Gaussian differential privacy

J Dong, A Roth, WJ Su - Journal of the Royal Statistical Society …, 2022 - Wiley Online Library
In the past decade, differential privacy has seen remarkable success as a rigorous and
practical formalization of data privacy. This privacy definition and its divergence based …

UVeQFed: Universal vector quantization for federated learning

N Shlezinger, M Chen, YC Eldar… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Traditional deep learning models are trained at a centralized server using data samples
collected from users. Such data samples often include private information, which the users …

Frame averaging for invariant and equivariant network design

O Puny, M Atzmon, H Ben-Hamu, I Misra… - arxiv preprint arxiv …, 2021 - arxiv.org
Many machine learning tasks involve learning functions that are known to be invariant or
equivariant to certain symmetries of the input data. However, it is often challenging to design …

A perspective on massive random-access

Y Polyanskiy - 2017 IEEE International Symposium on …, 2017 - ieeexplore.ieee.org
This paper discusses the contemporary problem of providing multiple-access (MAC) to a
massive number of uncoordinated users. First, we define a random-access code for K a-user …

Information-theoretic analysis of generalization capability of learning algorithms

A Xu, M Raginsky - Advances in neural information …, 2017 - proceedings.neurips.cc
We derive upper bounds on the generalization error of a learning algorithm in terms of the
mutual information between its input and output. The bounds provide an information …

What's behind the mask: Understanding masked graph modeling for graph autoencoders

J Li, R Wu, W Sun, L Chen, S Tian, L Zhu… - Proceedings of the 29th …, 2023 - dl.acm.org
The last years have witnessed the emergence of a promising self-supervised learning
strategy, referred to as masked autoencoding. However, there is a lack of theoretical …

The information bottleneck problem and its applications in machine learning

Z Goldfeld, Y Polyanskiy - IEEE Journal on Selected Areas in …, 2020 - ieeexplore.ieee.org
Inference capabilities of machine learning (ML) systems skyrocketed in recent years, now
playing a pivotal role in various aspect of society. The goal in statistical learning is to use …

Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs

CZ Bai, F Pasqualetti, V Gupta - Automatica, 2017 - Elsevier
Consider a stochastic process being controlled across a communication channel. The
control signal that is transmitted across the control channel can be replaced by a malicious …

Securing approximate homomorphic encryption using differential privacy

B Li, D Micciancio, M Schultz-Wu, J Sorrell - Annual International …, 2022 - Springer
Recent work of Li and Micciancio (Eurocrypt 2021) has shown that the traditional formulation
of indistinguishability under chosen plaintext attack (IND-CPA) is not adequate to capture …

Oversquashing in gnns through the lens of information contraction and graph expansion

PK Banerjee, K Karhadkar, YG Wang… - 2022 58th Annual …, 2022 - ieeexplore.ieee.org
The quality of signal propagation in message-passing graph neural networks (GNNs)
strongly influences their expressivity as has been observed in recent works. In particular, for …