Skip to main content

Showing 1–50 of 73 results for author: Fragouli, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.06941  [pdf, other

    cs.IT

    Achieving Low Latency at Low Outage: Multilevel Coding for mmWave Channels

    Authors: Mine Gokce Dogan, Jaimin Shah, Martina Cardone, Christina Fragouli, Wei Mao, Hosein Nikopour, Rath Vannithamby

    Abstract: Millimeter-wave (mmWave) spectrum is expected to support data-intensive applications that require ultra-reliable low-latency communications (URLLC). However, mmWave links are highly sensitive to blockage, which may lead to disruptions in the communication. Traditional techniques that build resilience against such blockages (among which are interleaving and feedback mechanisms) incur delays that ar… ▽ More

    Submitted 10 February, 2024; originally announced February 2024.

  2. arXiv:2312.14259  [pdf, other

    cs.LG cs.DC cs.MA

    Multi-Agent Bandit Learning through Heterogeneous Action Erasure Channels

    Authors: Osama A. Hanna, Merve Karakas, Lin F. Yang, Christina Fragouli

    Abstract: Multi-Armed Bandit (MAB) systems are witnessing an upswing in applications within multi-agent distributed environments, leading to the advancement of collaborative MAB algorithms. In such settings, communication between agents executing actions and the primary learner making decisions can hinder the learning process. A prevalent challenge in distributed learning is action erasure, often induced by… ▽ More

    Submitted 29 April, 2024; v1 submitted 21 December, 2023; originally announced December 2023.

  3. arXiv:2308.14071  [pdf, other

    cs.IT

    Supporting Passive Users in mmWave Networks

    Authors: Mine Gokce Dogan, Martina Cardone, Christina Fragouli

    Abstract: The interference from active to passive users is a well-recognized challenge in millimeter-wave (mmWave) communications. We propose a method that enables to limit the interference on passive users (whose presence may not be detected since they do not transmit) with a small penalty to the throughput of active users. Our approach abstracts away (in a simple, yet informative way) the physical layer c… ▽ More

    Submitted 27 August, 2023; originally announced August 2023.

  4. arXiv:2305.06737  [pdf, other

    cs.IT

    A Diagonal Splitting Algorithm for Adaptive Group Testing

    Authors: Chaorui Yao, Pavlos Nikolopoulos, Christina Fragouli

    Abstract: Group testing enables to identify infected individuals in a population using a smaller number of tests than individual testing. To achieve this, group testing algorithms commonly assume knowledge of the number of infected individuals; nonadaptive and several adaptive algorithms fall in this category. Some adaptive algorithms, like binary splitting, operate without this assumption, but require a nu… ▽ More

    Submitted 14 May, 2023; v1 submitted 11 May, 2023; originally announced May 2023.

  5. arXiv:2305.06469  [pdf, other

    cs.IT

    Common Information Dimension

    Authors: Osama Hanna, Xinlin Li, Suhas Diggavi, Christina Fragouli

    Abstract: The exact common information between a set of random variables $X_1,...,X_n$ is defined as the minimum entropy of a shared random variable that allows for the exact distributive simulation of $X_1,...,X_n$. It has been established that, in certain instances, infinite entropy is required to achieve distributive simulation, suggesting that continuous random variables may be needed in such scenarios.… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

  6. arXiv:2211.09307  [pdf, other

    cs.IT cs.LG

    Proactive Resilient Transmission and Scheduling Mechanisms for mmWave Networks

    Authors: Mine Gokce Dogan, Martina Cardone, Christina Fragouli

    Abstract: This paper aims to develop resilient transmission mechanisms to suitably distribute traffic across multiple paths in an arbitrary millimeter-wave (mmWave) network. The main contributions include: (a) the development of proactive transmission mechanisms that build resilience against network disruptions in advance, while achieving a high end-to-end packet rate; (b) the design of a heuristic path sel… ▽ More

    Submitted 16 November, 2022; originally announced November 2022.

