The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we consider the compound wiretap channel with collaborative wiretappers. Contrarily to [1], where the wiretappers act independently, we analyze the setup when the wiretappers form a coalition, which shares the observed data within the coalition. The goal of coalition consists in learning the secret message communicated to the legitimate user by sharing their observations to produce...
In many problems such as biometrics, multimedia search and retrieval, recommendation systems requiring privacy-preserving similarity computations and identification, some binary features are stored in the public domain or outsourced to the third parties that might raise certain privacy concerns about the original data. To avoid this privacy leak, privacy protection is used. In the most cases, the...
In this paper the problem of evaluation of bound accuracy for the range based localization techniques in the wireless sensor networks is considered. The comprehensive analysis of the existing solution of the Cramer-Rao lower bound problem for the anchored localization based on the time of arrival or relative signal strength principles shows certain discrepancy between analytical solution and simulation...
We study the problem of multiple hypothesis testing (HT) in view of a rejection option. That model of HT has many different applications. Errors in testing of M hypotheses regarding the source distribution with an option of rejecting all those hypotheses are considered. The source is discrete and arbitrarily varying (AVS). The tradeoffs among error probability exponents/reliabilities associated with...
Content identification based on digital fingerprinting attracts a lot of attention in different emerging applications. In this paper, we consider digital identification based on the sign-magnitude decomposition of fingerprint codewords and analyze the achievable rates for each component. We introduce a channel splitting approach and reveal certain interesting phenomena related to channel polarization...
In this paper we analyze the problem of object identification in channels with desynchronization. In our analysis we assume that the identification system is designed using a pilot-based re-synchronization mechanism that assists desynchro-nization compensation with a certain accuracy. We demonstrate how the accuracy of re-synchronization impacts the information-theoretic limits of identification system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.