no code implementations • 5 Aug 2023 • Seyyed AmirHossein Ameli Kalkhoran, Mehdi Letafati, Ecenaz Erdemir, Babak Hossein Khalaj, Hamid Behroozi, Deniz Gündüz
Adversarial accuracy of eavesdroppers are also studied over Rayleigh fading, Nakagami-m, and AWGN channels to verify the generalization of the proposed scheme.
no code implementations • 24 Nov 2022 • Ecenaz Erdemir, Tze-Yang Tung, Pier Luigi Dragotti, Deniz Gunduz
In GenerativeJSCC, we carry out end-to-end training of an encoder and a StyleGAN-based decoder, and show that GenerativeJSCC significantly outperforms DeepJSCC both in terms of distortion and perceptual quality.
no code implementations • 11 Feb 2022 • Ecenaz Erdemir, Pier Luigi Dragotti, Deniz Gunduz
For privacy measure, we consider both the probability of correctly detecting the true value of the secret and the mutual information (MI) between the secret and the released data.
no code implementations • 8 Oct 2021 • Ecenaz Erdemir, Pier Luigi Dragotti, Deniz Gunduz
We study privacy-aware communication over a wiretap channel using end-to-end learning.
1 code implementation • NeurIPS 2021 • Ecenaz Erdemir, Jeffrey Bickford, Luca Melis, Sergul Aydore
Robustness of machine learning models is critical for security related applications, where real-world adversaries are uniquely focused on evading neural network based detectors.
no code implementations • 16 Feb 2021 • Ecenaz Erdemir, Pier Luigi Dragotti, Deniz Gunduz
We consider a user releasing her data containing some personal information in return of a service.
no code implementations • 4 Mar 2020 • Ecenaz Erdemir, Pier Luigi Dragotti, Deniz Gunduz
We measure the privacy leakage by the mutual information between the user's true data sequence and shared version.
no code implementations • 17 Jul 2019 • Ecenaz Erdemir, Pier Luigi Dragotti, Deniz Gunduz
Existing approaches are mainly focused on privacy of sharing a single location or myopic location trace privacy; neither of them taking into account the temporal correlations between the past and current locations.
Information Theory Cryptography and Security Information Theory