Research
I am always open for collaboration to explore something new or related. General topics of interest are
physical layer privacy and security
information theory
statistical learning and inference
(wireless) communications
signal processing & algorithms
networked control
- My publication list can be found here (pdf file). In my publications, I follow the principle that authors are ordered according to their contributions (first author contributed most, last author contributed least). Here are some selected more concrete research topics on which I have recently worked on (incomplete):
Privacy-preserving Learning
Due to privacy reasons, disclosure of data might not be possible so that value of the data is not exploited. It is therefore important to develop and analyze data analysis tools with disclosure control and provable privacy guarantees for learning and sharing of data. The goal is to develop clever mechanisms that maximize the utility while satisfying the suitable privacy constraints.
Biometric Identification Systems
Biometric data brings convenience in systems, but it also invokes privacy and secrecy issues. Physical layer security provides strong strong privacy and security guarantees. Thus, how to design optimal biometric identification systems and what are the optimal trade-offs?
"Incremental Design of Secure Biometric Identification and Authentication," ISIT 2021, jointly with L. Zhou and M. Skoglund.
"Privacy-Preserving Identification Systems with Noisy Enrollment," IEEE T-IFS, May 2021 jointly with L. Zhou, M. T. Vu, and M. Skoglund.
"Two-Stage Biometric Identification Systems without Privacy Leakage," IEEE J. on Selected Areas in Inform. Theory, March 2021 jointly with L. Zhou, M. T. Vu, and M. Skoglund.
Data-driven Calibration Algorithms
The basic working mechanism of a sensor is to convert a specific physical quantity to an electrical signal. The physical model of the sensor however might not incorporate all dependencies of environmental factors. One vital approach is adjust a calibration parameter to compensate for the remaining environmental factors. How to design efficient algorithms to learn the dependency and provide mechanisms that provide a belief function on the sensor measurements?
Fundamental Bounds in Distributed Decision-making
In 1968, Witsenhausen formulated a two-stage control problem for which he showed that non-linear policies outperform the best linear policy. Therewith, he disproved the conjecture that the optimality of linear strategies for centralized linear quadratic Gaussian control problems extends to decentralized systems. The optimal solution of this toy problem remains unsolved, but it is an interesting study object since it points on a very fundamental issue. We take a fresh approach approach deriving fundamental bounds using coordination coding results.
Smart Meter Privacy
Energy consumption profiles contain lots of private information about consumer habits and actions. Thus, privacy becomes more and more an issue with increasing resolution of smart meters in future smart grids. How can we assess the privacy risk and how can we protect the consumer privacy? Can we manipulate the energy consumption profile to enhance the privacy level? What are the fundamental limits to protect against un-authorised inference on consumers behaviour and habits?
"Design Framework for Privacy- Aware Demand-Side Management with Realistic Energy Storage Model," IEEE T-SG, July 2021, jointly with R. Reddy, J. Chin, G. Hug and D. Mansson.
"Energy Management Strategy for Smart Meter Privacy and Cost Saving," IEEE T-TIFS, Nov 2020, jointly with Y. Yang and Z. Li.
"Smart Meter Privacy Based on Adversarial Hypothesis Testing," IEEE ISIT, June 2017, jointly with Z. Li and D. Gunduz.
"Privacy-preserving energy flow control in smart grids," IEEE ICASSP, March 2016, jointly with Z. Li and M. Skoglund.
"Privacy on Hypothesis Testing in Smart Grids," IEEE ITW, Oct. 2015, jointly with Z. Li.
A tutorial for WIFS 2018 jointly with D. Gunduz, Imperial College London, can be found here (pdf slides ).
Identification
Identification of a user or item is a key task of a search in a database, e.g. for authentication. However with high dimensional data, the storage size and search complexity become the critical parameters. If the identification additionally deals with personal data, then we also face a privacy problem. To deal with such problems, we study fundamental properties of a two stage identification system with pre-processing.
"Hypothesis Testing and Identification Systems," IEEE Trans. Inf. Theory, June 2021, jointly with M. T. Vu and M. Skoglund.
"Uncertainty in Identification Systems," IEEE Trans. Inf. Theory, March 2021, jointly with M. T. Vu, H. Boche and M. Skoglund.
"Hierarchical Identification with Pre-processing," IEEE Trans. Inf. Theory, Jan 2020, jointly with M. T. Vu and M. Skoglund.
Parts of the work have been presented in an invited talk at DigiCosme in Oct 2017 (slides).
Secure Estimation
Estimation and tracking the state of a dynamical system is essential for future cyber-physical systems. However, we may want to keep the state keep secret. How can we achieve a secure communication over an uncertain channel so that an unauthorized receiver will not be able to track the state? What are the fundamental necessary and sufficient conditions?
"Secure Estimation and Zero-Error Secrecy Capacity," IEEE T-AC, Dec 2016, accepted Nov 2017, jointly with M. Wiese, K.-H. Johannsson, P. Papadimitratos, H. Sandberg, and M. Skolglund
"Secure Estimation for Unstable Systems," in Proc. IEEE Conference on Decision and Control, Las Vegas, Dec 2016, joinlty with M. Wiese, K.-H. Johannsson, P. Papadimitratos, H. Sandberg, and M. Skolglund.
"Secure Distributed Estimation of Linear Systems," in Proc. IEEE Conference on Communications and Network Security, Philadelphia, PA, Oct 2016, joinlty with M. Wiese.
Distributed Detection with Privacy
Consider a distributed detection problem where links are attacked by an eavesdropper. How to achieve a privacy-aware system design considering a detection-theoretic operational privacy metric? What kind of detection strategies are sufficient to consider for optimization? Some selected publications:
"Privacy-Aware Distributed Bayesian Detection," IEEE Journal of
Selected Areas in Signal Processing, Oct. 2015 jointly with Z. Li.