    Comments: arXiv admin note: text overlap with arXiv:2108.00548

  7. arXiv:2211.05632  [pdf, ps, other

    stat.ML cs.LG

    Contexts can be Cheap: Solving Stochastic Contextual Bandits with Linear Bandit Algorithms

    Authors: Osama A. Hanna, Lin F. Yang, Christina Fragouli

    Abstract: In this paper, we address the stochastic contextual linear bandit problem, where a decision maker is provided a context (a random set of actions drawn from a distribution). The expected reward of each action is specified by the inner product of the action and an unknown parameter. The goal is to design an algorithm that learns to play as close as possible to the unknown optimal policy after a numb… ▽ More

    Submitted 26 May, 2023; v1 submitted 8 November, 2022; originally announced November 2022.

  8. arXiv:2207.03445  [pdf, other

    cs.LG cs.CR

    Differentially Private Stochastic Linear Bandits: (Almost) for Free

    Authors: Osama A. Hanna, Antonious M. Girgis, Christina Fragouli, Suhas Diggavi

    Abstract: In this paper, we propose differentially private algorithms for the problem of stochastic linear bandits in the central, local and shuffled models. In the central model, we achieve almost the same regret as the optimal non-private algorithms, which means we get privacy for free. In particular, we achieve a regret of $\tilde{O}(\sqrt{T}+\frac{1}ε)$ matching the known lower bound for private linear… ▽ More

    Submitted 7 July, 2022; originally announced July 2022.

  9. arXiv:2206.04180  [pdf, ps, other

    cs.LG

    Learning in Distributed Contextual Linear Bandits Without Sharing the Context

    Authors: Osama A. Hanna, Lin F. Yang, Christina Fragouli

    Abstract: Contextual linear bandits is a rich and theoretically important model that has many practical applications. Recently, this setup gained a lot of interest in applications over wireless where communication constraints can be a performance bottleneck, especially when the contexts come from a large $d$-dimensional space. In this paper, we consider a distributed memoryless contextual linear bandit lear… ▽ More

    Submitted 8 June, 2022; originally announced June 2022.

  10. arXiv:2201.12325  [pdf, other

    cs.IT stat.AP

    Improving Group Testing via Gradient Descent

    Authors: Sundara Rajan Srinivasavaradhan, Pavlos Nikolopoulos, Christina Fragouli, Suhas Diggavi

    Abstract: We study the problem of group testing with non-identical, independent priors. So far, the pooling strategies that have been proposed in the literature take the following approach: a hand-crafted test design along with a decoding strategy is proposed, and guarantees are provided on how many tests are sufficient in order to identify all infections in a population. In this paper, we take a different,… ▽ More

    Submitted 28 January, 2022; originally announced January 2022.

    Comments: 10 pages, 4 figures

  11. arXiv:2111.06067  [pdf, other

    cs.LG

    Solving Multi-Arm Bandit Using a Few Bits of Communication

    Authors: Osama A. Hanna, Lin F. Yang, Christina Fragouli

    Abstract: The multi-armed bandit (MAB) problem is an active learning framework that aims to select the best among a set of actions by sequentially observing rewards. Recently, it has become popular for a number of applications over wireless networks, where communication constraints can form a bottleneck. Existing works usually fail to address this issue and can become infeasible in certain applications. In… ▽ More

    Submitted 11 November, 2021; originally announced November 2021.

  12. arXiv:2108.00548  [pdf, other

    cs.IT cs.LG

    A Reinforcement Learning Approach for Scheduling in mmWave Networks

    Authors: Mine Gokce Dogan, Yahya H. Ezzeldin, Christina Fragouli, Addison W. Bohannon

    Abstract: We consider a source that wishes to communicate with a destination at a desired rate, over a mmWave network where links are subject to blockage and nodes to failure (e.g., in a hostile military environment). To achieve resilience to link and node failures, we here explore a state-of-the-art Soft Actor-Critic (SAC) deep reinforcement learning algorithm, that adapts the information flow through the… ▽ More

    Submitted 1 August, 2021; originally announced August 2021.

