liu.seSearch for publications in DiVA
Change search
Link to record
Permanent link

Direct link
Publications (9 of 9) Show all publications
Gu, Y., Zhou, Z., Günlü, O., D'Oliveira, R. G. L., Sadeghi, P., Médard, M. & Schaefer, R. F. (2024). Generalized Rainbow Differential Privacy. Journal of Privacy and Confidentiality, 14(2)
Open this publication in new window or tab >>Generalized Rainbow Differential Privacy
Show others...
2024 (English)In: Journal of Privacy and Confidentiality, E-ISSN 2575-8527, Vol. 14, no 2Article in journal (Refereed) Published
Abstract [en]

We study a new framework for designing differentially private (DP) mechanisms via randomized graph colorings, called rainbow differential privacy. In this framework, datasets are nodes in a graph, and two neighboring datasets are connected by an edge. Each dataset in the graph has a preferential ordering for the possible outputs of the mechanism, and these orderings are called rainbows. Different rainbows partition the graph of connected datasets into different regions. We show that if a DP mechanism at the boundary of such regions is fixed and it behaves identically for all same-rainbow boundary datasets, then a unique optimal (ϵ, δ)-DP mechanism exists (as long as the boundary condition is valid) and can be expressed in closed-form. Our proof technique is based on an interesting relationship between dominance ordering and DP, which applies to any finite number of colors and for (ϵ, δ)-DP, improving upon previous results that only apply to at most three colors and for ϵ-DP. We justify the homogeneous boundary condition assumption by giving an example with non-homogeneous boundary condition, for which there exists no optimal DP mechanism.

Keywords
differential privacy, optimal mechanism, dominance ordering
National Category
Communication Systems Signal Processing
Identifiers
urn:nbn:se:liu:diva-208973 (URN)10.29012/jpc.896 (DOI)2-s2.0-85197463285 (Scopus ID)
Funder
German Research Foundation (DFG), 390696704Australian Research Council, FT190100429
Available from: 2024-10-30 Created: 2024-10-30 Last updated: 2025-02-27Bibliographically approved
Welling, T., Günlü, O. & Yener, A. (2024). Low-latency Secure Integrated Sensing and Communication with Transmitter Actions. In: 2024 IEEE 25th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC): . Paper presented at IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Lucca, Italy, 10-13 September, 2024 (pp. 351-355). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Low-latency Secure Integrated Sensing and Communication with Transmitter Actions
2024 (English)In: 2024 IEEE 25th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Institute of Electrical and Electronics Engineers (IEEE), 2024, p. 351-355Conference paper, Published paper (Refereed)
Abstract [en]

This paper considers an information theoretic model of secure integrated sensing and communication, represented as a wiretap channel with action dependent states. This model allows securing part of a transmitted message against a sensed target that eavesdrops the communication, while enabling transmitter actions to change the channel statistics. An exact secrecy-distortion region is given for a physically-degraded channel. A finite-length achievability region is established for the model using an output statistics of random binning method, giving an achievable bound for low-latency applications.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Series
IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC), E-ISSN 1948-3252
Keywords
integrated sensing and communication, wiretap channel, secure communications, finite blocklength analysis
National Category
Communication Systems Signal Processing Telecommunications
Identifiers
urn:nbn:se:liu:diva-208979 (URN)10.1109/spawc60668.2024.10694269 (DOI)001337964100071 ()2-s2.0-85207103111 (Scopus ID)9798350393187 (ISBN)9798350393194 (ISBN)
Conference
IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Lucca, Italy, 10-13 September, 2024
Note

Funding Agencies|U.S. Department of Transportation [69A3552348327]; CARMEN+ University Transportation Center, ZENITH Research and Leadership Career Development Fund; Chalmers Transport Area of Advance; ELLIIT

Available from: 2024-10-30 Created: 2024-10-30 Last updated: 2025-01-16Bibliographically approved
Sasi, S., Günlü, O. & Rajan, B. S. (2024). Multi-access Distributed Computing Models using Map-Reduce Arrays. In: 2024 IEEE International Symposium on Information Theory (ISIT): . Paper presented at IEEE International Symposium on Information Theory (ISIT), Athens, Greece, 07-12 July, 2024 (pp. 1355-1360). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Multi-access Distributed Computing Models using Map-Reduce Arrays
2024 (English)In: 2024 IEEE International Symposium on Information Theory (ISIT), Institute of Electrical and Electronics Engineers (IEEE), 2024, p. 1355-1360Conference paper, Published paper (Refereed)
Abstract [en]

