Skip to main content

Showing 1–50 of 225 results for author: Medard, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2409.02788  [pdf, other

    cs.NI cs.ET

    Enhancing 5G Performance: Reducing Service Time and Research Directions for 6G Standards

    Authors: Laura Landon, Vipindev Adat Vasudevan, Jaeweon Kim, Junmo Sung, Jeffery Tony Masters, Muriel Médard

    Abstract: This paper presents several methods for minimizing packet service time in networks using 5G and beyond. We propose leveraging network coding alongside Hybrid Automatic Repeat reQuest (HARQ) to reduce service time as well as optimizing Modulation and Coding Scheme (MCS) selection based on the service time. Our network coding approach includes a method to increase the number of packets in flight, ad… ▽ More

    Submitted 4 September, 2024; originally announced September 2024.

  2. arXiv:2406.11782  [pdf, ps, other

    cs.IT

    Soft-output Guessing Codeword Decoding

    Authors: Ken R. Duffy, Peihong Yuan, Joseph Griffin, Muriel Medard

    Abstract: We establish that it is possible to extract accurate blockwise and bitwise soft output from Guessing Codeword Decoding with minimal additional computational complexity by considering it as a variant of Guessing Random Additive Noise Decoding. Blockwise soft output can be used to control decoding misdetection rate while bitwise soft output results in a soft-input soft-output decoder that can be use… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  3. arXiv:2405.06773  [pdf, ps, other

    cs.IT

    A Monotone Circuit Construction for Individually-Secure Multi-Secret Sharing

    Authors: Cailyn Bass, Alejandro Cohen, Rafael G. L. D'Oliveira, Muriel Médard

    Abstract: In this work, we introduce a new technique for taking a single-secret sharing scheme with a general access structure and transforming it into an individually secure multi-secret sharing scheme where every secret has the same general access structure. To increase the information rate, we consider Individual Security which guarantees zero mutual information with each secret individually, for any una… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

  4. arXiv:2405.05107  [pdf, other

    cs.ET cs.AR eess.SY

    Leveraging AES Padding: dBs for Nothing and FEC for Free in IoT Systems

    Authors: Jongchan Woo, Vipindev Adat Vasudevan, Benjamin D. Kim, Rafael G. L. D'Oliveira, Alejandro Cohen, Thomas Stahlbuhk, Ken R. Duffy, Muriel Médard

    Abstract: The Internet of Things (IoT) represents a significant advancement in digital technology, with its rapidly growing network of interconnected devices. This expansion, however, brings forth critical challenges in data security and reliability, especially under the threat of increasing cyber vulnerabilities. Addressing the security concerns, the Advanced Encryption Standard (AES) is commonly employed… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

  5. arXiv:2404.17686  [pdf, other

    cs.NI cs.IT

    On the Benefits of Coding for Network Slicing

    Authors: Homa Esfahanizadeh, Vipindev Adat Vasudevan, Benjamin D. Kim, Shruti Siva, Jennifer Kim, Alejandro Cohen, Muriel Médard

    Abstract: Network slicing has emerged as an integral concept in 5G, aiming to partition the physical network infrastructure into isolated slices, customized for specific applications. We theoretically formulate the key performance metrics of an application, in terms of goodput and delivery delay, at a cost of network resources in terms of bandwidth. We explore an un-coded communication protocol that uses fe… ▽ More

    Submitted 26 April, 2024; originally announced April 2024.

  6. arXiv:2402.07229  [pdf, other

    cs.IT cs.AI

    Successive Refinement in Large-Scale Computation: Advancing Model Inference Applications

    Authors: Homa Esfahanizadeh, Alejandro Cohen, Shlomo Shamai, Muriel Medard

    Abstract: Modern computationally-intensive applications often operate under time constraints, necessitating acceleration methods and distribution of computational workloads across multiple entities. However, the outcome is either achieved within the desired timeline or not, and in the latter case, valuable resources are wasted. In this paper, we introduce solutions for layered-resolution computation. These… ▽ More

    Submitted 11 February, 2024; originally announced February 2024.

    Comments: 13 pages, partially appeared in proceedings of IEEE Cloudnet 2022, submitted and under review for IEEE Transactions on Signal Processing

  7. arXiv:2402.05132  [pdf, other

    cs.CL cs.IT

    TexShape: Information Theoretic Sentence Embedding for Language Models

    Authors: Kaan Kale, Homa Esfahanizadeh, Noel Elias, Oguzhan Baser, Muriel Medard, Sriram Vishwanath

    Abstract: With the exponential growth in data volume and the emergence of data-intensive applications, particularly in the field of machine learning, concerns related to resource utilization, privacy, and fairness have become paramount. This paper focuses on the textual domain of data and addresses challenges regarding encoding sentences to their optimized representations through the lens of information-the… ▽ More

    Submitted 11 May, 2024; v1 submitted 5 February, 2024; originally announced February 2024.