  13. arXiv:2102.01174  [pdf, other

    cs.IT

    On optimal relay placement in directional networks

    Authors: Mine Gokce Dogan, Yahya H. Ezzeldin, Christina Fragouli

    Abstract: In this paper, we study the problem of optimal topology design in wireless networks equipped with highly-directional transmission antennas. We use the 1-2-1 network model to characterize the optimal placement of two relays that assist the communication between a source-destination pair. We analytically show that under some conditions on the distance between the source-destination pair, the optimal… ▽ More

    Submitted 6 February, 2021; v1 submitted 1 February, 2021; originally announced February 2021.

  14. arXiv:2012.07913  [pdf, other

    cs.LG

    Quantizing data for distributed learning

    Authors: Osama A. Hanna, Yahya H. Ezzeldin, Christina Fragouli, Suhas Diggavi

    Abstract: We consider machine learning applications that train a model by leveraging data distributed over a trusted network, where communication constraints can create a performance bottleneck. A number of recent approaches propose to overcome this bottleneck through compression of gradient updates. However, as models become larger, so does the size of the gradient updates. In this paper, we propose an alt… ▽ More

    Submitted 8 September, 2021; v1 submitted 14 December, 2020; originally announced December 2020.

  15. arXiv:2012.02804  [pdf, other

    cs.IT

    Group testing for overlapping communities

    Authors: Pavlos Nikolopoulos, Sundara Rajan Srinivasavaradhan, Tao Guo, Christina Fragouli, Suhas Diggavi

    Abstract: In this paper, we propose algorithms that leverage a known community structure to make group testing more efficient. We consider a population organized in connected communities: each individual participates in one or more communities, and the infection probability of each individual depends on the communities (s)he participates in. Use cases include students who participate in several classes, and… ▽ More

    Submitted 16 March, 2021; v1 submitted 4 December, 2020; originally announced December 2020.

    Comments: arXiv admin note: text overlap with arXiv:2007.08111

  16. arXiv:2007.08111  [pdf, other

    cs.IT stat.ME

    Community aware group testing

    Authors: Pavlos Nikolopoulos, Tao Guo, Sundara Rajan Srinivasavaradhan, Christina Fragouli, Suhas Diggavi

    Abstract: In this paper, we propose algorithms that leverage a known community structure to make group testing more efficient. We consider a population organized in disjoint communities: each individual participates in a community, and its infection probability depends on the community (s)he participates in. Use cases include families, students who participate in several classes, and workers who share commo… ▽ More

    Submitted 16 March, 2021; v1 submitted 16 July, 2020; originally announced July 2020.

  17. arXiv:2006.15998  [pdf, other

    cs.IT cs.CR

    Distortion based Light-weight Security for Cyber-Physical Systems

    Authors: Gaurav Kumar Agarwal, Mohammed Karmoose, Suhas Diggavi, Christina Fragouli, Paulo Tabuada

    Abstract: In Cyber-Physical Systems (CPS), inference based on communicated data is of critical significance as it can be used to manipulate or damage the control operations by adversaries. This calls for efficient mechanisms for secure transmission of data since control systems are becoming increasingly distributed over larger geographical areas. Distortion based security, recently proposed as one candidate… ▽ More

    Submitted 25 June, 2020; originally announced June 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:1809.04580

    Journal ref: Transactions in Automatic Control 2020

  18. arXiv:2005.14388  [pdf, other

    cs.IT

    Algorithms for reconstruction over single and multiple deletion channels

    Authors: Sundara Rajan Srinivasavaradhan, Michelle Du, Suhas Diggavi, Christina Fragouli

    Abstract: Recent advances in DNA sequencing technology and DNA storage systems have rekindled the interest in deletion channels. Multiple recent works have looked at variants of sequence reconstruction over a single and over multiple deletion channels, a notoriously difficult problem due to its highly combinatorial nature. Although works in theoretical computer science have provided algorithms which guarant… ▽ More

    Submitted 29 May, 2020; originally announced May 2020.

