Skip to main content

Showing 1–24 of 24 results for author: Esnaola, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.18544  [pdf, other

    cs.LG cs.AI cs.CY

    Critical Challenges and Guidelines in Evaluating Synthetic Tabular Data: A Systematic Review

    Authors: Nazia Nafis, Inaki Esnaola, Alvaro Martinez-Perez, Maria-Cruz Villa-Uriol, Venet Osmani

    Abstract: Generating synthetic tabular data can be challenging, however evaluation of their quality is just as challenging, if not more. This systematic review sheds light on the critical importance of rigorous evaluation of synthetic health data to ensure reliability, relevance, and their appropriate use. Based on screening of 1766 papers and a detailed review of 101 papers we identified key challenges, in… ▽ More

    Submitted 9 April, 2025; originally announced April 2025.

  2. arXiv:2502.14544  [pdf, ps, other

    stat.ML cs.LG

    Generalization Error of $f$-Divergence Stabilized Algorithms via Duality

    Authors: Francisco Daunas, Iñaki Esnaola, Samir M. Perlaza, Gholamali Aminian

    Abstract: The solution to empirical risk minimization with $f$-divergence regularization (ERM-$f$DR) is extended to constrained optimization problems, establishing conditions for equivalence between the solution and constraints. A dual formulation of ERM-$f$DR is introduced, providing a computationally efficient method to derive the normalization function of the ERM-$f$DR solution. This dual approach levera… ▽ More

    Submitted 20 February, 2025; originally announced February 2025.

    Comments: This is new work for ISIT2025. arXiv admin note: text overlap with arXiv:2402.00501

  3. arXiv:2501.18374  [pdf, ps, other

    cs.IT math.HO math.ST stat.ML

    Proofs for Folklore Theorems on the Radon-Nikodym Derivative

    Authors: Yaiza Bermudez, Gaetan Bisson, Iñaki Esnaola, Samir M. Perlaza

    Abstract: In this paper, rigorous statements and formal proofs are presented for both foundational and advanced folklore theorems on the Radon-Nikodym derivative. The cases of conditional and marginal probability measures are carefully considered, which leads to an identity involving the sum of mutual and lautum information suggesting a new interpretation for such a sum.

    Submitted 24 April, 2025; v1 submitted 30 January, 2025; originally announced January 2025.

    Comments: Submitted to the IEEE Information Theory Workshop 2025, 6 pages

  4. arXiv:2410.02833  [pdf, other

    stat.ML cs.IT cs.LG

    Asymmetry of the Relative Entropy in the Regularization of Empirical Risk Minimization

    Authors: Francisco Daunas, Iñaki Esnaola, Samir M. Perlaza, H. Vincent Poor

    Abstract: The effect of relative entropy asymmetry is analyzed in the context of empirical risk minimization (ERM) with relative entropy regularization (ERM-RER). Two regularizations are considered: $(a)$ the relative entropy of the measure to be optimized with respect to a reference measure (Type-I ERM-RER); and $(b)$ the relative entropy of the reference measure with respect to the measure to be optimized… ▽ More

    Submitted 30 April, 2025; v1 submitted 2 October, 2024; originally announced October 2024.

  5. arXiv:2409.03541  [pdf, ps, other

    cs.IT

    Submodularity of Mutual Information for Multivariate Gaussian Sources with Additive Noise

    Authors: George Crowley, Inaki Esnaola

    Abstract: Sensor placement approaches in networks often involve using information-theoretic measures such as entropy and mutual information. We prove that mutual information abides by submodularity and is non-decreasing when considering the mutual information between the states of the network and a subset of $k$ nodes subjected to additive white Gaussian noise. We prove this under the assumption that the st… ▽ More

    Submitted 5 September, 2024; originally announced September 2024.

  6. arXiv:2402.00501  [pdf, ps, other

    stat.ML cs.IT cs.LG

    Equivalence of the Empirical Risk Minimization to Regularization on the Family of f-Divergences

    Authors: Francisco Daunas, Iñaki Esnaola, Samir M. Perlaza, H. Vincent Poor

    Abstract: The solution to empirical risk minimization with $f$-divergence regularization (ERM-$f$DR) is presented under mild conditions on $f$. Under such conditions, the optimal measure is shown to be unique. Examples of the solution for particular choices of the function $f$ are presented. Previously known solutions to common regularization choices are obtained by leveraging the flexibility of the family… ▽ More

    Submitted 23 October, 2024; v1 submitted 1 February, 2024; originally announced February 2024.