    Comments: Submitted to the 2024 IEEE International Symposium on Information Theory

  8. arXiv:2402.05004  [pdf, ps, other

    cs.IT

    Near-Optimal Generalized Decoding of Polar-like Codes

    Authors: Peihong Yuan, Ken R. Duffy, Muriel Médard

    Abstract: We present a framework that can exploit the tradeoff between the undetected error rate (UER) and block error rate (BLER) of polar-like codes. It is compatible with all successive cancellation (SC)-based decoding methods and relies on a novel approximation that we call codebook probability. This approximation is based on an auxiliary distribution that mimics the dynamics of decoding algorithms foll… ▽ More

    Submitted 2 May, 2024; v1 submitted 7 February, 2024; originally announced February 2024.

    Comments: being published at IEEE ISIT 2024

  9. arXiv:2310.20486  [pdf, ps, other

    cs.IT

    Optimal Binary Differential Privacy via Graphs

    Authors: Sahel Torkamani, Javad B. Ebrahimi, Parastoo Sadeghi, Rafael G. L. D'Oliveira, Muriel Médard

    Abstract: We present the notion of \emph{reasonable utility} for binary mechanisms, which applies to all utility functions in the literature. This notion induces a partial ordering on the performance of all binary differentially private (DP) mechanisms. DP mechanisms that are maximal elements of this ordering are optimal DP mechanisms for every reasonable utility. By looking at differential privacy as a ran… ▽ More

    Submitted 31 October, 2023; originally announced October 2023.

  10. arXiv:2310.10737  [pdf, ps, other

    cs.IT

    Soft-output (SO) GRAND and Iterative Decoding to Outperform LDPCs

    Authors: Peihong Yuan, Muriel Medard, Kevin Galligan, Ken R. Duffy

    Abstract: We establish that a large, flexible class of long, high redundancy error correcting codes can be efficiently and accurately decoded with guessing random additive noise decoding (GRAND). Performance evaluation demonstrates that it is possible to construct simple concatenated codes that outperform low-density parity-check (LDPC) codes found in the 5G New Radio standard in both additive white Gaussia… ▽ More

    Submitted 17 June, 2024; v1 submitted 16 October, 2023; originally announced October 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2305.05777

  11. arXiv:2309.08019  [pdf, other

    cs.CR cs.IT cs.LG

    CRYPTO-MINE: Cryptanalysis via Mutual Information Neural Estimation

    Authors: Benjamin D. Kim, Vipindev Adat Vasudevan, Jongchan Woo, Alejandro Cohen, Rafael G. L. D'Oliveira, Thomas Stahlbuhk, Muriel Médard

    Abstract: The use of Mutual Information (MI) as a measure to evaluate the efficiency of cryptosystems has an extensive history. However, estimating MI between unknown random variables in a high-dimensional space is challenging. Recent advances in machine learning have enabled progress in estimating MI using neural networks. This work presents a novel application of MI estimation in the field of cryptography… ▽ More

    Submitted 18 September, 2023; v1 submitted 14 September, 2023; originally announced September 2023.

  12. arXiv:2309.05871  [pdf, other

    cs.CR cs.IR cs.IT

    Generalized Rainbow Differential Privacy

    Authors: Yuzhou Gu, Ziqi Zhou, Onur Günlü, Rafael G. L. D'Oliveira, Parastoo Sadeghi, Muriel Médard, Rafael F. Schaefer

    Abstract: We study a new framework for designing differentially private (DP) mechanisms via randomized graph colorings, called rainbow differential privacy. In this framework, datasets are nodes in a graph, and two neighboring datasets are connected by an edge. Each dataset in the graph has a preferential ordering for the possible outputs of the mechanism, and these orderings are called rainbows. Different… ▽ More

    Submitted 5 April, 2024; v1 submitted 11 September, 2023; originally announced September 2023.