  19. arXiv:2005.11651  [pdf, other

    cs.CR cs.IT cs.LG

    Successive Refinement of Privacy

    Authors: Antonious M. Girgis, Deepesh Data, Kamalika Chaudhuri, Christina Fragouli, Suhas Diggavi

    Abstract: This work examines a novel question: how much randomness is needed to achieve local differential privacy (LDP)? A motivating scenario is providing {\em multiple levels of privacy} to multiple analysts, either for distribution or for heavy-hitter estimation, using the \emph{same} (randomized) output. We call this setting \emph{successive refinement of privacy}, as it provides hierarchical access to… ▽ More

    Submitted 24 May, 2020; originally announced May 2020.

  20. arXiv:2005.06670  [pdf, other

    cs.LG cs.IT

    Federated Recommendation System via Differential Privacy

    Authors: Tan Li, Linqi Song, Christina Fragouli

    Abstract: In this paper, we are interested in what we term the federated private bandits framework, that combines differential privacy with multi-agent bandit learning. We explore how differential privacy based Upper Confidence Bound (UCB) methods can be applied to multi-agent environments, and in particular to federated learning environments both in `master-worker' and `fully decentralized' settings. We pr… ▽ More

    Submitted 16 May, 2020; v1 submitted 13 May, 2020; originally announced May 2020.

    Comments: This paper is accepted by 2020 IEEE International Symposium on Information Theory(ISIT 2020)

  21. arXiv:2005.06655  [pdf, ps, other

    cs.IT

    Gaussian 1-2-1 Networks with Imperfect Beamforming

    Authors: Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli, Giuseppe Caire

    Abstract: In this work, we study bounds on the capacity of full-duplex Gaussian 1-2-1 networks with imperfect beamforming. In particular, different from the ideal 1-2-1 network model introduced in [1], in this model beamforming patterns result in side-lobe leakage that cannot be perfectly suppressed. The 1-2-1 network model captures the directivity of mmWave network communications, where nodes communicate b… ▽ More

    Submitted 13 May, 2020; originally announced May 2020.

  22. arXiv:1911.00216  [pdf, other

    cs.LG cs.IT stat.ML

    On Distributed Quantization for Classification

    Authors: Osama A. Hanna, Yahya H. Ezzeldin, Tara Sadjadpour, Christina Fragouli, Suhas Diggavi

    Abstract: We consider the problem of distributed feature quantization, where the goal is to enable a pretrained classifier at a central node to carry out its classification on features that are gathered from distributed nodes through communication constrained channels. We propose the design of distributed quantization schemes specifically tailored to the classification task: unlike quantization schemes that… ▽ More

    Submitted 1 November, 2019; originally announced November 2019.

  23. arXiv:1901.03216  [pdf, other

    cs.IT

    On Secure Capacity of Multiple Unicast Traffic over Separable Networks

    Authors: Gaurav Kumar Agarwal, Martina Cardone, Christina Fragouli

    Abstract: This paper studies the problem of information theoretic secure communication when a source has private messages to transmit to $m$ destinations, in the presence of a passive adversary who eavesdrops an unknown set of $k$ edges. The information theoretic secure capacity is derived over unit-edge capacity separable networks, for the cases when $k=1$ and $m$ is arbitrary, or $m=3$ and $k$ is arbitrar… ▽ More

    Submitted 10 April, 2019; v1 submitted 10 January, 2019; originally announced January 2019.

    Comments: Submitted for ITW

  24. arXiv:1901.02933  [pdf, other

    cs.IT

    Polynomial-time Capacity Calculation and Scheduling for Half-Duplex 1-2-1 Networks

    Authors: Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli, Giuseppe Caire

    Abstract: This paper studies the 1-2-1 half-duplex network model, where two half-duplex nodes can communicate only if they point `beams' at each other; otherwise, no signal can be exchanged or interference can be generated. The main result of this paper is the design of two polynomial-time algorithms that: (i) compute the approximate capacity of the 1-2-1 half-duplex network and, (ii) find the network sched… ▽ More

    Submitted 9 January, 2019; originally announced January 2019.

