kth.sePublikationer
Ändra sökning
Länk till posten
Permanent länk

Direktlänk
Oechtering, Tobias J.ORCID iD iconorcid.org/0000-0002-0036-9049
Alternativa namn
Publikationer (10 of 218) Visa alla publikationer
Chen, Y., Oechtering, T. J., Skoglund, M. & Luo, Y. (2025). On Strong Secrecy for Multiple Access Channels With States and Causal CSI. IEEE Transactions on Information Theory, 71(4), 3070-3099
Öppna denna publikation i ny flik eller fönster >>On Strong Secrecy for Multiple Access Channels With States and Causal CSI
2025 (Engelska)Ingår i: IEEE Transactions on Information Theory, ISSN 0018-9448, E-ISSN 1557-9654, Vol. 71, nr 4, s. 3070-3099Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

Strong secrecy communication over a discrete memoryless state-dependent multiple access channel (SD-MAC) with an external eavesdropper is investigated. The channel is governed by discrete memoryless and i.i.d. channel states, and the channel state information (CSI) is revealed to the encoders in a causal manner. The main results of this paper are inner and outer bounds of the capacity region, for which we investigate coding schemes incorporating wiretap coding and secret key agreements between the sender and the legitimate receiver. Two kinds of block Markov coding schemes are proposed. The first is a new coding scheme that uses backward decoding and the Wyner-Ziv coding, and the secret key is constructed from a lossy description of the CSI. The other is an extended version of an existing coding scheme for point-to-point wiretap channels with causal CSI. A numerical example shows that the achievable region given by the first coding scheme can be strictly larger than the second one. However, these two schemes do not outperform each other in general, and there exist some numerical examples in which each coding scheme achieves some rate pairs that cannot be achieved by another scheme. Our established inner bound reduces to some best-known results in the literature as special cases. We further investigate some capacity-achieving cases for state-dependent multiple access wiretap channels (SD-MAWCs) with degraded message sets. It turns out that the two coding schemes are both optimal in these cases.

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE), 2025
Nyckelord
Channel coding, Wireless networks, Surveillance, Oral communication, Forensics, Eavesdropping, Decoding, Channel models, Random variables, Upper bound, Multiple access channel, wiretap channel, causal channel state information, strong secrecy
Nationell ämneskategori
Telekommunikation
Identifikatorer
urn:nbn:se:kth:diva-365941 (URN)10.1109/TIT.2025.3536017 (DOI)001487797000018 ()2-s2.0-85216889166 (Scopus ID)
Anmärkning

QC 20250703

Tillgänglig från: 2025-07-03 Skapad: 2025-07-03 Senast uppdaterad: 2025-07-03Bibliografiskt granskad
Saeidian, S., Cervia, G., Oechtering, T. J. & Skoglund, M. (2025). Rethinking disclosure prevention with pointwise maximal leakage. Journal of Privacy and Confidentiality, 15(1)
Öppna denna publikation i ny flik eller fönster >>Rethinking disclosure prevention with pointwise maximal leakage
2025 (Engelska)Ingår i: Journal of Privacy and Confidentiality, E-ISSN 2575-8527, Vol. 15, nr 1Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

This paper introduces a paradigm shift in the way privacy is defined, driven by a novel interpretation of the fundamental result of Dwork and Naor about the impossibility of absolute disclosure prevention. We propose a general model of utility and privacy in which utility is achieved by disclosing the value of low-entropy features of a secret X, while privacy is maintained by hiding the value of high-entropy features of X. Adopting this model, we prove that, contrary to popular opinion, it is possible to provide meaningful inferential privacy guarantees. These guarantees are given in terms of an operationally-meaningful information measure called pointwise maximal leakage (PML) and prevent privacy breaches against a large class of adversaries regardless of their prior beliefs about X. We show that PML-based privacy is compatible with and provides insights into existing notions such as differential privacy. We also argue that our new framework enables highly flexible mechanism designs, where the randomness of a mechanism can be adjusted to the entropy of the data, ultimately, leading to higher utility.