    Comments: arXiv admin note: text overlap with arXiv:2202.03974

  13. arXiv:2308.05063  [pdf, other

    cs.CR cs.AR cs.IT eess.SY

    CERMET: Coding for Energy Reduction with Multiple Encryption Techniques -- $It's\ easy\ being\ green$

    Authors: Jongchan Woo, Vipindev Adat Vasudevan, Benjamin Kim, Alejandro Cohen, Rafael G. L. D'Oliveira, Thomas Stahlbuhk, Muriel Médard

    Abstract: This paper presents CERMET, an energy-efficient hardware architecture designed for hardware-constrained cryptosystems. CERMET employs a base cryptosystem in conjunction with network coding to provide both information-theoretic and computational security while reducing energy consumption per bit. This paper introduces the hardware architecture for the system and explores various optimizations to en… ▽ More

    Submitted 9 August, 2023; originally announced August 2023.

  14. arXiv:2306.10135  [pdf, other

    cs.NI cs.IT

    Practical Sliding Window Recoder: Design, Analysis, and Usecases

    Authors: Vipindev Adat Vasudevan, Tarun Soni, Muriel Médard

    Abstract: Network coding has been widely used as a technology to ensure efficient and reliable communication. The ability to recode packets at the intermediate nodes is a major benefit of network coding implementations. This allows the intermediate nodes to choose a different code rate and fine-tune the outgoing transmission to the channel conditions, decoupling the requirement for the source node to compen… ▽ More

    Submitted 16 June, 2023; originally announced June 2023.

  15. arXiv:2306.04997  [pdf, other

    eess.SP cs.AI

    Blockage Prediction in Directional mmWave Links Using Liquid Time Constant Network

    Authors: Martin H. Nielsen, Chia-Yi Yeh, Ming Shen, Muriel Médard

    Abstract: We propose to use a liquid time constant (LTC) network to predict the future blockage status of a millimeter wave (mmWave) link using only the received signal power as the input to the system. The LTC network is based on an ordinary differential equation (ODE) system inspired by biology and specialized for near-future prediction for time sequence observation as the input. Using an experimental dat… ▽ More

    Submitted 8 June, 2023; originally announced June 2023.

    Comments: 2 pages, pre-print for IRMMW 2023 conference

  16. arXiv:2305.05777  [pdf, ps, other

    cs.IT

    Upgrade error detection to prediction with GRAND

    Authors: Kevin Galligan, Peihong Yuan, Muriel Médard, Ken R. Duffy

    Abstract: Guessing Random Additive Noise Decoding (GRAND) is a family of hard- and soft-detection error correction decoding algorithms that provide accurate decoding of any moderate redundancy code of any length. Here we establish a method through which any soft-input GRAND algorithm can provide soft output in the form of an accurate a posteriori estimate of the likelihood that a decoding is correct or, in… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

    Journal ref: 2023 IEEE Global Communications Conference (Globecom)

  17. arXiv:2305.03850  [pdf, other

    cs.IT

    A Non-Asymptotic Analysis of Mismatched Guesswork

    Authors: Alexander Mariona, Homa Esfahanizadeh, Rafael G. L. D'Oliveira, Muriel Médard

    Abstract: The problem of mismatched guesswork considers the additional cost incurred by using a guessing function which is optimal for a distribution $q$ when the random variable to be guessed is actually distributed according to a different distribution $p$. This problem has been well-studied from an asymptotic perspective, but there has been little work on quantifying the difference in guesswork between o… ▽ More

    Submitted 5 May, 2023; originally announced May 2023.

    Comments: 7 pages, 1 figure. Accepted to ISIT 2023

  18. arXiv:2304.00047  [pdf, other

    cs.LG cs.CR cs.IT

    PEOPL: Characterizing Privately Encoded Open Datasets with Public Labels

    Authors: Homa Esfahanizadeh, Adam Yala, Rafael G. L. D'Oliveira, Andrea J. D. Jaba, Victor Quach, Ken R. Duffy, Tommi S. Jaakkola, Vinod Vaikuntanathan, Manya Ghobadi, Regina Barzilay, Muriel Médard

    Abstract: Allowing organizations to share their data for training of machine learning (ML) models without unintended information leakage is an open problem in practice. A promising technique for this still-open problem is to train models on the encoded data. Our approach, called Privately Encoded Open Datasets with Public Labels (PEOPL), uses a certain class of randomly constructed transforms to encode sens… ▽ More

    Submitted 31 March, 2023; originally announced April 2023.

