Skip to main content

Showing 1–50 of 75 results for author: Khisti, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.03775  [pdf, other

    cs.CR

    Secure Inference for Vertically Partitioned Data Using Multiparty Homomorphic Encryption

    Authors: Shuangyi Chen, Yue Ju, Zhongwen Zhu, Ashish Khisti

    Abstract: We propose a secure inference protocol for a distributed setting involving a single server node and multiple client nodes. We assume that the observed data vector is partitioned across multiple client nodes while the deep learning model is located at the server node. Each client node is required to encrypt its portion of the data vector and transmit the resulting ciphertext to the server node. The… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

  2. arXiv:2404.16232  [pdf, other

    cs.CR cs.DC

    SECO: Secure Inference With Model Splitting Across Multi-Server Hierarchy

    Authors: Shuangyi Chen, Ashish Khisti

    Abstract: In the context of prediction-as-a-service, concerns about the privacy of the data and the model have been brought up and tackled via secure inference protocols. These protocols are built up by using single or multiple cryptographic tools designed under a variety of different security assumptions. In this paper, we introduce SECO, a secure inference protocol that enables a user holding an input d… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

  3. arXiv:2401.15056  [pdf, other

    cs.IT

    Subset Adaptive Relaying for Streaming Erasure Codes

    Authors: Muhammad Ahmad Kaleem, Gustavo Kasper Facenda, Ashish Khisti

    Abstract: This paper investigates adaptive streaming codes over a three-node relayed network. In this setting, a source transmits a sequence of message packets through a relay under a delay constraint of $T$ time slots per packet. The source-to-relay and relay-to-destination links are unreliable and introduce a maximum of $N_1$ and $N_2$ packet erasures respectively. Recent work has proposed adaptive (time… ▽ More

    Submitted 26 January, 2024; originally announced January 2024.

  4. arXiv:2401.12207  [pdf, other

    cs.IT cs.LG

    Rate-Distortion-Perception Tradeoff Based on the Conditional-Distribution Perception Measure

    Authors: Sadaf Salehkalaibar, Jun Chen, Ashish Khisti, Wei Yu

    Abstract: We study the rate-distortion-perception (RDP) tradeoff for a memoryless source model in the asymptotic limit of large block-lengths. Our perception measure is based on a divergence between the distributions of the source and reconstruction sequences conditioned on the encoder output, which was first proposed in [1], [2]. We consider the case when there is no shared randomness between the encoder a… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

  5. arXiv:2401.02609  [pdf, other

    cs.IT

    Importance Matching Lemma for Lossy Compression with Side Information

    Authors: Buu Phan, Ashish Khisti, Christos Louizos

    Abstract: We propose two extensions to existing importance sampling based methods for lossy compression. First, we introduce an importance sampling based compression scheme that is a variant of ordered random coding (Theis and Ahmed, 2022) and is amenable to direct evaluation of the achievable compression rate for a finite number of samples. Our second and major contribution is the importance matching lemma… ▽ More

    Submitted 8 March, 2024; v1 submitted 4 January, 2024; originally announced January 2024.

  6. arXiv:2305.19301  [pdf, other

    eess.IV cs.CV cs.IT cs.LG

    On the Choice of Perception Loss Function for Learned Video Compression

    Authors: Sadaf Salehkalaibar, Buu Phan, Jun Chen, Wei Yu, Ashish Khisti

    Abstract: We study causal, low-latency, sequential video compression when the output is subjected to both a mean squared-error (MSE) distortion loss as well as a perception loss to target realism. Motivated by prior approaches, we consider two different perception loss functions (PLFs). The first, PLF-JD, considers the joint distribution (JD) of all the video frames up to the current one, while the second m… ▽ More

    Submitted 22 August, 2023; v1 submitted 30 May, 2023; originally announced May 2023.

  7. arXiv:2305.09705  [pdf, other

    cs.LG cs.IT

    Random Edge Coding: One-Shot Bits-Back Coding of Large Labeled Graphs

    Authors: Daniel Severo, James Townsend, Ashish Khisti, Alireza Makhzani

    Abstract: We present a one-shot method for compressing large labeled graphs called Random Edge Coding. When paired with a parameter-free model based on Pólya's Urn, the worst-case computational and memory complexities scale quasi-linearly and linearly with the number of observed edges, making it efficient on sparse graphs, and requires only integer arithmetic. Key to our method is bits-back coding, which is… ▽ More

    Submitted 16 May, 2023; originally announced May 2023.