  25. arXiv:1901.02787  [pdf, other

    cs.IT

    On Secure Network Coding for Multiple Unicast Traffic

    Authors: Gaurav Kumar Agarwal, Martina Cardone, Christina Fragouli

    Abstract: This paper investigates the problem of secure communication in a wireline noiseless scenario where a source wishes to communicate to a number of destinations in the presence of a passive external adversary. Different from the multicast scenario, where all destinations are interested in receiving the same message, in this setting different destinations are interested in different messages. The main… ▽ More

    Submitted 9 January, 2019; originally announced January 2019.

  26. arXiv:1810.06313  [pdf, ps, other

    cs.IR cs.LG stat.ML

    Regret vs. Bandwidth Trade-off for Recommendation Systems

    Authors: Linqi Song, Christina Fragouli, Devavrat Shah

    Abstract: We consider recommendation systems that need to operate under wireless bandwidth constraints, measured as number of broadcast transmissions, and demonstrate a (tight for some instances) tradeoff between regret and bandwidth for two scenarios: the case of multi-armed bandit with context, and the case where there is a latent structure in the message space that we can exploit to reduce the learning p… ▽ More

    Submitted 15 October, 2018; originally announced October 2018.

  27. arXiv:1809.08263  [pdf, other

    cs.IT

    Privacy in Index Coding: $k$-Limited-Access Schemes

    Authors: Mohammed Karmoose, Linqi Song, Martina Cardone, Christina Fragouli

    Abstract: In the traditional index coding problem, a server employs coding to send messages to $n$ clients within the same broadcast domain. Each client already has some messages as side information and requests a particular unknown message from the server. All clients learn the coding matrix so that they can decode and retrieve their requested data. Our starting observation is that, learning the coding mat… ▽ More

    Submitted 21 September, 2018; originally announced September 2018.

  28. arXiv:1809.04580  [pdf, other

    cs.IT

    Distorting an Adversary's View in Cyber-Physical Systems

    Authors: Gaurav Kumar Agarwal, Mohammed Karmoose, Suhas Diggavi, Christina Fragouli, Paulo Tabuada

    Abstract: In Cyber-Physical Systems (CPSs), inference based on communicated data is of critical significance as it can be used to manipulate or damage the control operations by adversaries. This calls for efficient mechanisms for secure transmission of data since control systems are becoming increasingly distributed over larger geographical areas. Distortion based security, recently proposed as one candidat… ▽ More

    Submitted 12 September, 2018; originally announced September 2018.

  29. arXiv:1803.08188  [pdf, other

    cs.CR

    Using mm-Waves for Secret Key Establishment

    Authors: Mohammed Karmoose, Christina Fragouli, Suhas Diggavi, Rafael Misoczki, Lily L. Yang, Zhenliang Zhang

    Abstract: The fact that Millimeter Wave (mmWave) communication needs to be directional is usually perceived as a challenge; in this paper we argue that it enables efficient secret key sharing that are unconditionally secure from passive eavesdroppers, by building on packet erasures. We showcase the potential of our approach in two setups: mmWave-based WiFi networks and vehicle platooning. We show that in th… ▽ More

    Submitted 1 May, 2019; v1 submitted 21 March, 2018; originally announced March 2018.

    Comments: A shorter version of this paper is in the IEEE Communication Letters

  30. Privacy in Index Coding: Improved Bounds and Coding Schemes

    Authors: Mohammed Karmoose, Linqi Song, Martina Cardone, Christina Fragouli

    Abstract: It was recently observed in [1], that in index coding, learning the coding matrix used by the server can pose privacy concerns: curious clients can extract information about the requests and side information of other clients. One approach to mitigate such concerns is the use of $k$-limited-access schemes [1], that restrict each client to learn only part of the index coding matrix, and in particula… ▽ More

    Submitted 11 January, 2018; originally announced January 2018.

  31. Secure Communication over 1-2-1 Networks

    Authors: Gaurav Kumar Agarwal, Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli

    Abstract: This paper starts by assuming a 1-2-1 network, the abstracted noiseless model of mmWave networks that was shown to closely approximate the Gaussian capacity in [1], and studies secure communication. First, the secure capacity is derived for 1-2-1 networks where a source is connected to a destination through a network of unit capacity links. Then, lower and upper bounds on the secure capacity are d… ▽ More

    Submitted 12 January, 2018; v1 submitted 9 January, 2018; originally announced January 2018.

