Lossless compression with security constraints , 2008, 2008 IEEE International Symposium on Information Theory.
[61] A. Wagner,et al. On the Optimality of Binning for Distributed Hypothesis Testing , 2010, IEEE Transactions on Information Theory.
[62] Paul W. Cuff,et al. Differential Privacy as a Mutual Information Constraint , 2016, CCS.
[63] Michèle Wigger,et al. On Hypothesis Testing Against Conditional Independence With Multiple Decision Centers , 2018, IEEE Transactions on Communications.
[64] Neri Merhav. On random coding error exponents of watermarking systems , 2000, IEEE Trans. Inf. Theory.
[65] V. Tan,et al. Hypothesis testing under maximal leakage privacy constraints , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[66] Lifeng Lai,et al. Distributed testing against independence with multiple terminals , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[67] Vincent Y. F. Tan,et al. Distributed Hypothesis Testing with Privacy Constraints , 2018, 2018 International Symposium on Information Theory and Its Applications (ISITA).
[68] Elisa Bertino,et al. Big Data - Security and Privacy , 2015, 2015 IEEE International Congress on Big Data.
[69] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[70] Deniz Gündüz,et al. Distributed hypothesis testing over noisy channels , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[71] H. Vincent Poor,et al. Discriminatory Lossy Source Coding: Side Information Privacy , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[72] Yuval Kochman,et al. On the Reliability Function of Distributed Hypothesis Testing Under Optimal Detection , 2019, IEEE Transactions on Information Theory.
[73] Flávio du Pin Calmon,et al. Privacy against statistical inference , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[74] Rudolf Ahlswede,et al. Hypothesis testing with communication constraints , 1986, IEEE Trans. Inf. Theory.
[75] Abbas El Gamal,et al. Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).