Active Privacy-Utility Trade-Off Against Inference in Time-Series Data Sharing

Submitted by admin on Mon, 06/10/2024 - 05:00
Internet of Things devices have become highly popular thanks to the services they offer. However, they also raise privacy concerns since they share fine-grained time-series user data with untrusted third parties. We model the user’s personal information as the secret variable, to be kept private from an honest-but-curious service provider, and the useful variable, to be disclosed for utility.

SPRT-Based Efficient Best Arm Identification in Stochastic Bandits

Submitted by admin on Mon, 06/10/2024 - 05:00
This paper investigates the best arm identification (BAI) problem in stochastic multi-armed bandits in the fixed confidence setting. The general class of the exponential family of bandits is considered. The existing algorithms for the exponential family of bandits face computational challenges. To mitigate these challenges, the BAI problem is viewed and analyzed as a sequential composite hypothesis testing task, and a framework is proposed that adopts the likelihood ratio-based tests known to be effective for sequential testing.

Dual-Blind Deconvolution for Overlaid Radar-Communications Systems

Submitted by admin on Mon, 06/10/2024 - 05:00
The increasingly crowded spectrum has spurred the design of joint radar-communications systems that share hardware resources and efficiently use the radio frequency spectrum. We study a general spectral coexistence scenario, wherein the channels and transmit signals of both radar and communications systems are unknown at the receiver. In this dual-blind deconvolution (DBD) problem, a common receiver admits a multi-carrier wireless communications signal that is overlaid with the radar signal reflected off multiple targets.

An Information-Theoretic Approach to Collaborative Integrated Sensing and Communication for Two-Transmitter Systems

Submitted by admin on Mon, 06/10/2024 - 05:00
This paper considers information-theoretic models for integrated sensing and communication (ISAC) over multi-access channels (MAC) and device-to-device (D2D) communication. The models are general and include as special cases scenarios with and without perfect or imperfect state-information at the MAC receiver as well as causal state-information at the D2D terminals. For both setups, we propose collaborative sensing ISAC schemes where terminals not only convey data to the other terminals but also state-information that they extract from their previous observations.

Editorial Modern Compression

Submitted by admin on Mon, 06/10/2024 - 05:00
Modern computation and networking environments are struggling to store, communicate and process data in unprecedented volumes. These data, which come in new and evolving structures and formats, necessitate compression, lossless and lossy. Recent years have witnessed the emergence of new techniques, approaches, architectures and modes for data compression. This special issue is dedicated to cutting-edge research geared toward providing information theoretic insight into this space.