    Comments: Submitted for ISIT 2018

  32. Gaussian 1-2-1 Networks: Capacity Results for mmWave Communications

    Authors: Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli, Giuseppe Caire

    Abstract: This paper proposes a new model for wireless relay networks referred to as "1-2-1 network", where two nodes can communicate only if they point "beams" at each other, while if they do not point beams at each other, no signal can be exchanged or interference can be generated. This model is motivated by millimeter wave communications where, due to the high path loss, a link between two nodes can exis… ▽ More

    Submitted 17 June, 2018; v1 submitted 8 January, 2018; originally announced January 2018.

  33. arXiv:1711.01007  [pdf, other

    cs.IT

    Wireless Network Simplification: The Performance of Routing

    Authors: Yahya H. Ezzeldin, Ayan Sengupta, Christina Fragouli

    Abstract: Consider a wireless Gaussian network where a source wishes to communicate with a destination with the help of N full-duplex relay nodes. Most practical systems today route information from the source to the destination using the best path that connects them. In this paper, we show that routing can in the worst case result in an unbounded gap from the network capacity - or reversely, physical layer… ▽ More

    Submitted 2 November, 2017; originally announced November 2017.

  34. Half-Duplex Routing is NP-hard

    Authors: Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli, Daniela Tuninetti

    Abstract: Routing is a widespread approach to transfer information from a source node to a destination node in many deployed wireless ad-hoc networks. Today's implemented routing algorithms seek to efficiently find the path/route with the largest Full-Duplex (FD) capacity, which is given by the minimum among the point-to-point link capacities in the path. Such an approach may be suboptimal if then the nodes… ▽ More

    Submitted 10 August, 2017; originally announced August 2017.

  35. arXiv:1705.08966  [pdf, other

    cs.IT

    Communication vs Distributed Computation: an alternative trade-off curve

    Authors: Yahya H. Ezzeldin, Mohammed Karmoose, Christina Fragouli

    Abstract: In this paper, we revisit the communication vs. distributed computing trade-off, studied within the framework of MapReduce in [1]. An implicit assumption in the aforementioned work is that each server performs all possible computations on all the files stored in its memory. Our starting observation is that, if servers can compute only the intermediate values they need, then storage constraints do… ▽ More

    Submitted 24 May, 2017; originally announced May 2017.

  36. arXiv:1705.08464  [pdf, other

    cs.IT

    The Benefit of Being Flexible in Distributed Computation

    Authors: Linqi Song, Sundara Rajan Srinivasavaradhan, Christina Fragouli

    Abstract: In wireless distributed computing, networked nodes perform intermediate computations over data placed in their memory and exchange these intermediate values to calculate function values. In this paper we consider an asymmetric setting where each node has access to a random subset of the data, i.e., we cannot control the data placement. The paper makes a simple point: we can realize significant ben… ▽ More

    Submitted 8 August, 2017; v1 submitted 23 May, 2017; originally announced May 2017.

    Comments: Published in ITW, 2017

  37. Preserving Privacy while Broadcasting: $k$-Limited-Access Schemes

    Authors: Mohammed Karmoose, Linqi Song, Martina Cardone, Christina Fragouli

    Abstract: Index coding employs coding across clients within the same broadcast domain. This typically assumes that all clients learn the coding matrix so that they can decode and retrieve their requested data. However, learning the coding matrix can pose privacy concerns: it may enable clients to infer information about the requests and side information of other clients [1]. In this paper, we formalize the… ▽ More

    Submitted 23 May, 2017; originally announced May 2017.

  38. arXiv:1703.00482  [pdf, ps, other

    cs.IT

    A Distortion Based Approach for Protecting Inferences

    Authors: Chi-Yo Tsai, Gaurav Kumar Agarwal, Christina Fragouli, Suhas Diggavi

    Abstract: Eavesdropping attacks in inference systems aim to learn not the raw data, but the system inferences to predict and manipulate system actions. We argue that conventional information security measures can be ambiguous on the adversary's estimation abilities, and adopt instead a distortion based framework that enables to operate over a metric space. We show that requiring perfect distortion-based sec… ▽ More

    Submitted 6 May, 2017; v1 submitted 1 March, 2017; originally announced March 2017.

