Zum Hauptinhalt springen

Showing 1–17 of 17 results for author: Salehkalaibar, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.18008  [pdf, other

    cs.IT

    Rate-Distortion-Perception Tradeoff for Gaussian Vector Sources

    Authors: Jingjing Qian, Sadaf Salehkalaibar, Jun Chen, Ashish Khisti, Wei Yu, Wuxian Shi, Yiqun Ge, Wen Tong

    Abstract: This paper studies the rate-distortion-perception (RDP) tradeoff for a Gaussian vector source coding problem where the goal is to compress the multi-component source subject to distortion and perception constraints. The purpose of imposing a perception constraint is to ensure visually pleasing reconstructions. This paper studies this RDP setting with either the Kullback-Leibler (KL) divergence or… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

  2. arXiv:2401.12207  [pdf, other

    cs.IT cs.LG

    Rate-Distortion-Perception Tradeoff Based on the Conditional-Distribution Perception Measure

    Authors: Sadaf Salehkalaibar, Jun Chen, Ashish Khisti, Wei Yu

    Abstract: We study the rate-distortion-perception (RDP) tradeoff for a memoryless source model in the asymptotic limit of large block-lengths. Our perception measure is based on a divergence between the distributions of the source and reconstruction sequences conditioned on the encoder output, which was first proposed in [1], [2]. We consider the case when there is no shared randomness between the encoder a… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

  3. arXiv:2305.19301  [pdf, other

    eess.IV cs.CV cs.IT cs.LG

    On the Choice of Perception Loss Function for Learned Video Compression

    Authors: Sadaf Salehkalaibar, Buu Phan, Jun Chen, Wei Yu, Ashish Khisti

    Abstract: We study causal, low-latency, sequential video compression when the output is subjected to both a mean squared-error (MSE) distortion loss as well as a perception loss to target realism. Motivated by prior approaches, we consider two different perception loss functions (PLFs). The first, PLF-JD, considers the joint distribution (JD) of all the video frames up to the current one, while the second m… ▽ More

    Submitted 22 August, 2023; v1 submitted 30 May, 2023; originally announced May 2023.

  4. arXiv:2301.09269  [pdf, other

    cs.LG cs.DC cs.IT

    M22: A Communication-Efficient Algorithm for Federated Learning Inspired by Rate-Distortion

    Authors: Yangyi Liu, Stefano Rini, Sadaf Salehkalaibar, Jun Chen

    Abstract: In federated learning (FL), the communication constraint between the remote learners and the Parameter Server (PS) is a crucial bottleneck. For this reason, model updates must be compressed so as to minimize the loss in accuracy resulting from the communication constraint. This paper proposes ``\emph{${\bf M}$-magnitude weighted $L_{\bf 2}$ distortion + $\bf 2$ degrees of freedom''} (M22) algorith… ▽ More

    Submitted 22 January, 2023; originally announced January 2023.

    Comments: arXiv admin note: text overlap with arXiv:2202.02812

  5. arXiv:2202.02812  [pdf, ps, other

    cs.LG cs.IT

    Lossy Gradient Compression: How Much Accuracy Can One Bit Buy?

    Authors: Sadaf Salehkalaibar, Stefano Rini

    Abstract: In federated learning (FL), a global model is trained at a Parameter Server (PS) by aggregating model updates obtained from multiple remote learners. Generally, the communication between the remote users and the PS is rate-limited, while the transmission from the PS to the remote users are unconstrained. The FL setting gives rise to the distributed learning scenario in which the updates from the r… ▽ More

    Submitted 2 June, 2022; v1 submitted 6 February, 2022; originally announced February 2022.

  6. arXiv:2201.07784  [pdf, other

    cs.IT

    On Distributed Lossy Coding of Symmetrically Correlated Gaussian Sources

    Authors: Siyao Zhou, Sadaf Salehkalaibar, Jingjing Qian, Jun Chen, Wuxian Shi, Yiqun Ge, Wen Tong

    Abstract: A distributed lossy compression network with $L$ encoders and a decoder is considered. Each encoder observes a source and sends a compressed version to the decoder. The decoder produces a joint reconstruction of target signals with the mean squared error distortion below a given threshold. It is assumed that the observed sources can be expressed as the sum of target signals and corruptive noises w… ▽ More

    Submitted 3 June, 2022; v1 submitted 19 January, 2022; originally announced January 2022.

  7. arXiv:2109.08614  [pdf, other

    cs.IT

    Distributed Sequential Hypothesis Testing With Zero-Rate Compression

    Authors: Sadaf Salehkalaibar, Vincent Y. F. Tan

    Abstract: In this paper, we consider sequential testing over a single-sensor, a single-decision center setup. At each time instant $t$, the sensor gets $k$ samples $(k>0)$ and describes the observed sequence until time $t$ to the decision center over a zero-rate noiseless link. The decision center sends a single bit of feedback to the sensor to request for more samples for compression/testing or to stop the… ▽ More

    Submitted 17 September, 2021; originally announced September 2021.

  8. arXiv:2012.01706  [pdf, other

    cs.IT

    State Masking Over a Two-State Compound Channel

    Authors: Sadaf Salehkalaibar, Mohammad Hossein Yassaee, Vincent Y. F. Tan, Mehrasa Ahmadipour

    Abstract: We consider fundamental limits for communicating over a compound channel when the state of the channel needs to be masked. Our model is closely related to an area of study known as covert communication that is a setting in which the transmitter wishes to communicate to legitimate receiver(s) while ensuring that the communication is not detected by an adversary. The main contribution in our two-sta… ▽ More

    Submitted 3 December, 2020; originally announced December 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:1906.06675

  9. arXiv:2011.00889  [pdf, ps, other

    cs.IT

    On Sum Secure Degrees of Freedom for K-User MISO Broadcast Channel With Alternating CSIT

    Authors: Leyla Sadighi, Sadaf Salehkalaibar, Stefano Rini

    Abstract: In this paper, the sum secure degrees of freedom (SDoF) of the $K$-user Multiple Input/Single Output (MISO) Broadcast Channel with Confidential Messages (BCCM) and alternating Channel State Information at the Transmitter (CSIT) is investigated. In the MISO BCCM, a $K$-antenna transmitter (TX) communicates toward $K$ single-antenna receivers (RXs), so that message for RX $k$ is kept secret from RX… ▽ More

    Submitted 22 November, 2020; v1 submitted 2 November, 2020; originally announced November 2020.