Ort, förlag, år, upplaga, sidor
Society for Privacy and Confidentiality Research, 2025
Nyckelord
Disclosure Prevention, Inferential Privacy, Information Leakage, Pointwise Maximal Leakage
Nationell ämneskategori
Datavetenskap (datalogi)
Identifikatorer
urn:nbn:se:kth:diva-362541 (URN)10.29012/jpc.893 (DOI)2-s2.0-105002152635 (Scopus ID)
Anmärkning

QC 20250417

Tillgänglig från: 2025-04-16 Skapad: 2025-04-16 Senast uppdaterad: 2025-04-17Bibliografiskt granskad
Avula, R. R., Oechtering, T. J. & Månsson, D. (2024). Adversarial Inference Control in Cyber-Physical Systems: A Bayesian Approach With Application to Smart Meters. IEEE Access, 12, 24933-24948
Öppna denna publikation i ny flik eller fönster >>Adversarial Inference Control in Cyber-Physical Systems: A Bayesian Approach With Application to Smart Meters
2024 (Engelska)Ingår i: IEEE Access, E-ISSN 2169-3536, Vol. 12, s. 24933-24948Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

With the emergence of cyber-physical systems (CPSs) in utility systems like electricity, water, and gas networks, data collection has become more prevalent. While data collection in these systems has numerous advantages, it also raises concerns about privacy as it can potentially reveal sensitive information about users. To address this issue, we propose a Bayesian approach to control the adversarial inference and mitigate the physical-layer privacy problem in CPSs. Specifically, we develop a control strategy for the worst-case scenario where an adversary has perfect knowledge of the user’s control strategy. For finite state-space problems, we derive the fixed-point Bellman’s equation for an optimal stationary strategy and discuss a few practical approaches to solve it using optimization-based control design. Addressing the computational complexity, we propose a reinforcement learning approach based on the Actor-Critic architecture. To also support smart meter privacy research, we present a publicly accessible “Co-LivEn” dataset with comprehensive electrical measurements of appliances in a co-living household. Using this dataset, we benchmark the proposed reinforcement learning approach. The results demonstrate its effectiveness in reducing privacy leakage. Our work provides valuable insights and practical solutions for managing adversarial inference in cyber-physical systems, with a particular focus on enhancing privacy in smart meter applications.

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE), 2024
Nyckelord
Adversarial inference, Bayesian control, cyber-physical systems, deep reinforcement learning, privacy control, smart meters
Nationell ämneskategori
Signalbehandling
Forskningsämne
Elektro- och systemteknik
Identifikatorer
urn:nbn:se:kth:diva-343859 (URN)10.1109/access.2024.3365270 (DOI)001173060400001 ()2-s2.0-85186047121 (Scopus ID)
Anmärkning

QC 20240226

Tillgänglig från: 2024-02-26 Skapad: 2024-02-26 Senast uppdaterad: 2024-04-29Bibliografiskt granskad
Zhao, M., Treust, M. L. & Oechtering, T. J. (2024). Causal Vector-Valued Witsenhausen Counterexamples with Feedback. In: 2024 IEEE Information Theory Workshop, ITW 2024: . Paper presented at 2024 IEEE Information Theory Workshop, ITW 2024, Shenzhen, China, Nov 24 2024 - Nov 28 2024 (pp. 687-692). Institute of Electrical and Electronics Engineers (IEEE)
Öppna denna publikation i ny flik eller fönster >>Causal Vector-Valued Witsenhausen Counterexamples with Feedback
2024 (Engelska)Ingår i: 2024 IEEE Information Theory Workshop, ITW 2024, Institute of Electrical and Electronics Engineers (IEEE) , 2024, s. 687-692Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

We study the continuous vector-valued Witsen-hausen counterexample with Gaussian states through the lens of empirical coordination coding. We characterize the region of achievable pairs of costs in three scenarios: (i) causal encoding and causal decoding, (ii) causal encoding and causal decoding with channel feedback, and (iii) causal encoding and noncausal decoding with channel feedback. In these vector-valued versions of the problem, the optimal coding schemes must rely on a time-sharing strategy, since the region of achievable pairs of costs might not be convex in the scalar version of the problem. We examine the role of the channel feedback when the encoder is causal and the decoder is either causal or non-causal, and we show that feedback improves the performance, only when the decoder is non-causal.

