{"title":"From the Spectrum of the Adjacency Matrix to the Spectrum of Directed Edge Matrix: Counting Cycles of a Bipartite Graph Through a Simple Equation","authors":"Ali Dehghan, A. Banihashemi","doi":"10.1109/ITW44776.2019.8989394","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989394","url":null,"abstract":"Counting short cycles in bipartite graphs is a fundamental problem of interest in many fields including the analysis and design of low-density parity-check (LDPC) codes. There are two computational approaches to count short cycles (with length smaller than 2g, where g is the girth of the graph) in bipartite graphs. The first approach is applicable to a general (irregular) bipartite graph, and uses the spectrum ${eta_{i}}$ of the directed edge matrix of the graph to compute the multiplicity Nk of k-cycles with $k lt 2g$ through the simple equation $N_{k} =sum_{i}eta_{i}^{k}/(2k)$. This approach has a computational complexity $O(|E|^{3})$, where $|E|$ is number of edges in the graph. The second approach is only applicable to bi-regular bipartite graphs, and uses the spectrum ${lambda_{i}}$ of the adjacency matrix (graph spectrum) and the degree sequences of the graph to compute Nk. The complexity of this approach is $O(|V|^{3})$, where $|V|$ is number of nodes in the graph. This complexity is less than that of the first approach, but the equations involved in the computations of the second approach are very tedious, particularly for $k geq g+6$. In this paper, we establish an analytical relationship between the two spectra ${eta_{i}}$ and ${lambda_{i}}$ for bi-regular bipartite graphs. Through this relationship, the former spectrum can be derived from the latter through simple equations. This allows the computation of Nk using $N_{k} =sum_{i}eta_{i}^{k}/(2k)$ but with a complexity of $O(|V|^{3})$ rather than $O(|E|^{3})$.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121459085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Submodularity-based Clustering Algorithm for the Information Bottleneck and Privacy Funnel","authors":"Ni Ding, P. Sadeghi","doi":"10.1109/ITW44776.2019.8989355","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989355","url":null,"abstract":"For the relevant data $S$ that nests in the observation $X$, the information bottleneck (IB) aims to encode $X$ into $hat {X}$ in order to maximize the extracted useful information $I(S;hat {X})$ with the minimum coding rate $I(X;hat {X})$. For the dual privacy tunnel (PF) problem where $S$ denotes the sensitive$/mathrm {p}mathrm {r}mathrm {i}mathrm {v}mathrm {a}mathrm {t}mathrm {e}wedge $ data, the goal is to minimize the privacy leakage $I(S;X)$ while maintain a certain level of utility $I(X;hat {X})$. For both problems, we propose an efficient iterative agglomerative clustering algorithm based on the minimization of the difference of submodular functions (IAC-MDSF). It starts with the original alphabet $hat {mathcal {X}}:= mathcal {X}$ and iteratively merges the elements in the current alphabet $ hat {mathcal {X}}$ that optimizes the Lagrangian function $I(S;hat {X})-lambda I(X;X)$. We prove that the best merge in each iteration of IAC-MDSF can be searched efficiently over all subsets of $hat {mathcal {X}}$ by the existing MDSF algorithms. By varying the value of the Lagrangian multiplier $lambda $, we obtain the experimental results on a heart disease data set in terms of the Pareto frontier: $I(S;hat {X}) mathrm {v}mathrm {s}. -I(X;hat {X})$. We show that our IAC-MDSF algorithm outperforms the existing iterative pairwise merge approaches for both PF and IB and is computationally much less complex.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115451719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Neha Sangwan, Mayank Bakshi, B. Dey, V. Prabhakaran
{"title":"Multiple Access Channels with Byzantine Users","authors":"Neha Sangwan, Mayank Bakshi, B. Dey, V. Prabhakaran","doi":"10.1109/ITW44776.2019.8989065","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989065","url":null,"abstract":"Communication over a three-user multiple access channel (MAC) is studied when any one of the users may behave adversarially. The capacity region is characterized for randomized codes (where each user shares an independent secret key with the receiver). The capacity region for deterministic codes is also studied. Necessary conditions including a new non-symmetrizability condition is obtained for this capacity region to be non-trivial. It is shown that when none of the users are symmetrizable, the randomized coding capacity region is also achievable with deterministic codes. This is analogous to the result of Ahlswede and Cai (1991) for arbitrarily varying MAC.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"649 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122698635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Source coding with side information for binary memoryless sources","authors":"I. Bocharova, B. Kudryashov","doi":"10.1109/ITW44776.2019.8989169","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989169","url":null,"abstract":"In this paper, we study a classical problem of source coding with side information available at the decoder. This problem is known as the Wyner-Ahlswede-Korner (WAK) problem. Nowadays, the interest in this problem is related to the concept of distributed source coding which implies coding of correlated sources under restriction that their encoders cannot cooperate. Most of the practical coding schemes consider a specific case of the binary symmetric source with uniform distribution and side information assumed to be perfectly known to the decoder. In this paper, we concentrate on a more complicated model of the binary source. Moreover, we consider a case when side information is lossy encoded. First we generalize the approach by Gu et al. [1] in order to obtain a lower bound on the achievable rates for a general binary source. Then, a new practical “multi-class” coding scheme for this binary source with uncoded binary side information is suggested. Simulation results for LDPC-based coding for both binary symmetric and general binary sources are presented for scenarios with trellis-coded and uncoded side information, respectively. Comparisons with the previously known numerical results are presented.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129087967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sequential Classification with Empirically Observed Statistics","authors":"Mahdi Haghifam, V. Tan, A. Khisti","doi":"10.1109/ITW44776.2019.8988993","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8988993","url":null,"abstract":"Motivated by real-world machine learning applications, we consider the binary statistical classification task in the sequential setting where the generating distributions are unknown and only empirically sampled sequences are available to the decision maker. Then, the decision maker is tasked to classify a test sequence which is known to be generated according to either one of two distributions. The decision maker wishes to perform the classification task with minimum number of the test samples, so, at each step, it declares either “1”, “2” or “give me one more test sample”. We propose a classifier and analyze the type-I and type-II error probabilities. Also, we show the advantage of our sequential scheme compared to the existing non-sequential classifiers.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116222179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tomer Berg, O. Shayevitz, Young-Han Kim, Lele Wang