    Comments: Journal

  10. arXiv:2005.08610  [pdf, other

    cs.IT

    Distributed Hypothesis Testing with Variable-Length Coding

    Authors: Sadaf Salehkalaibar, Michele Wigger

    Abstract: The problem of distributed testing against independence with variable-length coding is considered when the \emph{average} and not the \emph{maximum} communication load is constrained as in previous works. The paper characterizes the optimum type-II error exponent of a single sensor single decision center system given a maximum type-I error probability when communication is either over a noise-free… ▽ More

    Submitted 18 May, 2020; originally announced May 2020.

  11. arXiv:1910.08261  [pdf, other

    cs.IT

    Distributed Hypothesis Testing with Variable-Length Coding

    Authors: Sadaf Salehkalaibar, Michele Wigger

    Abstract: This paper characterizes the optimal type-II error exponent for a distributed hypothesis testing-against-independence problem when the \emph{expected} rate of the sensor-detector link is constrained. Unlike for the well-known Ahlswede-Csiszar result that holds under a \emph{maximum} rate constraint and where a strong converse holds, here the optimal exponent depends on the allowed type-I error exp… ▽ More

    Submitted 18 October, 2019; originally announced October 2019.

  12. arXiv:1906.06675  [pdf, other

    cs.IT

    Covert Communication Over a Compound Channel

    Authors: Sadaf Salehkalaibar, Mohammad Hossein Yassaee, Vincent Y. F. Tan

    Abstract: In this paper, we consider fundamental communication limits over a compound channel. Covert communication in the information-theoretic context has been primarily concerned with fundamental limits when the transmitter wishes to communicate to legitimate receiver(s) while ensuring that the communication is not detected by an adversary. This paper, however, considers an alternative, and no less impor… ▽ More

    Submitted 16 June, 2019; originally announced June 2019.

  13. arXiv:1806.05533  [pdf, other

    cs.IT

    Distributed Hypothesis Testing based on Unequal-Error Protection Codes

    Authors: Sadaf Salehkalaibar, Michele Wigger

    Abstract: Coding and testing schemes for binary hypothesis testing over noisy networks are proposed and their corresponding type-II error exponents are derived. When communication is over a discrete memoryless channel (DMC), our scheme combines Shimokawa-Han-Amari's hypothesis testing scheme with Borade's unequal error protection (UEP) for channel coding. A separate source channel coding architecture is emp… ▽ More

    Submitted 14 June, 2018; originally announced June 2018.

  14. Distributed Hypothesis Testing with Privacy Constraints

    Authors: Atefeh Gilani, Selma Belhadj Amor, Sadaf Salehkalaibar, Vincent Y. F. Tan

    Abstract: We revisit the distributed hypothesis testing (or hypothesis testing with communication constraints) problem from the viewpoint of privacy. Instead of observing the raw data directly, the transmitter observes a sanitized or randomized version of it. We impose an upper bound on the mutual information between the raw and randomized data. Under this scenario, the receiver, which is also provided with… ▽ More

    Submitted 6 June, 2018; originally announced June 2018.

  15. arXiv:1708.05198  [pdf, other

    cs.IT

    Hypothesis Testing Over the Two-hop Relay Network

    Authors: Sadaf Salehkalaibar, Michele Wigger, Ligong Wang

    Abstract: Coding and testing schemes and the corresponding achievable type-II error exponents are presented for binary hypothesis testing over two-hop relay networks. The schemes are based on cascade source coding techniques and {unanimous decision-forwarding}, the latter meaning that a terminal decides on the null hypothesis only if all previous terminals have decided on the null hypothesis. If the observa… ▽ More

    Submitted 23 January, 2020; v1 submitted 17 August, 2017; originally announced August 2017.

  16. arXiv:1708.03941  [pdf, other

    cs.IT

    On Hypothesis Testing Against Independence with Multiple Decision Centers

    Authors: Sadaf Salehkalaibar, Michele Wigger, Roy Timo

    Abstract: A distributed binary hypothesis testing problem is studied with one observer and two decision centers. Achievable type-II error exponents are derived for testing against conditional independence when the observer communicates with the two decision centers over one common and two individual noise-free bit pipes and when it communicates with them over a noisy broadcast channel (BC). The results are… ▽ More

    Submitted 23 January, 2020; v1 submitted 13 August, 2017; originally announced August 2017.

  17. arXiv:1301.5142  [pdf, other

    cs.CR

    Key agreement over a 3-receiver broadcast channel

    Authors: Mohsen Bahrami, Ali Bereyhi, Sadaf Salehkalaibar, Mohammad Reza Aref

    Abstract: In this paper, we consider the problem of secret key agreement in state-dependent 3-receiver broadcast channels. In the proposed model, there are two legitimate receivers, an eavesdropper and a transmitter where the channel state information is non-causally available at the transmitter. We consider two setups. In the first setup, the transmitter tries to agree on a common key with the legitimate r… ▽ More

    Submitted 16 May, 2013; v1 submitted 22 January, 2013; originally announced January 2013.

    Comments: Accepted in IWCIT 2013