A novel distributed computing model called Multiaccess Distributed Computing (MADC) was recently introduced in [B. Federico and P. Elia, "Multi-Access Distributed Computing," June 2022, [online] Available: http://www.arXiv:2206.12851]. The MADC models with Combinatorial Topology (CT) were studied, where there are Lambda mapper nodes and K = ((Lambda)(alpha)) reducer nodes with each reducer node connected to distinct ff mapper nodes. In this paper, we represent MADC models via 2-layered bipartite graphs called Map-Reduce Graphs (MRGs), and a set of arrays called Map-Reduce Arrays (MRAs) inspired from the Placement Delivery Arrays (PDAs) used in the coded caching literature. The connection between MRAs and MRGs is established, thereby providing coded shuffling schemes for the MADC models using the structure of MRAs. Moreover, a set of gregular MRAs is provided which corresponds to the existing scheme for MADC models with CT. One of the major limitations of the existing scheme for CT is that it requires an exponentially large number of reducer nodes for large Lambda. This can be overcome by representing CT by MRAs, where coding schemes can be derived even if some of the reducer nodes are not present.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Series
IEEE International Symposium on Information Theory, ISSN 2157-8095, E-ISSN 2157-8117
National Category
Communication Systems Computer Systems Signal Processing
Identifiers
urn:nbn:se:liu:diva-208980 (URN)10.1109/isit57864.2024.10619355 (DOI)001304426901036 ()2-s2.0-85202898675 (Scopus ID)9798350382846 (ISBN)9798350382853 (ISBN)
Conference
IEEE International Symposium on Information Theory (ISIT), Athens, Greece, 07-12 July, 2024
Funder
ELLIIT - The Linköping‐Lund Initiative on IT and Mobile Communications
Note

Funding Agencies|Science and Engineering Research Board (SERB) of Department of Science and Technology (DST), Government of India; ZENITH Research and Leadership Career Development Fund; ELLIIT funding endowed by the Swedish government

Available from: 2024-10-30 Created: 2024-10-30 Last updated: 2025-03-20Bibliographically approved
Günlü, O., Bloch, M., Schaefer, R. F. & Yener, A. (2024). Nonasymptotic Performance Limits of Low-Latency Secure Integrated Sensing and Communication Systems. In: ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP): . Paper presented at IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Seoul, Republic of Korea, 14-19 April, 2024 (pp. 12971-12975). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Nonasymptotic Performance Limits of Low-Latency Secure Integrated Sensing and Communication Systems
2024 (English)In: ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Institute of Electrical and Electronics Engineers (IEEE), 2024, p. 12971-12975Conference paper, Published paper (Refereed)
Abstract [en]

This paper considers an information theoretic model for secure integrated sensing and communication (ISAC) with the goal of establishing fundamental limits in low-latency scenarios. In this secure ISAC model, a message is transmitted through a state-dependent wiretap channel with decoder-side state availability. The model is studied under a strong secrecy constraint when only a part of the transmitted message should be kept secret. First, the secrecy-distortion rate region is established for a degraded channel by treating the model as a special case of a feed-backed secure ISAC model. Finite-length inner bounds are then proved by applying nonasymptotic random binning techniques. Bounds on the rates have a similar form to common finite-length bounds, and the distortion bound follows from a bound for letter-typical sequences.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Series
International Conference on Acoustics, Speech, and Signal Processing (ICASSP), ISSN 1520-6149, E-ISSN 2379-190X
Keywords
integrated sensing and communication, joint communication and sensing, physical layer security, coding for security, finite blocklength analysis
National Category
Communication Systems Signal Processing Computer Systems
Identifiers
urn:nbn:se:liu:diva-208983 (URN)10.1109/icassp48485.2024.10448166 (DOI)001396233806043 ()9798350344851 (ISBN)9798350344868 (ISBN)
Conference
IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Seoul, Republic of Korea, 14-19 April, 2024
Funder
ELLIIT - The Linköping‐Lund Initiative on IT and Mobile Communications
Note

Funding Agencies|German Federal Ministry of Education and Research (BMBF) [16KISK001K, 16KIS1004]; German Research Foundation (DFG) as part of Germany's Excellence Strategy [EXC 2050/1, 390696704]; ZENITH Research and Leadership Career Development Fund; Swedish government; National Science Foundation (NSF) as part of the Resilient & Intelligent NextG Systems (RINGS) program [CCF 1955401, 2148400]

Available from: 2024-10-30 Created: 2024-10-30 Last updated: 2025-03-20
Sasi, S. & Günlü, O. (2024). Rate-Limited Shuffling for Distributed Computing. In: 2024 IEEE International Symposium on Information Theory (ISIT): . Paper presented at IEEE International Symposium on Information Theory (ISIT), Athens, Greece, 07-12 July, 2024 (pp. 2778-2783). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Rate-Limited Shuffling for Distributed Computing
2024 (English)In: 2024 IEEE International Symposium on Information Theory (ISIT), Institute of Electrical and Electronics Engineers (IEEE), 2024, p. 2778-2783Conference paper, Published paper (Refereed)
Abstract [en]