    Comments: Submitted to IEEE Transactions on Information Forensics and Security

  19. arXiv:2303.07461  [pdf, other

    cs.IT

    Using channel correlation to improve decoding -- ORBGRAND-AI

    Authors: Ken R. Duffy, Moritz Grundei, Muriel Medard

    Abstract: To meet the Ultra Reliable Low Latency Communication (URLLC) needs of modern applications, there have been significant advances in the development of short error correction codes and corresponding soft detection decoders. A substantial hindrance to delivering low-latency is, however, the reliance on interleaving to break up omnipresent channel correlations to ensure that decoder input matches deco… ▽ More

    Submitted 13 March, 2023; originally announced March 2023.

    Journal ref: 2023 IEEE Global Communications Conference (Globecom)

  20. arXiv:2301.09778  [pdf, other

    cs.IT

    GRAND-EDGE: A Universal, Jamming-resilient Algorithm with Error-and-Erasure Decoding

    Authors: Furkan Ercan, Kevin Galligan, David Starobinski, Muriel Medard, Ken R. Duffy, Rabia Tugce Yazicigil

    Abstract: Random jammers that overpower transmitted signals are a practical concern for many wireless communication protocols. As such, wireless receivers must be able to cope with standard channel noise and jamming (intentional or unintentional). To address this challenge, we propose a novel method to augment the resilience of the recent family of universal error-correcting GRAND algorithms. This method, c… ▽ More

    Submitted 23 January, 2023; originally announced January 2023.

    Comments: 7 pages, 7 figures, accepted for IEEE ICC 2023 conference

  21. arXiv:2212.05309  [pdf, other

    cs.IT

    Soft detection physical layer insecurity

    Authors: Ken R. Duffy, Muriel Medard

    Abstract: We establish that during the execution of any Guessing Random Additive Noise Decoding (GRAND) algorithm, an interpretable, useful measure of decoding confidence can be evaluated. This measure takes the form of a log-likelihood ratio (LLR) of the hypotheses that, should a decoding be found by a given query, the decoding is correct versus its being incorrect. That LLR can be used as soft output for… ▽ More

    Submitted 12 April, 2023; v1 submitted 10 December, 2022; originally announced December 2022.

    Journal ref: 2023 IEEE Global Communications Conference (Globecom)

  22. Physical layer insecurity

    Authors: Muriel Médard, Ken R. Duffy

    Abstract: In the classic wiretap model, Alice wishes to reliably communicate to Bob without being overheard by Eve who is eavesdropping over a degraded channel. Systems for achieving that physical layer security often rely on an error correction code whose rate is below the Shannon capacity of Alice and Bob's channel, so Bob can reliably decode, but above Alice and Eve's, so Eve cannot reliably decode. For… ▽ More

    Submitted 16 December, 2022; v1 submitted 2 December, 2022; originally announced December 2022.

    Journal ref: 57th Annual Conference on Information Sciences and Systems (CISS), 2023

  23. arXiv:2210.16187  [pdf, ps, other

    cs.IT

    GRAND-assisted Optimal Modulation

    Authors: Basak Ozaydin, Muriel Médard, Ken Duffy

    Abstract: Optimal modulation (OM) schemes for Gaussian channels with peak and average power constraints are known to require nonuniform probability distributions over signal points, which presents practical challenges. An established way to map uniform binary sources to non-uniform symbol distributions is to assign a different number of bits to different constellation points. Doing so, however, means that e… ▽ More

    Submitted 31 October, 2022; v1 submitted 28 October, 2022; originally announced October 2022.

    Comments: Presented at IEEE Globecom 2022

  24. InfoShape: Task-Based Neural Data Shaping via Mutual Information

    Authors: Homa Esfahanizadeh, William Wu, Manya Ghobadi, Regina Barzilay, Muriel Medard

    Abstract: The use of mutual information as a tool in private data sharing has remained an open challenge due to the difficulty of its estimation in practice. In this paper, we propose InfoShape, a task-based encoder that aims to remove unnecessary sensitive information from training data while maintaining enough relevant information for a particular ML training task. We achieve this goal by utilizing mutual… ▽ More

    Submitted 2 June, 2023; v1 submitted 26 October, 2022; originally announced October 2022.

    Comments: 5 pages, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

  25. arXiv:2210.04061  [pdf, other

    cs.IT cs.CR

    A General Security Approach for Soft-information Decoding against Smart Bursty Jammers

    Authors: Furkan Ercan, Kevin Galligan, Ken R. Duffy, Muriel Medard, David Starobinski, Rabia Tugce Yazicigil

    Abstract: Malicious attacks such as jamming can cause significant disruption or complete denial of service (DoS) to wireless communication protocols. Moreover, jamming devices are getting smarter, making them difficult to detect. Forward error correction, which adds redundancy to data, is commonly deployed to protect communications against the deleterious effects of channel noise. Soft-information error cor… ▽ More

    Submitted 8 October, 2022; originally announced October 2022.