    Comments: Published at ICML 2023

  8. arXiv:2305.08358  [pdf, other

    cs.CR cs.DC cs.LG

    Quadratic Functional Encryption for Secure Training in Vertical Federated Learning

    Authors: Shuangyi Chen, Anuja Modi, Shweta Agrawal, Ashish Khisti

    Abstract: Vertical federated learning (VFL) enables the collaborative training of machine learning (ML) models in settings where the data is distributed amongst multiple parties who wish to protect the privacy of their individual data. Notably, in VFL, the labels are available to a single party and the complete feature set is formed only when data from all parties is combined. Recently, Xu et al. proposed a… ▽ More

    Submitted 19 June, 2023; v1 submitted 15 May, 2023; originally announced May 2023.

    Comments: Accepted to ISIT 2023

  9. arXiv:2211.13802  [pdf, other

    cs.LG cs.DC

    Sequential Gradient Coding For Straggler Mitigation

    Authors: M. Nikhil Krishnan, MohammadReza Ebrahimi, Ashish Khisti

    Abstract: In distributed computing, slower nodes (stragglers) usually become a bottleneck. Gradient Coding (GC), introduced by Tandon et al., is an efficient technique that uses principles of error-correcting codes to distribute gradient computation in the presence of stragglers. In this paper, we consider the distributed computation of a sequence of gradients $\{g(1),g(2),\ldots,g(J)\}$, where processing o… ▽ More

    Submitted 28 June, 2023; v1 submitted 24 November, 2022; originally announced November 2022.

    Comments: Published in The Eleventh International Conference on Learning Representations (ICLR 2023)

  10. arXiv:2203.05102  [pdf, other

    cs.IT

    Adaptive relaying for streaming erasure codes in a three node relay network

    Authors: Gustavo Kasper Facenda, M. Nikhil Krishnan, Elad Domanovitz, Silas L. Fong, Ashish Khisti, Wai-Tian Tan, John Apostolopoulos

    Abstract: This paper investigates adaptive streaming codes over a three-node relayed network. In this setting, a source node transmits a sequence of message packets to a destination through a relay. The source-to-relay and relay-to-destination links are unreliable and introduce at most $N_1$ and $N_2$ packet erasures, respectively. The destination node must recover each message packet within a strict delay… ▽ More

    Submitted 9 March, 2022; originally announced March 2022.

    Comments: Paper has been submitted to transactions on information theory

  11. arXiv:2201.10787  [pdf, other

    cs.LG cs.CR

    Variational Model Inversion Attacks

    Authors: Kuan-Chieh Wang, Yan Fu, Ke Li, Ashish Khisti, Richard Zemel, Alireza Makhzani

    Abstract: Given the ubiquity of deep neural networks, it is important that these models do not reveal information about sensitive data that they have been trained on. In model inversion attacks, a malicious user attempts to recover the private dataset used to train a supervised neural network. A successful model inversion attack should generate realistic and diverse samples that accurately describe each of… ▽ More

    Submitted 26 January, 2022; originally announced January 2022.

    Comments: 35th Conference on Neural Information Processing Systems (NeurIPS 2021)

  12. arXiv:2201.06609  [pdf, other

    cs.IT

    Error-correcting codes for low latency streaming over multiple link relay networks

    Authors: Gustavo Kasper Facenda, Elad Domanovitz, Ashish Khisti, Wai-Tian Tan, John Apostolopoulos

    Abstract: This paper investigates the performance of streaming codes in low-latency applications over a multi-link three-node relayed network. The source wishes to transmit a sequence of messages to the destination through a relay. Each message must be reconstructed after a fixed decoding delay. The special case with one link connecting each node has been studied by Fong et. al [1], and a multi-hop multi-li… ▽ More

    Submitted 17 January, 2022; originally announced January 2022.

  13. arXiv:2107.09716  [pdf, other

    cs.LG eess.SP

    Regularized Classification-Aware Quantization

    Authors: Daniel Severo, Elad Domanovitz, Ashish Khisti

    Abstract: Traditionally, quantization is designed to minimize the reconstruction error of a data source. When considering downstream classification tasks, other measures of distortion can be of interest; such as the 0-1 classification loss. Furthermore, it is desirable that the performance of these quantizers not deteriorate once they are deployed into production, as relearning the scheme online is not alwa… ▽ More

    Submitted 12 July, 2021; originally announced July 2021.