  39. arXiv:1701.05540  [pdf, other

    cs.IT

    A Pliable Index Coding Approach to Data Shuffling

    Authors: Linqi Song, Christina Fragouli, Tianchu Zhao

    Abstract: A promising research area that has recently emerged, is on how to use index coding to improve the communication efficiency in distributed computing systems, especially for data shuffling in iterative computations. In this paper, we posit that pliable index coding can offer a more efficient framework for data shuffling, as it can better leverage the many possible shuffling choices to reduce the num… ▽ More

    Submitted 3 May, 2018; v1 submitted 19 January, 2017; originally announced January 2017.

  40. Private Broadcasting: an Index Coding Approach

    Authors: Mohammed Karmoose, Linqi Song, Martina Cardone, Christina Fragouli

    Abstract: Using a broadcast channel to transmit clients' data requests may impose privacy risks. In this paper, we address such privacy concerns in the index coding framework. We show how a malicious client can infer some information about the requests and side information of other clients by learning the encoding matrix used by the server. We propose an information-theoretic metric to measure the level of… ▽ More

    Submitted 22 January, 2017; v1 submitted 18 January, 2017; originally announced January 2017.

  41. Efficiently Finding Simple Schedules in Gaussian Half-Duplex Relay Line Networks

    Authors: Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli, Daniela Tuninetti

    Abstract: The problem of operating a Gaussian Half-Duplex (HD) relay network optimally is challenging due to the exponential number of listen/transmit network states that need to be considered. Recent results have shown that, for the class of Gaussian HD networks with N relays, there always exists a simple schedule, i.e., with at most N +1 active states, that is sufficient for approximate (i.e., up to a con… ▽ More

    Submitted 21 June, 2017; v1 submitted 16 January, 2017; originally announced January 2017.

    Comments: A short version of this paper was submitted to ISIT 2017

  42. arXiv:1612.02062  [pdf, other

    cs.NI

    Consistency in the face of change: an adaptive approach to physical layer cooperation

    Authors: Ayan Sengupta, Yahya H. Ezzeldin, Siddhartha Brahma, Christina Fragouli, Suhas Diggavi

    Abstract: Most existing works on physical-layer (PHY) cooperation (beyond routing) focus on how to best use a given, static relay network--while wireless networks are anything but static. In this paper, we pose a different set of questions: given that we have multiple devices within range, which relay(s) do we use for PHY cooperation, to maintain a consistent target performance? How can we efficiently adapt… ▽ More

    Submitted 6 December, 2016; originally announced December 2016.

  43. arXiv:1610.06845  [pdf, other

    cs.IT

    A Polynomial-Time Algorithm for Pliable Index Coding

    Authors: Linqi Song, Christina Fragouli

    Abstract: In pliable index coding, we consider a server with $m$ messages and $n$ clients where each client has as side information a subset of the messages. We seek to minimize the number of broadcast transmissions, so that each client can recover any one unknown message she does not already have. Previous work has shown that the pliable index coding problem is NP-hard and requires at most… ▽ More

    Submitted 9 August, 2017; v1 submitted 21 October, 2016; originally announced October 2016.

  44. arXiv:1607.03948  [pdf, other

    cs.IT

    Making recommendations bandwidth aware

    Authors: Linqi Song, Christina Fragouli

    Abstract: This paper asks how much we can gain in terms of bandwidth and user satisfaction, if recommender systems became bandwidth aware and took into account not only the user preferences, but also the fact that they may need to serve these users under bandwidth constraints, as is the case over wireless networks. We formulate this as a new problem in the context of index coding: we relax the index coding… ▽ More

    Submitted 4 December, 2017; v1 submitted 13 July, 2016; originally announced July 2016.