    Comments: Accepted for GLOBECOM 2022 Workshops. Contains 7 pages and 7 figures

  26. arXiv:2208.07741  [pdf, other

    cs.IT cs.NI

    FlEC: Enhancing QUIC with application-tailored reliability mechanisms

    Authors: François Michel, Alejandro Cohen, Derya Malak, Quentin De Coninck, Muriel Médard, Olivier Bonaventure

    Abstract: Packet losses are common events in today's networks. They usually result in longer delivery times for application data since retransmissions are the de facto technique to recover from such losses. Retransmissions is a good strategy for many applications but it may lead to poor performance with latency-sensitive applications compared to network coding. Although different types of network coding tec… ▽ More

    Submitted 16 August, 2022; originally announced August 2022.

  27. arXiv:2208.05907  [pdf, other

    cs.IT cs.CR

    Absolute Security in High-Frequency Wireless Links

    Authors: Alejandro Cohen, Rafael G. L. D'Oliveira, Chia-Yi Yeh, Hichem Guerboukha, Rabi Shrestha, Zhaoji Fang, Edward Knightly, Muriel Médard, Daniel M. Mittleman

    Abstract: Security against eavesdropping is one of the key concerns in the design of any communication system. Many common considerations of the security of a wireless communication channel rely on comparing the signal level measured by Bob (the intended receiver) to that accessible to Eve (an eavesdropper). Frameworks such as Wyner's wiretap model ensure the security of a link, in an average sense, when Bo… ▽ More

    Submitted 11 August, 2022; originally announced August 2022.

  28. arXiv:2208.04977  [pdf, other

    cs.IT

    A Bivariate Invariance Principle

    Authors: Alexander Mariona, Homa Esfahanizadeh, Rafael G. L. D'Oliveira, Muriel Médard

    Abstract: A notable result from analysis of Boolean functions is the Basic Invariance Principle (BIP), a quantitative nonlinear generalization of the Central Limit Theorem for multilinear polynomials. We present a generalization of the BIP for bivariate multilinear polynomials, i.e., polynomials over two n-length sequences of random variables. This bivariate invariance principle arises from an iterative app… ▽ More

    Submitted 17 August, 2022; v1 submitted 9 August, 2022; originally announced August 2022.

    Comments: Accepted for presentation at ITW 2022

  29. arXiv:2208.01437  [pdf, other

    cs.DC cs.IT

    Distributed Computations with Layered Resolution

    Authors: Homa Esfahanizadeh, Alejandro Cohen, Muriel Médard, Shlomo Shamai

    Abstract: Modern computationally-heavy applications are often time-sensitive, demanding distributed strategies to accelerate them. On the other hand, distributed computing suffers from the bottleneck of slow workers in practice. Distributed coded computing is an attractive solution that adds redundancy such that a subset of distributed computations suffices to obtain the final result. However, the final res… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

  30. arXiv:2207.11991  [pdf, other

    cs.IT

    Soft decoding without soft demapping with ORBGRAND

    Authors: Wei An, Muriel Medard, Ken R. Duffy

    Abstract: For spectral efficiency, higher order modulation symbols confer information on more than one bit. As soft detection forward error correction decoders assume the availability of information at binary granularity, however, soft demappers are required to compute per-bit reliabilities from complex-valued signals. Here we show that the recently introduced universal soft detection decoder ORBGRAND can b… ▽ More

    Submitted 25 July, 2022; originally announced July 2022.

    Journal ref: 2023 IEEE International Symposium on Information Theory (ISIT)

  31. Contention Resolution for Coded Radio Networks

    Authors: Michael A. Bender, Seth Gilbert, Fabian Kuhn, John Kuszmaul, Muriel Médard

    Abstract: Randomized backoff protocols, such as exponential backoff, are a powerful tool for managing access to a shared resource, often a wireless communication channel (e.g., [1]). For a wireless device to transmit successfully, it uses a backoff protocol to ensure exclusive access to the channel. Modern radios, however, do not need exclusive access to the channel to communicate; in particular, they have… ▽ More

    Submitted 24 July, 2022; originally announced July 2022.