    Comments: Accepted to the 30th Biennial Symposium on Communications (BSC) 2021

  14. arXiv:2107.09202  [pdf, other

    cs.IT cs.LG eess.SP

    Compressing Multisets with Large Alphabets using Bits-Back Coding

    Authors: Daniel Severo, James Townsend, Ashish Khisti, Alireza Makhzani, Karen Ullrich

    Abstract: Current methods which compress multisets at an optimal rate have computational complexity that scales linearly with alphabet size, making them too slow to be practical in many real-world settings. We show how to convert a compression algorithm for sequences into one for multisets, in exchange for an additional complexity term that is quasi-linear in sequence length. This allows us to compress mult… ▽ More

    Submitted 27 February, 2023; v1 submitted 15 July, 2021; originally announced July 2021.

    Journal ref: IEEE Journal on Selected Areas in Information Theory, 2023

  15. arXiv:2106.10311  [pdf, other

    cs.IT cs.LG

    Universal Rate-Distortion-Perception Representations for Lossy Compression

    Authors: George Zhang, Jingjing Qian, Jun Chen, Ashish Khisti

    Abstract: In the context of lossy compression, Blau & Michaeli (2019) adopt a mathematical notion of perceptual quality and define the information rate-distortion-perception function, generalizing the classical rate-distortion tradeoff. We consider the notion of universal representations in which one may fix an encoder and vary the decoder to achieve any point within a collection of distortion and perceptio… ▽ More

    Submitted 21 December, 2021; v1 submitted 18 June, 2021; originally announced June 2021.

  16. arXiv:2105.00332  [pdf, other

    cs.IT

    Two-terminal Erasure Source-Broadcast with Feedback

    Authors: Louis Tan, Kaveh Mahdaviani, Ashish Khisti

    Abstract: We study the effects of introducing a feedback channel in the two-receiver erasure source-broadcast problem in which a binary equiprobable source is to be sent over an erasure broadcast channel to two receivers subject to erasure distortion constraints. The receivers each require a certain fraction of a source sequence, and we are interested in the minimum latency, or transmission time, required t… ▽ More

    Submitted 1 May, 2021; originally announced May 2021.

  17. arXiv:2105.00330  [pdf, other

    math.PR cs.IT

    Markov Rewards Processes with Impulse Rewards and Absorbing States

    Authors: Louis Tan, Kaveh Mahdaviani, Ashish Khisti

    Abstract: We study the expected accumulated reward for a discrete-time Markov reward model with absorbing states. The rewards are impulse rewards, where a reward $ρ_{ij}$ is accumulated when transitioning from state $i$ to state $j$. We derive an explicit, single-letter expression for the expected accumulated reward as a function of the number of time steps $n$ and include in our analysis the limit in which… ▽ More

    Submitted 1 May, 2021; originally announced May 2021.

  18. arXiv:2102.13653   

    cs.LG math.OC stat.ML

    On the Generalization of Stochastic Gradient Descent with Momentum

    Authors: Ali Ramezani-Kebrya, Ashish Khisti, Ben Liang

    Abstract: While momentum-based methods, in conjunction with stochastic gradient descent (SGD), are widely used when training machine learning models, there is little theoretical understanding on the generalization error of such methods. In this work, we first show that there exists a convex loss function for which algorithmic stability fails to establish generalization guarantees when SGD with standard heav… ▽ More

    Submitted 23 September, 2021; v1 submitted 26 February, 2021; originally announced February 2021.

    Comments: This entry is redundant and was created in error. See arXiv:1809.04564 for the latest version

  19. arXiv:2102.11086  [pdf, other

    cs.LG cs.AI cs.IT stat.CO

    Improving Lossless Compression Rates via Monte Carlo Bits-Back Coding

    Authors: Yangjun Ruan, Karen Ullrich, Daniel Severo, James Townsend, Ashish Khisti, Arnaud Doucet, Alireza Makhzani, Chris J. Maddison

    Abstract: Latent variable models have been successfully applied in lossless compression with the bits-back coding algorithm. However, bits-back suffers from an increase in the bitrate equal to the KL divergence between the approximate posterior and the true posterior. In this paper, we show how to remove this gap asymptotically by deriving bits-back coding algorithms from tighter variational bounds. The key… ▽ More

    Submitted 14 June, 2021; v1 submitted 22 February, 2021; originally announced February 2021.

  20. arXiv:2101.11117  [pdf, ps, other

    cs.IT

    Streaming Erasure Codes over Multi-Access Relayed Networks

    Authors: Gustavo Kasper Facenda, Elad Domanovitz, Ashish Khisti, Wai-Tian Tan, John Apostolopoulos

    Abstract: Many emerging multimedia streaming applications involve multiple users communicating under strict latency constraints. In this paper we study streaming codes for a network involving two source nodes, one relay node and a destination node. In our setting, each source node transmits a stream of messages, through the relay, to a destination, who is required to decode the messages under a strict delay… ▽ More

    Submitted 12 October, 2021; v1 submitted 26 January, 2021; originally announced January 2021.