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE), 2024
Nationell ämneskategori
Telekommunikation
Identifikatorer
urn:nbn:se:kth:diva-359867 (URN)10.1109/ITW61385.2024.10806960 (DOI)001433908800116 ()2-s2.0-85216513296 (Scopus ID)
Konferens
2024 IEEE Information Theory Workshop, ITW 2024, Shenzhen, China, Nov 24 2024 - Nov 28 2024
Anmärkning

Part of ISBN 9798350348934]

QC 20250213

Tillgänglig från: 2025-02-12 Skapad: 2025-02-12 Senast uppdaterad: 2025-05-05Bibliografiskt granskad
Zhao, M., Treust, M. L. & Oechtering, T. J. (2024). Coordination Coding with Causal Encoder for Vector-Valued Witsenhausen Counterexample. In: 2024 IEEE International Symposium on Information Theory, ISIT 2024 - Proceedings: . Paper presented at 2024 IEEE International Symposium on Information Theory, ISIT 2024, Athens, Greece, Jul 7 2024 - Jul 12 2024 (pp. 3255-3260). Institute of Electrical and Electronics Engineers (IEEE)
Öppna denna publikation i ny flik eller fönster >>Coordination Coding with Causal Encoder for Vector-Valued Witsenhausen Counterexample
2024 (Engelska)Ingår i: 2024 IEEE International Symposium on Information Theory, ISIT 2024 - Proceedings, Institute of Electrical and Electronics Engineers (IEEE) , 2024, s. 3255-3260Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

We investigate the Witsenhausen counterexample in a continuous vector-valued context with a causal encoder and noncausal decoder. Our main result is the optimal single-letter condition that characterizes the set of achievable Witsenhausen power costs and estimation costs, leveraging a modified weak typicality approach. In particular, we accommodate our power analysis to the causal encoder constraint, and provide an improved distortion error analysis for the challenging estimation of the interim state. Interestingly, the idea of dual role of control is explicitly captured by the two auxiliary random variables.

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE), 2024
Nationell ämneskategori
Sannolikhetsteori och statistik
Identifikatorer
urn:nbn:se:kth:diva-353516 (URN)10.1109/ISIT57864.2024.10619377 (DOI)2-s2.0-85202801591 (Scopus ID)
Konferens
2024 IEEE International Symposium on Information Theory, ISIT 2024, Athens, Greece, Jul 7 2024 - Jul 12 2024
Anmärkning

Part of ISBN [9798350382846]

QC 20240919

Tillgänglig från: 2024-09-19 Skapad: 2024-09-19 Senast uppdaterad: 2024-11-08Bibliografiskt granskad
Chen, Y., Oechtering, T. J., Boche, H., Skoglund, M. & Luo, Y. (2024). Distribution-Preserving Integrated Sensing and Communication with Secure Reconstruction. In: 2024 IEEE International Symposium on Information Theory, ISIT 2024 - Proceedings: . Paper presented at 2024 IEEE International Symposium on Information Theory, ISIT 2024, Athens, Greece, Jul 7 2024 - Jul 12 2024 (pp. 2574-2579). Institute of Electrical and Electronics Engineers (IEEE)
Öppna denna publikation i ny flik eller fönster >>Distribution-Preserving Integrated Sensing and Communication with Secure Reconstruction
Visa övriga...
2024 (Engelska)Ingår i: 2024 IEEE International Symposium on Information Theory, ISIT 2024 - Proceedings, Institute of Electrical and Electronics Engineers (IEEE) , 2024, s. 2574-2579Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Distribution-preserving integrated sensing and communication with secure reconstruction is investigated in this paper. In addition to the distortion constraint, we impose another constraint on the distance between the reconstructed sequence distribution and the original state distribution to force the system to preserve the statistical property of the channel states. An inner bound of the distribution-preserving capacity-distortion region is provided with some capacity region results under special cases. A numerical example demonstrates the tradeoff between the communication rate, reconstruction distortion and distribution preservation. Furthermore, we consider the case that the reconstructed sequence should be kept secret from an eavesdropper who also observes the channel output. An inner bound of the tradeoff region and a capacity-achieving special case are presented.

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE), 2024
Nationell ämneskategori
Signalbehandling Telekommunikation
Identifikatorer
urn:nbn:se:kth:diva-367199 (URN)10.1109/ISIT57864.2024.10619214 (DOI)001304426902119 ()2-s2.0-85198645928 (Scopus ID)
Konferens
2024 IEEE International Symposium on Information Theory, ISIT 2024, Athens, Greece, Jul 7 2024 - Jul 12 2024
Anmärkning