This paper studies the shuffling phase in a distributed computing model with rate-limited links between nodes. Each node is connected to all other nodes via a noiseless broadcast link with a finite capacity. For this network, the shuffling phase is described as a distributed index-coding problem to extend an outer bound for the latter to the distributed computing problem. An inner bound on the capacity region is also established by using the distributed composite-coding scheme introduced for the distributed index-coding problem. We consider some special cases of the distributed computing problem through two examples for which we prove that the inner and outer bounds agree, thereby establishing the capacity regions. We, then, generalize the special cases to any number of nodes and computation loads under certain constraints.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Series
IEEE International Symposium on Information Theory, ISSN 2157-8095, E-ISSN 2157-8117
National Category
Communication Systems Computer Systems Signal Processing Telecommunications
Identifiers
urn:nbn:se:liu:diva-208982 (URN)10.1109/isit57864.2024.10619554 (DOI)001304426902152 ()2-s2.0-85202853613 (Scopus ID)9798350382846 (ISBN)9798350382853 (ISBN)
Conference
IEEE International Symposium on Information Theory (ISIT), Athens, Greece, 07-12 July, 2024
Funder
ELLIIT - The Linköping‐Lund Initiative on IT and Mobile Communications
Note

Funding Agencies|ZENITH Research and Leadership Career Development Fund; ELLIIT funding endowed by the Swedish government

Available from: 2024-10-30 Created: 2024-10-30 Last updated: 2025-03-20Bibliographically approved
Sasi, S. & Günlü, O. (2024). Secure Coded Distributed Computing. In: 2024 IEEE 25th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC): . Paper presented at IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Lucca, Italy, 10-13 September, 2024 (pp. 811-815). IEEE
Open this publication in new window or tab >>Secure Coded Distributed Computing
2024 (English)In: 2024 IEEE 25th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), IEEE, 2024, p. 811-815Conference paper, Published paper (Refereed)
Abstract [en]

We consider two critical aspects of security in the distributed computing (DC) model: secure data shuffling and secure coded computing. It is imperative that any external entity overhearing the transmissions does not gain any information about the intermediate values (IVs) exchanged during the shuffling phase of the DC model. Our approach ensures IV confidentiality during data shuffling. Moreover, each node in the system must be able to recover the IVs necessary for computing its output functions but must also remain oblivious to the IVs associated with output functions not assigned to it. We design secure DC methods and establish achievable limits on the tradeoffs between the communication and computation loads to contribute to the advancement of secure data processing in distributed systems.

Place, publisher, year, edition, pages
IEEE, 2024
Series
IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC), ISSN 1948-3244, E-ISSN 1948-3252
Keywords
Coded distributed computing, MapReduce framework, information-theoretic security, secure computing
National Category
Communication Systems Computer Systems Signal Processing
Identifiers
urn:nbn:se:liu:diva-208978 (URN)10.1109/spawc60668.2024.10694545 (DOI)001337964100163 ()2-s2.0-85207097985 (Scopus ID)9798350393187 (ISBN)9798350393194 (ISBN)
Conference
IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Lucca, Italy, 10-13 September, 2024
Funder
ELLIIT - The Linköping‐Lund Initiative on IT and Mobile Communications
Available from: 2024-10-30 Created: 2024-10-30 Last updated: 2025-01-16Bibliographically approved
Welling, T., Günlü, O. & Yener, A. (2024). Transmitter Actions for Secure Integrated Sensing and Communication. In: 2024 IEEE International Symposium on Information Theory (ISIT): . Paper presented at IEEE International Symposium on Information Theory (ISIT), Athens, Greece, 07-12 July, 2024 (pp. 2580-2585). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Transmitter Actions for Secure Integrated Sensing and Communication
2024 (English)In: 2024 IEEE International Symposium on Information Theory (ISIT), Institute of Electrical and Electronics Engineers (IEEE), 2024, p. 2580-2585Conference paper, Published paper (Refereed)
Abstract [en]