    Comments: 47 pages, 8 figures

  21. arXiv:2006.05951  [pdf, ps, other

    cs.IT

    Streaming Erasure Codes over Multi-hop Relay Network

    Authors: Elad Domanovitz, Ashish Khisti, Wai-Tian Tan, Xiaoqing Zhu, John Apostolopoulos

    Abstract: This paper studies low-latency streaming codes for the multi-hop network. The source is transmitting a sequence of messages (streaming messages) to a destination through a chain of relays where each hop is subject to packet erasures. Every source message has to be recovered perfectly at the destination within a delay constraint of $T$ time slots. In any sliding window of $T+1$ time slots, we assum… ▽ More

    Submitted 10 June, 2020; originally announced June 2020.

  22. arXiv:2006.05572  [pdf, other

    q-bio.NC cs.LG eess.IV stat.AP stat.ML

    Time-Resolved fMRI Shared Response Model using Gaussian Process Factor Analysis

    Authors: MohammadReza Ebrahimi, Navona Calarco, Kieran Campbell, Colin Hawco, Aristotle Voineskos, Ashish Khisti

    Abstract: Multi-subject fMRI studies are challenging due to the high variability of both brain anatomy and functional brain topographies across participants. An effective way of aggregating multi-subject fMRI data is to extract a shared representation that filters out unwanted variability among subjects. Some recent work has implemented probabilistic models to extract a shared representation in task fMRI. I… ▽ More

    Submitted 4 September, 2020; v1 submitted 9 June, 2020; originally announced June 2020.

  23. arXiv:2004.12983  [pdf, other

    stat.ML cs.IT cs.LG

    Sharpened Generalization Bounds based on Conditional Mutual Information and an Application to Noisy, Iterative Algorithms

    Authors: Mahdi Haghifam, Jeffrey Negrea, Ashish Khisti, Daniel M. Roy, Gintare Karolina Dziugaite

    Abstract: The information-theoretic framework of Russo and J. Zou (2016) and Xu and Raginsky (2017) provides bounds on the generalization error of a learning algorithm in terms of the mutual information between the algorithm's output and the training sample. In this work, we study the proposal, by Steinke and Zakynthinou (2020), to reason about the generalization error of a learning algorithm by introducing… ▽ More

    Submitted 23 October, 2020; v1 submitted 27 April, 2020; originally announced April 2020.

    Comments: 23 Pages, 3 Figures. To appear in, Advances in Neural Information Processing Systems (34), 2020

  24. arXiv:1912.01170  [pdf, other

    stat.ML cs.IT cs.LG

    Sequential Classification with Empirically Observed Statistics

    Authors: Mahdi Haghifam, Vincent Y. F. Tan, Ashish Khisti

    Abstract: Motivated by real-world machine learning applications, we consider a statistical classification task in a sequential setting where test samples arrive sequentially. In addition, the generating distributions are unknown and only a set of empirically sampled sequences are available to a decision maker. The decision maker is tasked to classify a test sequence which is known to be generated according… ▽ More

    Submitted 9 February, 2021; v1 submitted 2 December, 2019; originally announced December 2019.

    Comments: 17 Pages, 5 Figures. To appear in the IEEE Transactions on Information Theory

  25. arXiv:1911.02151  [pdf, other

    stat.ML cs.IT cs.LG

    Information-Theoretic Generalization Bounds for SGLD via Data-Dependent Estimates

    Authors: Jeffrey Negrea, Mahdi Haghifam, Gintare Karolina Dziugaite, Ashish Khisti, Daniel M. Roy

    Abstract: In this work, we improve upon the stepwise analysis of noisy iterative learning algorithms initiated by Pensia, Jog, and Loh (2018) and recently extended by Bu, Zou, and Veeravalli (2019). Our main contributions are significantly improved mutual information bounds for Stochastic Gradient Langevin Dynamics via data-dependent estimates. Our approach is based on the variational characterization of mu… ▽ More

    Submitted 25 January, 2020; v1 submitted 5 November, 2019; originally announced November 2019.

