Zobrazeno 1 - 10
of 106
pro vyhledávání: '"Mhr. Khouzani"'
Publikováno v:
Entropy, Vol 24, Iss 1, p 39 (2021)
This work introduces channel-supermodular entropies, a subset of quasi-concave entropies. Channel-supermodularity is a property shared by some of the most commonly used entropies in the literature, including Arimoto–Rényi conditional entropies (wh
Externí odkaz:
https://doaj.org/article/be33d12663c54dfca3e56c2c67a76225
Publikováno v:
IEEE Transactions on Information Theory. 66:5537-5547
This work presents an axiomatization for entropy based on an extension of concavity called core-concavity. We show that core-concavity characterizes the largest class of functions for which the data-processing inequality holds, under the assumption t
Autor:
MHR Khouzani, Pasquale Malacaria
Publikováno v:
Entropy, Vol 20, Iss 11, p 817 (2018)
Information theory, as the mathematics of communication and storage of information, and game theory, as the mathematics of adversarial and cooperative strategic behaviour, are each successful fields of research on their own. [...]
Externí odkaz:
https://doaj.org/article/a272d6c3cafe44fe8b7b6b5d92388af9
Autor:
MHR. Khouzani, Pasquale Malacaria
Publikováno v:
Entropy, Vol 20, Iss 9, p 675 (2018)
This paper studies the problem of optimal channel design. For a given input probability distribution and for hard and soft design constraints, the aim here is to design a (probabilistic) channel whose output leaks minimally from its input. To analyse
Externí odkaz:
https://doaj.org/article/d41550ca46b74d1ba81d2ada436c9679
Autor:
Pasquale Malacaria, Mhr. Khouzani
Publikováno v:
IEEE Transactions on Information Theory. 65:888-901
We introduce a novel generalization of entropy and conditional entropy from which most definitions from the literature can be derived as particular cases. Within this general framework, we investigate the problem of designing countermeasures for info
Publikováno v:
ITW
This work introduces a new preorder over channels that is monotonic with Shannon’s mutual information for all distributions over the input alphabet. Moreover, this monotonicity also holds when substituting mutual information for quantities relative
Publikováno v:
EuroS&P Workshops
This work introduces a highly accurate and efficient malware detection system based on 1-dimensional convolutional neural networks. The system takes as input a binary file and classifies it as malicious or benign. There is minimal pre-processing of t
Publikováno v:
CSF
This work explores the problem of designing a channel that leaks the least amount of information while respecting a set of operational constraints. This paper focuses on deterministic channels and deterministic solutions. This setting is relevant bec
Publikováno v:
The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy ISBN: 9783030311742
The Art of Modelling Computational Systems
The Art of Modelling Computational Systems
This work explores connections between core-concavity and gain functions, two alternative approaches that emerged in the quantitative information flow community to provide a general framework to study information leakage. In particular (1) we revisit
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9eba75ce38c432ed667076cec405e68f
https://doi.org/10.1007/978-3-030-31175-9_15
https://doi.org/10.1007/978-3-030-31175-9_15
Publikováno v:
ECML PKDD 2018 Workshops ISBN: 9783030134525
Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML
Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML
Pseudo-random number generators (PRNG) are a fundamental element of many security algorithms. We introduce a novel approach to their implementation, by proposing the use of generative adversarial networks (GAN) to train a neural network to behave as
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::512fc277eda3b1989498f5d41365cc0f
https://doi.org/10.1007/978-3-030-13453-2_15
https://doi.org/10.1007/978-3-030-13453-2_15