{"title":"Some Results on Distributed Source Simulation with no Communication","authors":"Tomer Berg, O. Shayevitz, Young-Han Kim, Lele Wang","doi":"10.1109/ITW44776.2019.8989131","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989131","url":null,"abstract":"We consider the problem of distributed source simulation with no communication, in which Alice and Bob observe sequences Un and Vn respectively, drawn from a joint distribution $p_{UV}^{otimes n}$, and wish to locally generate sequences Xn and Yn respectively with a joint distribution that is close (in KL divergence) to $p_{XY}^{otimes n}$. We provide a single-letter condition under which such a simulation is asymptotically possible with a vanishing KL divergence. Our condition is nontrivial only in the case where the Gàcs-Körner (GK) common information between U and V is nonzero, and we conjecture that only scalar Markov chains $X-U-V-Y$ can be simulated otherwise. Motivated by this conjecture, we further examine the case where both pUV and pXY are doubly symmetric binary sources with parameters $p, qleq 1/2$ respectively. While it is trivial that in this case $pleq q$ is both necessary and sufficient, we show that when p is close to q then any successful simulation is close to being scalar in the total variation sense.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116154008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Differential Power Analysis Attacks from an Information-Theoretic Perspective","authors":"Andrea Grigorescu, H. Boche","doi":"10.1109/ITW44776.2019.8989406","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989406","url":null,"abstract":"Differential power analysis (DPA) attacks exploit the variance in power measurements of cryptographic devices to recover secret keys. What can an adversary achieve with power measurements? In this work, information-theoretic tools are used to quantity the amount of sensitive information revealed by a power measurement. It is shown that in order to find a secret key, an adversary needs to try a number of different keys. The number is exponential to the key size and the exponent is given by the key’s entropy, conditioned on the power measurement.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124111673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coding for Non-IID Sources and Channels: Entropic Approximations and a Question of Ahlswede","authors":"H. Boche, R. Schaefer, H. Poor","doi":"10.1109/ITW44776.2019.8989316","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989316","url":null,"abstract":"The theory of Verdú and Han provides a powerful framework to analyze and study general non-independent and identically distributed (non-i.i. d.) sources and channels. Already for simple non-i.i. d. sources and channels, this framework can result in complicated general capacity formulas. Ahlswede asked in his Shannon lecture if these general capacity formulas can be effectively, i.e., algorithmically, computed. In this paper, it is shown that there exist computable non-i.i. d. sources and channels, for which the capacity is a non-computable number. Even worse, it is shown that there are non-i.i. d. sources and channels for which the capacity is a computable number, i.e., the limit of the corresponding sequence of multi-letter capacity expressions is computable, but the convergence of this sequence is not effective. This answers Ahlswede’s question in a strong form, since in this case, the multi-letter capacity expressions for these sources and channels cannot be used to approximate the optimal performance algorithmically.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126036181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Caching and Delivery for Combination Networks with Asymmetric Connectivity","authors":"Ahmed A. Zewail, A. Yener","doi":"10.1109/ITW44776.2019.8989151","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989151","url":null,"abstract":"We consider information theoretic security in a two-hop combination network where there are groups of end users with distinct degrees of connectivity served by a layer of relays. The model represents a network set up with users having access to asymmetric resources, here the number of relays that they are connected to, yet demand security guarantees uniformly. We study two security constraints separately and simultaneously: secure delivery where the information must be kept confidential from an external entity that wiretaps the delivery phase; and secure caching where each cache-aided end-user can retrieve the file it requests and cannot obtain any information on files it does not. The achievable schemes we construct are multi-stage where each stage completes requests by a class of users.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133319888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Salman Salamatian, Litian Liu, Ahmad Beirami, M. Médard
{"title":"Mismatched Guesswork and One-to-One Codes","authors":"Salman Salamatian, Litian Liu, Ahmad Beirami, M. Médard","doi":"10.1109/ITW44776.2019.8989381","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989381","url":null,"abstract":"We study the problem of mismatched guesswork, where we evaluate the number of symbols $y in mathcal{Y}$ which have higher likelihood than $X sim mu$ according to a mismatched distribution μ. We discuss the role of the tilted/exponential families of the source distribution μ and of the mismatched distribution ν. We show that the value of guesswork can be characterized using the tilted family of the mismatched distribution v, while the probability of guessing is characterized by an exponential family which passes through μ. Using this characterization, we demonstrate that the mismatched guesswork follows a large deviation principle (LDP), where the rate function is described implicitly using information theoretic quantities. We apply these results to one-to-one source coding (without prefix free constraint) to obtain the cost of mismatch in terms of average codeword length. We show that the cost of mismatch in one-to-one codes is no larger than that of the prefix-free codes, i.e., $D(muVertnu)$. Further, the cost of mismatch vanishes if and only if ν lies on the tilted family of the true distribution μ, which is in stark contrast to the prefix-free codes. These results imply that one-to-one codes are inherently more robust to mismatch.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"8 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126128874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}