    Comments: 12 pages

    ACM Class: F.2.2

    Journal ref: In Proceedings of the 34th ACM Symposium on Parallelism in Algorithms and Architectures, pp. 119-130. 2022

  32. arXiv:2207.11149  [pdf, other

    cs.IT

    Block turbo decoding with ORBGRAND

    Authors: Kevin Galligan, Muriel Médard, Ken R. Duffy

    Abstract: Guessing Random Additive Noise Decoding (GRAND) is a family of universal decoding algorithms suitable for decoding any moderate redundancy code of any length. We establish that, through the use of list decoding, soft-input variants of GRAND can replace the Chase algorithm as the component decoder in the turbo decoding of product codes. In addition to being able to decode arbitrary product codes, r… ▽ More

    Submitted 9 August, 2022; v1 submitted 22 July, 2022; originally announced July 2022.

  33. GRAND for Fading Channels using Pseudo-soft Information

    Authors: Hadi Sarieddeen, Muriel Médard, Ken. R. Duffy

    Abstract: Guessing random additive noise decoding (GRAND) is a universal maximum-likelihood decoder that recovers code-words by guessing rank-ordered putative noise sequences and inverting their effect until one or more valid code-words are obtained. This work explores how GRAND can leverage additive-noise statistics and channel-state information in fading channels. Instead of computing per-bit reliability… ▽ More

    Submitted 2 September, 2022; v1 submitted 21 July, 2022; originally announced July 2022.

    Comments: To appear in the IEEE GLOBECOM 2022 proceedings. arXiv admin note: text overlap with arXiv:2207.10836

    Journal ref: 2022 IEEE Global Communications Conference

  34. Soft-input, soft-output joint detection and GRAND

    Authors: Hadi Sarieddeen, Muriel Médard, Ken. R. Duffy

    Abstract: Guessing random additive noise decoding (GRAND) is a maximum likelihood (ML) decoding method that identifies the noise effects corrupting code-words of arbitrary code-books. In a joint detection and decoding framework, this work demonstrates how GRAND can leverage crude soft information in received symbols and channel state information to generate, through guesswork, soft bit reliability outputs i… ▽ More

    Submitted 2 September, 2022; v1 submitted 21 July, 2022; originally announced July 2022.

    Comments: To appear in the IEEE GLOBECOM 2022 proceedings

    Journal ref: 2022 IEEE Global Communications Conference

  35. arXiv:2205.15831  [pdf, other

    cs.IT eess.SP

    Wideband Time Frequency Coding

    Authors: Kathleen Yang, Salman Salamatian, Rafael G. L . D'Oliveira, Muriel Medard

    Abstract: In the wideband regime, the performance of many of the popular modulation schemes such as code division multiple access and orthogonal frequency division multiplexing falls quickly without channel state information. Obtaining the amount of channel information required for these techniques to work is costly and difficult, which suggests the need for schemes which can perform well without channel st… ▽ More

    Submitted 31 May, 2022; originally announced May 2022.

  36. arXiv:2205.00793  [pdf, other

    cs.IT cs.NI

    Ultra-Reliable Low-Latency Millimeter-Wave Communications with Sliding Window Network Coding

    Authors: Eurico Dias, Duarte Raposo, Homa Esfahanizadeh, Alejandro Cohen, Tânia Ferreira, Miguel Luís, Susana Sargento, Muriel Médard

    Abstract: Ultra-reliability and low-latency are pivotal requirements of the new 6th generation of communication systems (xURLLC). Over the past years, to increase throughput, adaptive active antennas were introduced in advanced wireless communications, specifically in the domain of millimeter-wave (mmWave). Consequently, new lower-layer techniques were proposed to cope with practical challenges of high dime… ▽ More

    Submitted 15 September, 2022; v1 submitted 2 May, 2022; originally announced May 2022.

  37. arXiv:2204.13195  [pdf, other

    cs.DC cs.IT

    Stream Iterative Distributed Coded Computing for Learning Applications in Heterogeneous Systems

    Authors: Homa Esfahanizadeh, Alejandro Cohen, Muriel Medard

    Abstract: To improve the utility of learning applications and render machine learning solutions feasible for complex applications, a substantial amount of heavy computations is needed. Thus, it is essential to delegate the computations among several workers, which brings up the major challenge of coping with delays and failures caused by the system's heterogeneity and uncertainties. In particular, minimizin… ▽ More

    Submitted 27 April, 2022; originally announced April 2022.