    Comments: 23 pages, 1 figure. To appear in, Advances in Neural Information Processing Systems (33), 2019

  26. arXiv:1909.06709  [pdf, other

    cs.NI

    Low-Latency Network-Adaptive Error Control for Interactive Streaming

    Authors: Salma Emara, Silas L. Fong, Baochun Li, Ashish Khisti, Wai-Tian Tan, Xiaoqing Zhu, John Apostolopoulos

    Abstract: We introduce a novel network-adaptive algorithm that is suitable for alleviating network packet losses for low-latency interactive communications between a source and a destination. Our network-adaptive algorithm estimates in real-time the best parameters of a recently proposed streaming code that uses forward error correction (FEC) to correct both arbitrary and burst losses, which cause a crackli… ▽ More

    Submitted 29 June, 2020; v1 submitted 14 September, 2019; originally announced September 2019.

    Comments: Presented in part at 27th ACM International Conference on Multimedia, October 2019; 13 pages, 24 figures, submitted to IEEE Transactions on Multimedia

  27. arXiv:1904.06212  [pdf, ps, other

    cs.IT

    An Explicit Rate-Optimal Streaming Code for Channels with Burst and Arbitrary Erasures

    Authors: Elad Domanovitz, Silas L. Fong, Ashish Khisti

    Abstract: This paper considers the transmission of an infinite sequence of messages (a streaming source) over a packet erasure channel, where every source message must be recovered perfectly at the destination subject to a fixed decoding delay. While the capacity of a channel that introduces only bursts of erasures is well known, only recently, the capacity of a channel with either one burst of erasures or… ▽ More

    Submitted 13 May, 2020; v1 submitted 11 April, 2019; originally announced April 2019.

    Comments: arXiv admin note: text overlap with arXiv:1903.07434

  28. arXiv:1904.01147  [pdf, other

    cs.IT cs.CR

    Maximal Information Leakage based Privacy Preserving Data Disclosure Mechanisms

    Authors: Tianrui Xiao, Ashish Khisti

    Abstract: It is often necessary to disclose training data to the public domain, while protecting privacy of certain sensitive labels. We use information theoretic measures to develop such privacy preserving data disclosure mechanisms. Our mechanism involves perturbing the data vectors in a manner that strikes a balance in the privacy-utility trade-off. We use maximal information leakage between the output d… ▽ More

    Submitted 4 April, 2019; v1 submitted 1 April, 2019; originally announced April 2019.

    Comments: Updates to experiments with FERG data set

  29. arXiv:1903.07434  [pdf, ps, other

    cs.IT

    An Explicit Construction of Optimal Streaming Codes for Channels with Burst and Arbitrary Erasures

    Authors: Damian Dudzicz, Silas L. Fong, Ashish Khisti

    Abstract: This paper presents a new construction of error correcting codes which achieves optimal recovery of a streaming source over a packet erasure channel. The channel model considered is the sliding window erasure model, with burst and arbitrary losses, introduced by Badr et al. . Recently, two independents works by Fong et al. and Krishnan and Kumar have identified optimal streaming codes within this… ▽ More

    Submitted 22 April, 2019; v1 submitted 18 March, 2019; originally announced March 2019.

    Comments: 22 pages

  30. arXiv:1901.03769  [pdf, other

    cs.IT

    Optimal Multiplexed Erasure Codes for Streaming Messages with Different Decoding Delays

    Authors: Silas L. Fong, Ashish Khisti, Baochun Li, Wai-Tian Tan, Xiaoqing Zhu, John Apostolopoulos

    Abstract: This paper considers multiplexing two sequences of messages with two different decoding delays over a packet erasure channel. In each time slot, the source constructs a packet based on the current and previous messages and transmits the packet, which may be erased when the packet travels from the source to the destination. The destination must perfectly recover every source message in the first se… ▽ More

    Submitted 8 November, 2019; v1 submitted 11 January, 2019; originally announced January 2019.

    Comments: 20 pages, 1 figure, 1 table, presented in part at 2019 IEEE ISIT

  31. arXiv:1809.04564  [pdf, other

    cs.LG stat.ML

    On the Generalization of Stochastic Gradient Descent with Momentum

    Authors: Ali Ramezani-Kebrya, Kimon Antonakopoulos, Volkan Cevher, Ashish Khisti, Ben Liang

    Abstract: While momentum-based accelerated variants of stochastic gradient descent (SGD) are widely used when training machine learning models, there is little theoretical understanding on the generalization error of such methods. In this work, we first show that there exists a convex loss function for which the stability gap for multiple epochs of SGD with standard heavy-ball momentum (SGDM) becomes unboun… ▽ More

    Submitted 15 January, 2024; v1 submitted 12 September, 2018; originally announced September 2018.

