Information about the system state is obtained through noisy sensor measurements. This data is coded and transmitted to a trusted user through an unsecured communication network. We aim at keeping the system state private; however, because the network is not secure, opponents might access sensor data, which can be used to estimate the state. To prevent this, before transmission, we randomize coded sensor data by passing it through a probabilistic mapping, and send the corrupted data to the trusted user. Making use of the data processing inequality, we cast the synthesis of the probabilistic mapping as a convex program where we minimize the mutual information (our privacy metric) between two estimators, one constructed using the randomized s...
In the activities of data sharing and decentralized processing, data belonging to a user need to be ...
We study the problem of remote state estimation in the presence of a passive eavesdropper, under the...
With the emergence of many modern automated systems around us that rely heavily on the private data ...
Information about the system state is obtained through noisy sensor measurements. This data is coded...
Information about the system state is obtained through noisy sensor measurements. This data is coded...
Information about the system state is obtained through noisy sensor measurements. This data is coded...
We address the problem of maximizing privacy of stochastic dynamical systems whose state information...
We address the problem of maximizing privacy of stochastic dynamical systems whose state information...
We address the problem of maximizing privacy of stochastic dynamical systems whose state information...
We address the problem of maximizing privacy of stochastic dynamical systems whose state information...
We address the problem of maximizing privacy of stochastic dynamical systems whose state information...
We address the problem of synthesizing distorting mechanisms that maximize privacy of stochastic dyn...
We address the problem of synthesizing distorting mechanisms that maximize privacy of stochastic dyn...
We address the problem of maximizing privacy of stochastic dynamical systems whose state information...
We address the problem of maximizing privacy of stochastic dynamical systems whose state information...
In the activities of data sharing and decentralized processing, data belonging to a user need to be ...
We study the problem of remote state estimation in the presence of a passive eavesdropper, under the...
With the emergence of many modern automated systems around us that rely heavily on the private data ...
Information about the system state is obtained through noisy sensor measurements. This data is coded...
Information about the system state is obtained through noisy sensor measurements. This data is coded...
Information about the system state is obtained through noisy sensor measurements. This data is coded...
We address the problem of maximizing privacy of stochastic dynamical systems whose state information...
We address the problem of maximizing privacy of stochastic dynamical systems whose state information...
We address the problem of maximizing privacy of stochastic dynamical systems whose state information...
We address the problem of maximizing privacy of stochastic dynamical systems whose state information...
We address the problem of maximizing privacy of stochastic dynamical systems whose state information...
We address the problem of synthesizing distorting mechanisms that maximize privacy of stochastic dyn...
We address the problem of synthesizing distorting mechanisms that maximize privacy of stochastic dyn...
We address the problem of maximizing privacy of stochastic dynamical systems whose state information...
We address the problem of maximizing privacy of stochastic dynamical systems whose state information...
In the activities of data sharing and decentralized processing, data belonging to a user need to be ...
We study the problem of remote state estimation in the presence of a passive eavesdropper, under the...
With the emergence of many modern automated systems around us that rely heavily on the private data ...