    Comments: Accepted to appear in IEEE International Conference on Computer Communications (IEEE Infocom)

  38. arXiv:2203.15429  [pdf, ps, other

    cs.DS cs.IT

    Heterogeneous Differential Privacy via Graphs

    Authors: Sahel Torkamani, Javad B. Ebrahimi, Parastoo Sadeghi, Rafael G. L. D'Oliveira, Muriel Medard

    Abstract: We generalize a previous framework for designing utility-optimal differentially private (DP) mechanisms via graphs, where datasets are vertices in the graph and edges represent dataset neighborhood. The boundary set contains datasets where an individual's response changes the binary-valued query compared to its neighbors. Previous work was limited to the homogeneous case where the privacy paramete… ▽ More

    Submitted 29 March, 2022; originally announced March 2022.

  39. arXiv:2203.13552  [pdf, ps, other

    cs.IT

    On the Role of Quantization of Soft Information in GRAND

    Authors: Peihong Yuan, Ken R. Duffy, Evan P. Gabhart, Muriel Médard

    Abstract: In this work, we investigate guessing random additive noise decoding (GRAND) with quantized soft input. First, we analyze the achievable rate of ordered reliability bits GRAND (ORBGRAND), which uses the rank order of the reliability as quantized soft information. We show that multi-line ORBGRAND can approach capacity for any signal-to-noise ratio (SNR). We then introduce discretized soft GRAND (DS… ▽ More

    Submitted 24 November, 2022; v1 submitted 25 March, 2022; originally announced March 2022.

  40. arXiv:2203.12047  [pdf, other

    cs.IT cs.CR

    AES as Error Correction: Cryptosystems for Reliable Communication

    Authors: Alejandro Cohen, Rafael G. L. D'Oliveira, Ken R. Duffy, Jongchan Woo, Muriel Médard

    Abstract: In this paper, we show that the Advanced Encryption Standard (AES) cryptosystem can be used as an error-correcting code to obtain reliability over noisy communication and data systems. Moreover, we characterize a family of computational cryptosystems that can potentially be used as well performing error correcting codes. In particular, we show that simple padding followed by a cryptosystem with un… ▽ More

    Submitted 9 September, 2022; v1 submitted 22 March, 2022; originally announced March 2022.

  41. Ordered Reliability Bits Guessing Random Additive Noise Decoding

    Authors: Ken R. Duffy, Wei An, Muriel Medard

    Abstract: Error correction techniques traditionally focus on the co-design of restricted code-structures in tandem with code-specific decoders that are computationally efficient when decoding long codes in hardware. Modern applications are, however, driving demand for ultra-reliable low-latency communications (URLLC), rekindling interest in the performance of shorter, higher-rate error correcting codes, and… ▽ More

    Submitted 29 August, 2022; v1 submitted 28 February, 2022; originally announced February 2022.

    MSC Class: 94A15; 68P30

  42. arXiv:2202.03974  [pdf, other

    cs.CR cs.IR cs.IT cs.LG

    Rainbow Differential Privacy

    Authors: Ziqi Zhou, Onur Günlü, Rafael G. L. D'Oliveira, Muriel Médard, Parastoo Sadeghi, Rafael F. Schaefer

    Abstract: We extend a previous framework for designing differentially private (DP) mechanisms via randomized graph colorings that was restricted to binary functions, corresponding to colorings in a graph, to multi-valued functions. As before, datasets are nodes in the graph and any two neighboring datasets are connected by an edge. In our setting, we assume that each dataset has a preferential ordering for… ▽ More

    Submitted 13 May, 2022; v1 submitted 8 February, 2022; originally announced February 2022.

    Comments: To appear in the 2022 IEEE International Symposium on Information Theory

  43. arXiv:2202.03018  [pdf, other

    cs.IT

    Broadcast Approach Meets Network Coding for Data Streaming

    Authors: Alejandro Cohen, Muriel Médard, Shlomo Shamai

    Abstract: For data streaming applications, existing solutions are not yet able to close the gap between high data rates and low delay. This work considers the problem of data streaming under mixed delay constraints over a single communication channel with delayed feedback. We propose a novel layered adaptive causal random linear network coding (LAC-RLNC) approach with forward error correction. LAC-RLNC is a… ▽ More

    Submitted 7 February, 2022; originally announced February 2022.

  44. arXiv:2202.03002  [pdf, other

    cs.IT cs.CR

    Partial Encryption after Encoding for Security and Reliability in Data Systems

    Authors: Alejandro Cohen, Rafael G. L. D'Oliveira, Ken R. Duffy, Muriel Médard

    Abstract: We consider the problem of secure and reliable communication over a noisy multipath network. Previous work considering a noiseless version of our problem proposed a hybrid universal network coding cryptosystem (HUNCC). By combining an information-theoretically secure encoder together with partial encryption, HUNCC is able to obtain security guarantees, even in the presence of an all-observing eave… ▽ More

    Submitted 7 February, 2022; originally announced February 2022.