    Comments: 56 pages, 14 figures. To appear in the Journal of Machine Learning Research (JMLR)

  32. arXiv:1806.09768   

    cs.IT

    Optimal Streaming Erasure Codes over the Three-Node Relay Network

    Authors: Silas L. Fong, Ashish Khisti, Baochun Li, Wai-Tian Tan, Xiaoqing Zhu, John Apostolopoulos

    Abstract: This paper investigates low-latency streaming codes for a three-node relay network. The source transmits a sequence of messages (streaming messages) to the destination through the relay between them, where the first-hop channel from the source to the relay and the second-hop channel from the relay to the destination are subject to packet erasures. Every source message must be recovered perfectly a… ▽ More

    Submitted 10 March, 2022; v1 submitted 25 June, 2018; originally announced June 2018.

    Comments: Another researcher pointed out that the upper bound on rate in (21) is incorrect. We found that this is the case and we confirmed that there exists a transmission scheme on a 3-node relay network which achieves a rate strictly higher than our upper bound

  33. arXiv:1801.05227  [pdf, ps, other

    cs.IT

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Authors: Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao

    Abstract: Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical… ▽ More

    Submitted 16 January, 2018; originally announced January 2018.

    Comments: To appear in IEEE Journal on Selected Areas in Communications

  34. arXiv:1801.04241  [pdf, other

    cs.IT

    Optimal Streaming Codes for Channels with Burst and Arbitrary Erasures

    Authors: Silas L. Fong, Ashish Khisti, Baochun Li, Wai-Tian Tan, Xiaoqing Zhu, John Apostolopoulos

    Abstract: This paper considers transmitting a sequence of messages (a streaming source) over a packet erasure channel. In each time slot, the source constructs a packet based on the current and the previous messages and transmits the packet, which may be erased when the packet travels from the source to the destination. Every source message must be recovered perfectly at the destination subject to a fixed d… ▽ More

    Submitted 5 December, 2018; v1 submitted 12 January, 2018; originally announced January 2018.

    Comments: 36 pages, 3 figures, 2 tables

  35. arXiv:1711.02770  [pdf, ps, other

    cs.IT

    Bandwidth Adaptive & Error Resilient MBR Exact Repair Regenerating Codes

    Authors: Kaveh Mahdaviani, Ashish Khisti, Soheil Mohajer

    Abstract: Regenerating codes are efficient methods for distributed storage in storage networks, where node failures are common. They guarantee low cost data reconstruction and repair through accessing only a predefined number of arbitrarily chosen storage nodes in the network. In this work we consider two simultaneous extensions to the original regenerating codes framework introduced in [1]; i) both data re… ▽ More

    Submitted 7 November, 2017; originally announced November 2017.

    Comments: This manuscript is submitted to the IEEE Transactions on Information Theory

  36. arXiv:1708.06012  [pdf, ps, other

    cs.IT

    Product Matrix Minimum Storage Regenerating Codes with Flexible Number of Helpers

    Authors: Kaveh Mahdaviani, Soheil Mohajer, Ashish Khisti

    Abstract: In coding for distributed storage systems, efficient data reconstruction and repair through accessing a predefined number of arbitrarily chosen storage nodes is guaranteed by regenerating codes. Traditionally, code parameters, specially the number of helper nodes participating in a repair process, are predetermined. However, depending on the state of the system and network traffic, it is desirable… ▽ More

    Submitted 28 December, 2017; v1 submitted 20 August, 2017; originally announced August 2017.

    Comments: IEEE Information Theory Workshop (ITW) 2017

  37. arXiv:1708.03402  [pdf, ps, other

    cs.IT

    Product Matrix MSR Codes with Bandwidth Adaptive Exact Repair

    Authors: Kaveh Mahdaviani, Soheil Mohajer, Ashish Khisti

    Abstract: In a distributed storage systems (DSS) with $k$ systematic nodes, robustness against node failure is commonly provided by storing redundancy in a number of other nodes and performing repair mechanism to reproduce the content of the failed nodes. Efficiency is then achieved by minimizing the storage overhead and the amount of data transmission required for data reconstruction and repair, provided b… ▽ More

    Submitted 28 December, 2017; v1 submitted 10 August, 2017; originally announced August 2017.

  38. arXiv:1708.02501  [pdf, other

    cs.IT

    Covert Communication with Channel-State Information at the Transmitter

    Authors: Si-Hyeon Lee, Ligong Wang, Ashish Khisti, Gregory W. Wornell

    Abstract: We consider the problem of covert communication over a state-dependent channel, where the transmitter has causal or noncausal knowledge of the channel states. Here, "covert" means that a warden on the channel should observe similar statistics when the transmitter is sending a message and when it is not. When a sufficiently long secret key is shared between the transmitter and the receiver, we deri… ▽ More

    Submitted 8 August, 2017; originally announced August 2017.