  45. arXiv:1607.01441  [pdf, ps, other

    cs.IT

    Network Simplification in Half-Duplex: Building on Submodularity

    Authors: Martina Cardone, Yahya H. Ezzeldin, Christina Fragouli, Daniela Tuninetti

    Abstract: This paper explores the {\it network simplification} problem in the context of Gaussian Half-Duplex (HD) diamond networks. Specifically, given an $N$-relay diamond network, this problem seeks to derive fundamental guarantees on the capacity of the best $k$-relay subnetwork, as a function of the full network capacity. The main focus of this work is on the case when $k=N-1$ relays are selected out o… ▽ More

    Submitted 7 July, 2017; v1 submitted 5 July, 2016; originally announced July 2016.

  46. On (Secure) Information flow for Multiple-Unicast Sessions: Analysis with Butterfly Network

    Authors: Gaurav Kumar Agarwal, Martina Cardone, Christina Fragouli

    Abstract: This paper considers a class of wireline networks, derived from the well-known butterfly network, over which two independent unicast sessions take place simultaneously. The main objectives are to understand when network coding type of operations are beneficial with and without security considerations and to derive the ultimate gains that cooperation among sources and sinks can bring. Towards these… ▽ More

    Submitted 24 June, 2016; originally announced June 2016.

  47. arXiv:1604.02380  [pdf, other

    cs.CR cs.IT

    Group secret key agreement over state-dependent wireless broadcast channels

    Authors: Mahdi Jafari Siavoshani, Shaunak Mishra, Christina Fragouli, Suhas N. Diggavi

    Abstract: We consider a group of $m$ trusted and authenticated nodes that aim to create a shared secret key $K$ over a wireless channel in the presence of an eavesdropper Eve. We assume that there exists a state dependent wireless broadcast channel from one of the honest nodes to the rest of them including Eve. All of the trusted nodes can also discuss over a cost-free, noiseless and unlimited rate public c… ▽ More

    Submitted 8 April, 2016; originally announced April 2016.

    Comments: 27 pages, 6 figures, submitted for publication

  48. arXiv:1601.05784  [pdf, ps, other

    cs.IT

    A Note on Antenna Selection in Gaussian MIMO Channels: Capacity Guarantees and Bounds

    Authors: Yahya H. Ezzeldin, Ayan Sengupta, Christina Fragouli

    Abstract: We consider the problem of selecting $k_t \times k_r$ antennas from a Gaussian MIMO channel with $n_t \times n_r$ antennas, where $k_t \leq n_t$ and $k_r \leq n_r$. We prove the following two results that hold universally, in the sense that they do not depend on the channel coefficients: (i) The capacity of the best $k_t \times k_r$ subchannel is always lower bounded by a fraction… ▽ More

    Submitted 16 August, 2016; v1 submitted 21 January, 2016; originally announced January 2016.

  49. Wireless Network Simplification : Beyond Diamond Networks

    Authors: Yahya H. Ezzeldin, Ayan Sengupta, Christina Fragouli

    Abstract: We consider an arbitrary layered Gaussian relay network with $L$ layers of $N$ relays each, from which we select subnetworks with $K$ relays per layer. We prove that: (i) For arbitrary $L, N$ and $K = 1$, there always exists a subnetwork that approximately achieves $\frac{2}{(L-1)N + 4}$ $\left(\mbox{resp.}\frac{2}{LN+2}\right)$ of the network capacity for odd $L$ (resp. even $L$), (ii) For… ▽ More

    Submitted 26 January, 2016; v1 submitted 21 January, 2016; originally announced January 2016.

  50. arXiv:1601.05516  [pdf, other

    cs.IT

    A Deterministic Algorithm for Pliable Index Coding

    Authors: Linqi Song, Christina Fragouli

    Abstract: Pliable index coding considers a server with m messages, and n clients where each has as side information a subset of the messages. We seek to minimize the number of transmissions the server should make, so that each client receives (any) one message she does not already have. Previous work has shown that the server can achieve this using O(\log^2(n)) transmissions and needs at least Ω(log(n)) tra… ▽ More

    Submitted 21 January, 2016; originally announced January 2016.