Part of ISBN 9798350382846

QC 20250715

Tillgänglig från: 2025-07-15 Skapad: 2025-07-15 Senast uppdaterad: 2025-07-15Bibliografiskt granskad
Pan, C., Bohlin, G. & Oechtering, T. J. (2024). Environmental Variation or Instrumental Drift? A Probabilistic Approach to Gas Sensor Drift Modeling and Evaluation. In: 2024 IEEE Sensors, SENSORS 2024 - Conference Proceedings: . Paper presented at 2024 IEEE Sensors, SENSORS 2024, Kobe, Japan, Oct 20 2024 - Oct 23 2024. Institute of Electrical and Electronics Engineers (IEEE)
Öppna denna publikation i ny flik eller fönster >>Environmental Variation or Instrumental Drift? A Probabilistic Approach to Gas Sensor Drift Modeling and Evaluation
2024 (Engelska)Ingår i: 2024 IEEE Sensors, SENSORS 2024 - Conference Proceedings, Institute of Electrical and Electronics Engineers (IEEE) , 2024Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Drift is a significant issue that undermines the reliability of gas sensors. This paper introduces a probabilistic model to distinguish between environmental variation and instrumental drift, using low-cost non-dispersive infrared (NDIR) CO2 sensors as a case study. Data from a long-term field experiment is analyzed to evaluate both sensor performance and environmental changes over time. Our approach employs importance sampling to isolate instrumental drift from environmental variation, providing a more accurate assessment of sensor performance. The results show that failing to account for environmental variation can significantly affect the evaluation of sensor drift, leading to improper calibration processes.

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE), 2024
Nyckelord
environmental variation, importance sampling, instrumental drift, NDIR CO sensors 2, probabilistic modeling, Sensor drift
Nationell ämneskategori
Annan elektroteknik och elektronik
Identifikatorer
urn:nbn:se:kth:diva-359272 (URN)10.1109/SENSORS60989.2024.10784897 (DOI)001417533500303 ()2-s2.0-85215273737 (Scopus ID)
Konferens
2024 IEEE Sensors, SENSORS 2024, Kobe, Japan, Oct 20 2024 - Oct 23 2024
Anmärkning

Part of ISBN 979-8-3503-6351-7

QC 20250131

Tillgänglig från: 2025-01-29 Skapad: 2025-01-29 Senast uppdaterad: 2025-04-01Bibliografiskt granskad
Saeidian, S., Oechtering, T. J. & Skoglund, M. (2024). Evaluating Differential Privacy on Correlated Datasets Using Pointwise Maximal Leakage. In: Privacy Technologies and Policy - 12th Annual Privacy Forum, APF 2024, Proceedings: . Paper presented at 12th Annual Privacy Forum, APF 2024, Karlstad, Sweden, Sep 4 2024 - Sep 5 2024 (pp. 73-86). Springer Nature
Öppna denna publikation i ny flik eller fönster >>Evaluating Differential Privacy on Correlated Datasets Using Pointwise Maximal Leakage
2024 (Engelska)Ingår i: Privacy Technologies and Policy - 12th Annual Privacy Forum, APF 2024, Proceedings, Springer Nature , 2024, s. 73-86Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Data-driven advancements significantly contribute to societal progress, yet they also pose substantial risks to privacy. In this landscape, differential privacy (DP) has become a cornerstone in privacy preservation efforts. However, the adequacy of DP in scenarios involving correlated datasets has sometimes been questioned and multiple studies have hinted at potential vulnerabilities. In this work, we delve into the nuances of applying DP to correlated datasets by leveraging the concept of pointwise maximal leakage (PML) for a quantitative assessment of information leakage. Our investigation reveals that DP’s guarantees can be arbitrarily weak for correlated databases when assessed through the lens of PML. More precisely, we prove the existence of a pure DP mechanism with PML levels arbitrarily close to that of a mechanism which releases individual entries from a database without any perturbation. By shedding light on the limitations of DP on correlated datasets, our work aims to foster a deeper understanding of subtle privacy risks and highlight the need for the development of more effective privacy-preserving mechanisms tailored to diverse scenarios.

Ort, förlag, år, upplaga, sidor
Springer Nature, 2024
Nyckelord
Correlated data, Differential privacy, Pointwise maximal leakage
Nationell ämneskategori
Datavetenskap (datalogi)
Identifikatorer
urn:nbn:se:kth:diva-352149 (URN)10.1007/978-3-031-68024-3_4 (DOI)001292734100004 ()2-s2.0-85200951545 (Scopus ID)
Konferens
12th Annual Privacy Forum, APF 2024, Karlstad, Sweden, Sep 4 2024 - Sep 5 2024
Anmärkning

