Privacy against an adversary (AD) that tries to detect the underlying privacy-sensitive data distribution is studied. The original data sequence is assumed to come from one of the two known distributions, and the privacy leakage is measured by the probability of error of the binary hypothesis test carried out by the AD. A management unit (MU) is allowed to manipulate the original data sequence in an online fashion while satisfying an average distortion constraint. The goal of the MU is to maximize the minimal type II probability of error subject to a constraint on the type I probability of error assuming an adversarial Neyman-Pearson test, or to maximize the minimal error probability assuming an adversarial Bayesian test. The asymptotic exp...
In this paper, the privacy leakage problem in an eavesdropped parallel distributed binary hypothesis...
We study the optimal control problem of the maximum a posteriori (MAP) state sequence detection of a...
With the rise of modern information technology and the Internet, the worldwide interconnectivity is ...
Privacy against an adversary (AD) that tries to detect the underlying privacy-sensitive data distrib...
Privacy against an adversary (AD) that tries to detect the underlying privacy-sensitive data distrib...
Privacy-preserving energy management is studied in the presence of a renewable energy source. It is ...
Privacy-preserving energy management is studied in the presence of a renewable energy source. It is ...
A distributed binary hypothesis testing (HT) problem involving two parties, a remote observer and a ...
In this paper, we study the problem of privacy information leakage in a smart grid. The privacy risk...
International audienceThis paper studies the statistical characterization of detecting an adversary ...
It is envisioned that future cyber-physical systems will provide a more convenient living and workin...
A distributed binary hypothesis testing problem involving two parties, a remote observer and a detec...
Abstract—We propose a general statistical inference framework to capture the privacy threat incurred...
In this paper, we consider privacy against hypothesis testing adversaries within a non-stochastic fr...
Abstract. This paper establishes the foundation for the performance measure-ments of privacy preserv...
In this paper, the privacy leakage problem in an eavesdropped parallel distributed binary hypothesis...
We study the optimal control problem of the maximum a posteriori (MAP) state sequence detection of a...
With the rise of modern information technology and the Internet, the worldwide interconnectivity is ...
Privacy against an adversary (AD) that tries to detect the underlying privacy-sensitive data distrib...
Privacy against an adversary (AD) that tries to detect the underlying privacy-sensitive data distrib...
Privacy-preserving energy management is studied in the presence of a renewable energy source. It is ...
Privacy-preserving energy management is studied in the presence of a renewable energy source. It is ...
A distributed binary hypothesis testing (HT) problem involving two parties, a remote observer and a ...
In this paper, we study the problem of privacy information leakage in a smart grid. The privacy risk...
International audienceThis paper studies the statistical characterization of detecting an adversary ...
It is envisioned that future cyber-physical systems will provide a more convenient living and workin...
A distributed binary hypothesis testing problem involving two parties, a remote observer and a detec...
Abstract—We propose a general statistical inference framework to capture the privacy threat incurred...
In this paper, we consider privacy against hypothesis testing adversaries within a non-stochastic fr...
Abstract. This paper establishes the foundation for the performance measure-ments of privacy preserv...
In this paper, the privacy leakage problem in an eavesdropped parallel distributed binary hypothesis...
We study the optimal control problem of the maximum a posteriori (MAP) state sequence detection of a...
With the rise of modern information technology and the Internet, the worldwide interconnectivity is ...