"Tandem Distributed Bayesian Detection with Privacy Constraints," Proc. IEEE ICASSP, May 2014, jointly with Z. Li.
"Parallel Distributed Neyman-Pearson Detection with Privacy Constraints," Proc. IEEE ICC Workshop, June 2014, jointly with Z. Li and J. Jalden.
"Differential Privacy in Parallel Distributed Bayesian Detections," Proc. Fusion, July 2014, jointly with Z. Li.
Here you can find an overview presentation (pdf) I gave at Princeton in June 2014.
Optimal Transmit Strategies with Per-Antenna Power Constraints
The capacity of wireless channels can be significantly increased if we use multiple antennas at the transmitter and receiver. Since each transmit antenna has its own power amplifier, it is reasonable to assume that we have per-antenna power constraint. Thus, what are the optimal transmit strategies taking this into account? How can we compute the optimal transmit strategies?
"Optimal Transmit Strategies for Gaussian MISO Wiretap Channels," IEEE T-IFS, July 2019, jointly with P. Cao.
"Optimal Transmit Strategies for the MISO Wiretap Chnel with Per-Antenna Power Constraints," in Proc. ITG Workshop on Smart Antennas, Berlin, 2017, jointly with P. Cao.
"Optimal Transmit Strategy for MISO Channels with Joint Sum and Per-antenna Power Constraints," IEEE Trans. Signal Processing, Aug 2016, jointly with P. Cao, R. Schaefer, and M. Skoglund.
"Optimal Transmit Strategy for MIMO Channels with Joint Sum and Per-antenna Power Constraints," in Proc. IEEE ICASSP 2016, jointly with P. Cao.
Secure Source Coding Problems
Consider a distributed source coding setup where the communication is eavesdropped. What is the optimal coding strategy limiting the information leakage to an eavesdropper? What are bounds on the optimal trade-off between rates over public and private channels, distortion, and information leakage? Some selected publications:
"Secure Block Source Coding with Sequential Encoding," IEEE J. Sel. Areas in Inform. Theory, March 2021, jointly with H. Ghourchian, F. Stavrou, M. Skoglund.
"Polar code for secure Wyner-Ziv coding," IEEE WIFS 2016, joinlty with M. T. Vu and M. Skoglund.
"Secure Source Coding with Action-dependent Side Information," in IEEE Transactions in Information Theory, Dec. 2015, jointly with K. Kittichokechai, Y.-K. Chia, and M. Skoglund.
"Lossy Source Coding with Reconstruction Privacy," Proc. IEEE ISIT June 2014, jointly with K. Kittichokechai, and M. Skoglund.
"Secure Successive Refinement with Degraded Side Information," Proc. ISIT June 2014, jointly with D. Xu, K. Kittichokechai, and M. Skoglund.
"Secure Source Coding with a Public Helper," IEEE Trans. Inform. Theory, Nov 2016, jointly with K. Kittichokechai, Y.-K. Chia, M. Skoglund, and T. Weissman.
Broadcast Channel with RX Message Cognition
Consider communication problems over a broadcast channel where the receivers have (partial) knowledge about messages to be transmitted to other receivers. What is the optimal coding strategy? Considering (vector-valued) Gaussian channels, what is the optimal transmit strategy/input distribution? Some selected publications:
"Bidirectional Broadcast Channel with Random States Non-causally Known at the Encoder," IEEE Trans. Inform. Theory, Jan. 2013, jointly with M. Skoglund.
"Broadcast Capacity Regions with Three Receivers and Message Cognition,"
Proc. ISIT, July 2012, jointly with R. Timo, and M. Wigger.
"Optimal Transmit Strategy for the MIMO Bidirectional Broadcast Channel," IEEE Trans. Commun., Dec. 2009, jointly with E. Jorswieck, R. Wyrembelski, and H. Boche.
Multi-terminal Networked Control
Consider a multi-terminal Gaussian closed-loop control setup where the plant observations are communicated over Gaussian channels to the controller(s). What are necessary and sufficient conditions for mean-square stability? What are suitable/optimal communication and control strategies?
"Stabilization Over Gaussian Networks," IEEE Trans. Autom. Control, Sept. 2014, jointly with A. Zaidi, S. Yuksel, and M. Skoglund.
"On Optimal Policies for Control and Estimation Over a Gaussian Relay Channel," Automatica, Sept. 2013, jointly A. Zaidi, S. Yuksel, and M. Skoglund.
"Sufficient Conditions for Closed-Loop Control Over Multiple-Access and Broadcast Channels," Proc. CDC, Dec. 2010, jointly with A. Zaidi, and M. Skoglund.
Approximation of Gaussian Mixture Distribution
Consider a Gaussian mixture distribution with a very large number of components. How can I approximate the entropy of such distribution? Which terms are most relevant and how to merge and prune other terms?
Complexity efficient receiver algorithm for IEEE802.11p
Wireless communication in vehicular environment is challenging due to the variation of the channel state. How can we improve the receiver performance in such environments? How can we efficiently estimate the channel state and decode the payload in IEEE802.11p communication?
"Low Complexity Scalable Iterative Algorithms for IEEE 802.11p Receivers,"
IEEE Transactions on Vehicular Technology, Sept. 2015, jointly with O. Goubet, G. Baudic, and F. Gabry.
- Note:
List of selected research topics and results is subject to be revised\updated\completed…
Here, you can find a word cloud created with from my publication titles 2010-2015.
|