In this paper, the privacy problem of a tandem distributed detection system vulnerable to an eavesdropper is proposed and studied in the Bayesian formulation. The privacy risk is evaluated by the detection cost of the eavesdropper which is assumed to be informed and greedy. For the sensors whose operations are constrained to suppress the privacy risk, it is shown that the optimal detection strategies are likelihood-ratio tests. This fundamental insight allows for the optimization to reuse known algorithms extended to incorporate the privacy constraint. The trade-off between the detection performance and privacy risk is illustrated in an example.QC 20150123. QC 20160314</p
Privacy against an adversary (AD) that tries to detect the underlying privacy-sensitive data distrib...
We study how to communicate findings of Bayesian inference to third parties, while preserving the st...
Distributed data mining applications, such as those dealing with health care, finance, counter-terro...
In this paper, the privacy problem of a tandem distributed detection system vulnerable to an eavesdr...
In this paper, the differential privacy problem in parallel distributed detections is studied in the...
We study the eavesdropping problem in the remotely distributed sensing of a privacy-sensible hypothe...
In this paper, eavesdropping in parallel distributed sequential detections is considered. The privac...
The data collected by sensor networks often contain sensitive information and care must be taken to ...
A distributed binary hypothesis testing (HT) problem involving two parties, a remote observer and a ...
We consider a decentralized detection network whose aim is to infer a public hypothesis of interest....
A distributed binary hypothesis testing problem involving two parties, a remote observer and a detec...
[ANGLÈS] The recent studies about sensor networks are the cause of a fast development of wireless co...
A privacy-constrained information extraction problem is considered where for a pair of correlated di...
In this paper, the privacy leakage problem in an eavesdropped parallel distributed binary hypothesis...
Privacy against an adversary (AD) that tries to detect the underlying privacy-sensitive data distrib...
Privacy against an adversary (AD) that tries to detect the underlying privacy-sensitive data distrib...
We study how to communicate findings of Bayesian inference to third parties, while preserving the st...
Distributed data mining applications, such as those dealing with health care, finance, counter-terro...
In this paper, the privacy problem of a tandem distributed detection system vulnerable to an eavesdr...
In this paper, the differential privacy problem in parallel distributed detections is studied in the...
We study the eavesdropping problem in the remotely distributed sensing of a privacy-sensible hypothe...
In this paper, eavesdropping in parallel distributed sequential detections is considered. The privac...
The data collected by sensor networks often contain sensitive information and care must be taken to ...
A distributed binary hypothesis testing (HT) problem involving two parties, a remote observer and a ...
We consider a decentralized detection network whose aim is to infer a public hypothesis of interest....
A distributed binary hypothesis testing problem involving two parties, a remote observer and a detec...
[ANGLÈS] The recent studies about sensor networks are the cause of a fast development of wireless co...
A privacy-constrained information extraction problem is considered where for a pair of correlated di...
In this paper, the privacy leakage problem in an eavesdropped parallel distributed binary hypothesis...
Privacy against an adversary (AD) that tries to detect the underlying privacy-sensitive data distrib...
Privacy against an adversary (AD) that tries to detect the underlying privacy-sensitive data distrib...
We study how to communicate findings of Bayesian inference to third parties, while preserving the st...
Distributed data mining applications, such as those dealing with health care, finance, counter-terro...