  45. arXiv:2201.12406  [pdf, other

    cs.LG cs.CR cs.CV

    Syfer: Neural Obfuscation for Private Data Release

    Authors: Adam Yala, Victor Quach, Homa Esfahanizadeh, Rafael G. L. D'Oliveira, Ken R. Duffy, Muriel Médard, Tommi S. Jaakkola, Regina Barzilay

    Abstract: Balancing privacy and predictive utility remains a central challenge for machine learning in healthcare. In this paper, we develop Syfer, a neural obfuscation method to protect against re-identification attacks. Syfer composes trained layers with random neural networks to encode the original data (e.g. X-rays) while maintaining the ability to predict diagnoses from the encoded data. The randomness… ▽ More

    Submitted 28 January, 2022; originally announced January 2022.

  46. arXiv:2108.06409  [pdf, other

    cs.IT

    Post-Quantum Security for Ultra-Reliable Low-Latency Heterogeneous Networks

    Authors: Rafael G. L. D'Oliveira, Alejandro Cohen, John Robinson, Thomas Stahlbuhk, Muriel Médard

    Abstract: We consider the problem of post-quantum secure and ultra-reliable communication through a heterogeneous network consisting of multiple connections. Three performance metrics are considered: security, throughput, and in-order delivery delay. In this setting, previous work has looked, individually, at the trade-offs between in-order delivery delay and throughput, and between security and throughput.… ▽ More

    Submitted 13 August, 2021; originally announced August 2021.

  47. arXiv:2106.02484  [pdf, other

    cs.CR cs.AI

    NeuraCrypt: Hiding Private Health Data via Random Neural Networks for Public Training

    Authors: Adam Yala, Homa Esfahanizadeh, Rafael G. L. D' Oliveira, Ken R. Duffy, Manya Ghobadi, Tommi S. Jaakkola, Vinod Vaikuntanathan, Regina Barzilay, Muriel Medard

    Abstract: Balancing the needs of data privacy and predictive utility is a central challenge for machine learning in healthcare. In particular, privacy concerns have led to a dearth of public datasets, complicated the construction of multi-hospital cohorts and limited the utilization of external machine learning resources. To remedy this, new methods are required to enable data owners, such as hospitals, to… ▽ More

    Submitted 4 June, 2021; originally announced June 2021.

  48. CRC Codes as Error Correction Codes

    Authors: Wei An, Muriel Médard, Ken R. Duffy

    Abstract: CRC codes have long since been adopted in a vast range of applications. The established notion that they are suitable primarily for error detection can be set aside through use of the recently proposed Guessing Random Additive Noise Decoding (GRAND). Hard-detection (GRAND-SOS) and soft-detection (ORBGRAND) variants can decode any short, high-rate block code, making them suitable for error correcti… ▽ More

    Submitted 28 April, 2021; originally announced April 2021.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

    Journal ref: IEEE ICC 2021

  49. arXiv:2103.01921  [pdf, other

    cs.IT

    Stream Distributed Coded Computing

    Authors: Alejandro Cohen, Guillaume Thiran, Homa Esfahanizadeh, Muriel Médard

    Abstract: The emerging large-scale and data-hungry algorithms require the computations to be delegated from a central server to several worker nodes. One major challenge in the distributed computations is to tackle delays and failures caused by the stragglers. To address this challenge, introducing efficient amount of redundant computations via distributed coded computation has received significant attentio… ▽ More

    Submitted 2 March, 2021; originally announced March 2021.

  50. arXiv:2102.05172  [pdf, ps, other

    cs.IT

    Differential Privacy for Binary Functions via Randomized Graph Colorings

    Authors: Rafael G. L. D'Oliveira, Muriel Medard, Parastoo Sadeghi

    Abstract: We present a framework for designing differentially private (DP) mechanisms for binary functions via a graph representation of datasets. Datasets are nodes in the graph and any two neighboring datasets are connected by an edge. The true binary function we want to approximate assigns a value (or true color) to a dataset. Randomized DP mechanisms are then equivalent to randomized colorings of the gr… ▽ More

    Submitted 9 February, 2021; originally announced February 2021.

    Comments: Submitted to IEEE ISIT 2021