    Comments: 20 pages, 3 figures, a shorter version presented at IEEE ISIT 2017, submitted to IEEE Transactions on Information Forensics and Security

  39. Secure Broadcasting Using Independent Secret Keys

    Authors: Rafael F. Schaefer, Ashish Khisti, H. Vincent Poor

    Abstract: The problem of secure broadcasting with independent secret keys is studied. The particular scenario is analyzed in which a common message has to be broadcast to two legitimate receivers, while keeping an external eavesdropper ignorant of it. The transmitter shares independent secret keys of sufficiently high rates with both legitimate receivers, which can be used in different ways: they can be use… ▽ More

    Submitted 19 February, 2018; v1 submitted 19 June, 2017; originally announced June 2017.

    Comments: 18 pages, 5 figures, final version

    Journal ref: IEEE Transactions on Communications, vol. 66, no. 2, pp. 644-661 (Feb. 2018)

  40. arXiv:1702.01779  [pdf, other

    cs.IT

    Tracking and Control of Gauss-Markov Processes over Packet-Drop Channels with Acknowledgments

    Authors: Anatoly Khina, Victoria Kostina, Ashish Khisti, Babak Hassibi

    Abstract: We consider the problem of tracking the state of Gauss-Markov processes over rate-limited erasure-prone links. We concentrate first on the scenario in which several independent processes are seen by a single observer. The observer maps the processes into finite-rate packets that are sent over the erasure-prone links to a state estimator, and are acknowledged upon packet arrivals. The aim of the st… ▽ More

    Submitted 23 May, 2018; v1 submitted 6 February, 2017; originally announced February 2017.

  41. arXiv:1606.05954  [pdf, ps, other

    cs.IT

    The Wiretapped Diamond-Relay Channel

    Authors: Si-Hyeon Lee, Ashish Khisti

    Abstract: In this paper, we study a diamond-relay channel where the source is connected to $M$ relays through orthogonal links and the relays transmit to the destination over a wireless multiple-access channel in the presence of an eavesdropper. The eavesdropper not only observes the relay transmissions through another multiple-access channel, but also observes a certain number of source-relay links. The le… ▽ More

    Submitted 19 June, 2016; originally announced June 2016.

    Comments: 30 pages, 4 figures, Submitted to IEEE Transactions on Information Theory

  42. arXiv:1604.06848  [pdf, ps, other

    cs.IT

    Exact Moderate Deviation Asymptotics in Streaming Data Transmission

    Authors: Si-Hyeon Lee, Vincent Y. F. Tan, Ashish Khisti

    Abstract: In this paper, a streaming transmission setup is considered where an encoder observes a new message in the beginning of each block and a decoder sequentially decodes each message after a delay of $T$ blocks. In this streaming setup, the fundamental interplay between the coding rate, the error probability, and the blocklength in the moderate deviations regime is studied. For output symmetric channe… ▽ More

    Submitted 22 April, 2016; originally announced April 2016.

    Comments: 23 pages, 1 figure, 1 table, Submitted to IEEE Transactions on Information Theory

  43. arXiv:1512.06298  [pdf, ps, other

    cs.IT

    Streaming Data Transmission in the Moderate Deviations and Central Limit Regimes

    Authors: Si-Hyeon Lee, Vincent Y. F. Tan, Ashish Khisti

    Abstract: We consider streaming data transmission over a discrete memoryless channel. A new message is given to the encoder at the beginning of each block and the decoder decodes each message sequentially, after a delay of $T$ blocks. In this streaming setup, we study the fundamental interplay between the rate and error probability in the central limit and moderate deviations regimes and show that i) in the… ▽ More

    Submitted 19 December, 2015; originally announced December 2015.

    Comments: 36 pages, 3 figures, Submitted to IEEE Transactions on Information Theory

  44. arXiv:1512.06291  [pdf, ps, other

    cs.IT

    Secure Degrees of Freedom of the Gaussian Diamond-Wiretap Channel

    Authors: Si-Hyeon Lee, Wanyao Zhao, Ashish Khisti

    Abstract: In this paper, we consider the Gaussian diamond-wiretap channel that consists of an orthogonal broadcast channel from a source to two relays and a Gaussian fast-fading multiple access-wiretap channel from the two relays to a legitimate destination and an eavesdropper. For the multiple access part, we consider both the case with full channel state information (CSI) and the case with no eavesdropper… ▽ More

    Submitted 19 December, 2015; originally announced December 2015.