This work models a secure integrated sensing and communication (ISAC) system as a wiretap channel with action-dependent channel states and channel output feedback, e.g., obtained through reflections. The transmitted message is split into a common and a secure message, both of which must be reliably recovered at the legitimate receiver, while the secure message needs to be kept secret from the eavesdropper. The transmitter actions, such as beamforming vector design, affect the corresponding state at each channel use. The action sequence is modeled to depend on both the transmitted message and channel output feedback. For perfect channel output feedback, the secrecy-distortion regions are provided for physically-degraded and reversely-physically-degraded secure ISAC channels with transmitter actions. The corresponding rate regions when the entire message should be kept secret are also provided. The results are illustrated through characterizing the secrecy-distortion region of a binary example.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Series
IEEE International Symposium on Information Theory, ISSN 2157-8095, E-ISSN 2157-8117
National Category
Communication Systems Signal Processing Telecommunications
Identifiers
urn:nbn:se:liu:diva-208981 (URN)10.1109/isit57864.2024.10619448 (DOI)001304426902085 ()2-s2.0-85202862707 (Scopus ID)9798350382846 (ISBN)9798350382853 (ISBN)
Conference
IEEE International Symposium on Information Theory (ISIT), Athens, Greece, 07-12 July, 2024
Funder
ELLIIT - The Linköping‐Lund Initiative on IT and Mobile Communications
Note

Funding Agencies|U.S. Department of Transportation [69A3552348327]

Available from: 2024-10-30 Created: 2024-10-30 Last updated: 2025-03-20Bibliographically approved
Günlü, O., Bloch, M. R., Schaefer, R. F. & Yener, A. (2023). Secure Integrated Sensing and Communication. IEEE Journal on Selected Areas in Information Theory, 4, 40-53
Open this publication in new window or tab >>Secure Integrated Sensing and Communication
2023 (English)In: IEEE Journal on Selected Areas in Information Theory, E-ISSN 2641-8770, Vol. 4, p. 40-53Article in journal (Refereed) Published
Abstract [en]

This work considers the problem of mitigating information leakage between communication and sensing in systems jointly performing both operations. Specifically, a discrete memoryless state-dependent broadcast channel model is studied in which (i) the presence of feedback enables a transmitter to convey information, while simultaneously performing channel state estimation; (ii) one of the receivers is treated as an eavesdropper whose state should be estimated but which should remain oblivious to part of the transmitted information. The model abstracts the challenges behind security for joint communication and sensing if one views the channel state as a key attribute, e.g., location. For independent and identically distributed states, perfect output feedback, and when part of the transmitted message should be kept secret, a partial characterization of the secrecy-distortion region is developed. The characterization is exact when the broadcast channel is either physically-degraded or reversely-physically-degraded. The partial characterization is also extended to the situation in which the entire transmitted message should be kept secret. The benefits of a joint approach compared to separation-based secure communication and state-sensing methods are illustrated with binary joint communication and sensing models.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2023
National Category
Communication Systems Signal Processing Telecommunications
Identifiers
urn:nbn:se:liu:diva-208974 (URN)10.1109/jsait.2023.3275048 (DOI)001395977100008 ()2-s2.0-85159096579 (Scopus ID)
Funder
German Research Foundation (DFG), 16KISK001KGerman Research Foundation (DFG), SCHA 1944/9-1
Available from: 2024-10-30 Created: 2024-10-30 Last updated: 2025-10-10Bibliographically approved
Günlü, O., Bloch, M. & Schaefer, R. F. (2022). Private Remote Sources for Secure Multi-Function Computation. IEEE Transactions on Information Theory, 68(10), 6826-6841
Open this publication in new window or tab >>Private Remote Sources for Secure Multi-Function Computation
2022 (English)In: IEEE Transactions on Information Theory, ISSN 0018-9448, E-ISSN 1557-9654, Vol. 68, no 10, p. 6826-6841Article in journal (Refereed) Published
Abstract [en]

We consider a distributed function computation problem in which parties observing noisy versions of a remote source facilitate the computation of a function of their observations at a fusion center through public communication. The distributed function computation is subject to constraints, including not only reliability and storage but also secrecy and privacy. Specifically, 1) the function computed should remain secret from an eavesdropper observing the public communication and correlated observations, measured in terms of the information leaked about the arguments of the function, to ensure secrecy regardless of the exact function used; 2) the remote source should remain private from the eavesdropper and the fusion center, measured in terms of the information leaked about the remote source itself. We derive the exact rate regions for lossless and lossy single-function computation and illustrate the lossy single-function computation rate region for an information bottleneck example, in which the optimal auxiliary random variables are characterized for binary-input symmetric-output channels. We extend the approach to lossless and lossy asynchronous multiple-function computations with joint secrecy and privacy constraints, in which case inner and outer bounds for the rate regions that differ only in the Markov chain conditions imposed are characterized.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2022
National Category
Communication Systems Signal Processing Computer Systems
Identifiers
urn:nbn:se:liu:diva-208975 (URN)10.1109/tit.2022.3182416 (DOI)000854619600031 ()2-s2.0-85138962167 (Scopus ID)
Funder
German Research Foundation (DFG), SCHA 1944/9-1
Available from: 2024-10-30 Created: 2024-10-30 Last updated: 2025-02-27Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-0313-7788

Search in DiVA

Show all publications