QC 20240823

Tillgänglig från: 2024-08-22 Skapad: 2024-08-22 Senast uppdaterad: 2024-09-27Bibliografiskt granskad
Grosse, L., Saeidian, S. & Oechtering, T. J. (2024). Extremal Mechanisms for Pointwise Maximal Leakage. IEEE Transactions on Information Forensics and Security, 19, 7952-7967
Öppna denna publikation i ny flik eller fönster >>Extremal Mechanisms for Pointwise Maximal Leakage
2024 (Engelska)Ingår i: IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, E-ISSN 1556-6021, Vol. 19, s. 7952-7967Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

Data publishing under privacy constraints can be achieved with mechanisms that add randomness to data points when released to an untrusted party, thereby decreasing the data's utility. In this paper, we analyze this privacy-utility tradeoff for the pointwise maximal leakage (PML) privacy measure and provide optimal privacy mechanisms for a general class of convex utility functions. PML was recently proposed as an operationally meaningful privacy measure based on two equivalent threat models: An adversary guessing a randomized function and an adversary aiming to maximize a general gain function. We prove a cardinality bound, showing that output alphabets of optimal mechanisms in this context need not to be larger than the size of their inputs. Then, we characterize the optimization region as a (convex) polytope. We derive closed-form optimal privacy mechanisms for arbitrary priors in the high privacy regime (when the privacy parameter is sufficiently small) and uniform priors for all ranges of the privacy parameter using tools from convex analysis. Furthermore, we present a linear program that can compute optimal mechanisms for PML in a general setting. We conclude by demonstrating the performance of the closed-form mechanisms through numerical simulations.

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE), 2024
Nyckelord
Data privacy, information leakage, maximal leakage, mechanism design, pointwise maximal leakage (PML), randomized response
Nationell ämneskategori
Reglerteknik Beräkningsmatematik
Identifikatorer
urn:nbn:se:kth:diva-367176 (URN)10.1109/TIFS.2024.3449556 (DOI)001311209200003 ()2-s2.0-85202702685 (Scopus ID)
Anmärkning

QC 20250715

Tillgänglig från: 2025-07-15 Skapad: 2025-07-15 Senast uppdaterad: 2025-07-15Bibliografiskt granskad
Zamani, A., Daei, S., Oechtering, T. J. & Skoglund, M. (2024). Multi-Task Private Semantic Communication. In: 2024 IEEE International Symposium on Information Theory, ISIT 2024 - Proceedings: . Paper presented at 2024 IEEE International Symposium on Information Theory, ISIT 2024, Athens, Greece, Jul 7 2024 - Jul 12 2024 (pp. 3480-3485). Institute of Electrical and Electronics Engineers (IEEE)
Öppna denna publikation i ny flik eller fönster >>Multi-Task Private Semantic Communication
2024 (Engelska)Ingår i: 2024 IEEE International Symposium on Information Theory, ISIT 2024 - Proceedings, Institute of Electrical and Electronics Engineers (IEEE) , 2024, s. 3480-3485Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

We study a multi-task private semantic communication problem, in which an encoder has access to an information source arbitrarily correlated with some latent private data. A user has L tasks with priorities. The encoder designs a message to be revealed which is called the semantic of the information source. Due to the privacy constraints the semantic can not be disclosed directly and the encoder adds noise to produce disclosed data. The goal is to design the disclosed data that maximizes the weighted sum of the utilities achieved by the user while satisfying a privacy constraint on the private data. In this work, we first consider a single-task scenario and design the added noise utilizing various methods including the extended versions of the Functional Representation Lemma, Strong Functional Representation Lemma, and separation technique. We then study the multi-task scenario and derive a simple design of the source semantics. We show that in the multi-task scenario the main problem can be divided into multiple parallel single-task problems.

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE), 2024
Nationell ämneskategori
Kommunikationssystem Datavetenskap (datalogi)
Identifikatorer
urn:nbn:se:kth:diva-353512 (URN)10.1109/ISIT57864.2024.10619137 (DOI)2-s2.0-85202801221 (Scopus ID)
Konferens
2024 IEEE International Symposium on Information Theory, ISIT 2024, Athens, Greece, Jul 7 2024 - Jul 12 2024
Anmärkning

 Part of ISBN [9798350382846]

QC 20240923

Tillgänglig från: 2024-09-19 Skapad: 2024-09-19 Senast uppdaterad: 2024-09-23Bibliografiskt granskad
Organisationer
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0000-0002-0036-9049

Sök vidare i DiVA

Visa alla publikationer