    Comments: 29 pages, 5 figures, Submitted to IEEE Transactions on Information Theory

  45. arXiv:1510.07170  [pdf, other

    cs.IT

    Information-Theoretic Privacy for Smart Metering Systems with a Rechargeable Battery

    Authors: Simon Li, Ashish Khisti, Aditya Mahajan

    Abstract: Smart-metering systems report electricity usage of a user to the utility provider on almost real-time basis. This could leak private information about the user to the utility provider. In this work we investigate the use of a rechargeable battery in order to provide privacy to the user. We assume that the user load sequence is a first-order Markov process, the battery satisfies ideal charge conser… ▽ More

    Submitted 15 September, 2017; v1 submitted 24 October, 2015; originally announced October 2015.

  46. arXiv:1509.01822  [pdf, ps, other

    cs.IT

    The MIMO Wiretap Channel Decomposed

    Authors: Anatoly Khina, Yuval Kochman, Ashish Khisti

    Abstract: The problem of sending a secret message over the Gaussian multiple-input multiple-output (MIMO) wiretap channel is studied. While the capacity of this channel is known, it is not clear how to construct optimal coding schemes that achieve this capacity. In this work, we use linear operations along with successive interference cancellation to attain effective parallel single-antenna wiretap channels… ▽ More

    Submitted 27 October, 2016; v1 submitted 6 September, 2015; originally announced September 2015.

    Comments: Submitted to IEEE Transactions on Information Theory Aug. 2015; revised Oct. 2016

  47. arXiv:1506.03792  [pdf, ps, other

    cs.IT

    Convolutional Codes with Maximum Column Sum Rank for Network Streaming

    Authors: Rafid Mahmood, Ahmed Badr, Ashish Khisti

    Abstract: The column Hamming distance of a convolutional code determines the error correction capability when streaming over a class of packet erasure channels. We introduce a metric known as the column sum rank, that parallels column Hamming distance when streaming over a network with link failures. We prove rank analogues of several known column Hamming distance properties and introduce a new family of co… ▽ More

    Submitted 16 April, 2016; v1 submitted 11 June, 2015; originally announced June 2015.

    Comments: 14 pages, presented in part at ISIT 2015, accepted to IEEE Transactions on Information Theory

  48. arXiv:1504.05900  [pdf, ps, other

    cs.IT

    The Degraded Gaussian Diamond-Wiretap Channel

    Authors: Si-Hyeon Lee, Ashish Khisti

    Abstract: In this paper, we present nontrivial upper and lower bounds on the secrecy capacity of the degraded Gaussian diamond-wiretap channel and identify several ranges of channel parameters where these bounds coincide with useful intuitions. Furthermore, we investigate the effect of the presence of an eavesdropper on the capacity. We consider the following two scenarios regarding the availability of rand… ▽ More

    Submitted 22 April, 2015; originally announced April 2015.

    Comments: 26 pages, 6 figures, a short version will appear in Proc. IEEE ISIT 2015

  49. arXiv:1410.2326  [pdf, ps, other

    cs.IT

    Zero-Delay Sequential Transmission of Markov Sources Over Burst Erasure Channels

    Authors: Farrokh Etezadi, Ashish Khisti, Mitchell Trott

    Abstract: A setup involving zero-delay sequential transmission of a vector Markov source over a burst erasure channel is studied. A sequence of source vectors is compressed in a causal fashion at the encoder, and the resulting output is transmitted over a burst erasure channel. The destination is required to reconstruct each source vector with zero-delay, but those source sequences that are observed either… ▽ More

    Submitted 8 October, 2014; originally announced October 2014.

    Comments: 31 pages, 17 figures

    Journal ref: IEEE Transactions on Information Theory, vol. 60, no. 8, pp. 4584--4613, 2014

  50. arXiv:1404.6472  [pdf, ps, other

    cs.IT

    Parallel Gaussian Networks with a Common State-Cognitive Helper

    Authors: Ruchen Duan, Yingbin Liang, Ashish Khisti, Shlomo Shamai

    Abstract: A class of state-dependent parallel networks with a common state-cognitive helper, in which $K$ transmitters wish to send $K$ messages to their corresponding receivers over $K$ state-corrupted parallel channels, and a helper who knows the state information noncausally wishes to assist these receivers to cancel state interference. Furthermore, the helper also has its own message to be sent simultan… ▽ More

    Submitted 25 April, 2014; originally announced April 2014.