    Comments: Submitted to the IEEE Symposium in Information Theory 2024. arXiv admin note: text overlap with arXiv:2306.07123

  7. arXiv:2312.12236  [pdf, ps, other

    cs.LG cs.IT math.ST

    Generalization Analysis of Machine Learning Algorithms via the Worst-Case Data-Generating Probability Measure

    Authors: Xinying Zou, Samir M. Perlaza, Iñaki Esnaola, Eitan Altman

    Abstract: In this paper, the worst-case probability measure over the data is introduced as a tool for characterizing the generalization capabilities of machine learning algorithms. More specifically, the worst-case probability measure is a Gibbs probability measure and the unique solution to the maximization of the expected loss under a relative entropy constraint with respect to a reference probability mea… ▽ More

    Submitted 19 December, 2023; originally announced December 2023.

    Comments: To appear in the Proceedings of the AAAI Conference on Artificial Intelligence (7 + 2 pages)

    Report number: INRIA Technical Report RR-9515

  8. arXiv:2306.12380  [pdf, ps, other

    cs.LG cs.IT math.PR math.ST

    On the Validation of Gibbs Algorithms: Training Datasets, Test Datasets and their Aggregation

    Authors: Samir M. Perlaza, Iñaki Esnaola, Gaetan Bisson, H. Vincent Poor

    Abstract: The dependence on training data of the Gibbs algorithm (GA) is analytically characterized. By adopting the expected empirical risk as the performance metric, the sensitivity of the GA is obtained in closed form. In this case, sensitivity is the performance difference with respect to an arbitrary alternative algorithm. This description enables the development of explicit expressions involving the t… ▽ More

    Submitted 21 June, 2023; originally announced June 2023.

    Comments: In Proc. IEEE International Symposium on Information Theory (ISIT), Taipei, Taiwan, Jun., 2023. arXiv admin note: text overlap with arXiv:2211.06617

  9. arXiv:2306.07123  [pdf, ps, other

    cs.IT stat.ML

    Analysis of the Relative Entropy Asymmetry in the Regularization of Empirical Risk Minimization

    Authors: Francisco Daunas, Iñaki Esnaola, Samir M. Perlaza, H. Vincent Poor

    Abstract: The effect of the relative entropy asymmetry is analyzed in the empirical risk minimization with relative entropy regularization (ERM-RER) problem. A novel regularization is introduced, coined Type-II regularization, that allows for solutions to the ERM-RER problem with a support that extends outside the support of the reference measure. The solution to the new ERM-RER Type-II problem is analytica… ▽ More

    Submitted 12 June, 2023; originally announced June 2023.

    Comments: To appear in the proceedings of the International Symposium on Information Theory 2023

  10. arXiv:2211.06617  [pdf, other

    math.ST cs.IT cs.LG

    Empirical Risk Minimization with Relative Entropy Regularization

    Authors: Samir M. Perlaza, Gaetan Bisson, Iñaki Esnaola, Alain Jean-Marie, Stefano Rini

    Abstract: The empirical risk minimization (ERM) problem with relative entropy regularization (ERM-RER) is investigated under the assumption that the reference measure is a $σ$-finite measure, and not necessarily a probability measure. Under this assumption, which leads to a generalization of the ERM-RER problem allowing a larger degree of flexibility for incorporating prior knowledge, numerous relevant prop… ▽ More

    Submitted 8 April, 2024; v1 submitted 12 November, 2022; originally announced November 2022.

    Comments: Appears in IEEE Transactions on Information Theory: Submitted June 2023. Revised in October 2023. Accepted January 2024. CameraReady February 2024. Also available as: Research Report, INRIA, No. RR-9454, Centre Inria d'Université Côte d'Azur, Sophia Antipolis, France, Feb., 2022. Last version: Version 7

    Report number: RR-9454

  11. arXiv:2202.04385  [pdf, ps, other

    cs.LG cs.IT math.ST

    Empirical Risk Minimization with Relative Entropy Regularization: Optimality and Sensitivity Analysis

    Authors: Samir M. Perlaza, Gaetan Bisson, Iñaki Esnaola, Alain Jean-Marie, Stefano Rini

    Abstract: The optimality and sensitivity of the empirical risk minimization problem with relative entropy regularization (ERM-RER) are investigated for the case in which the reference is a sigma-finite measure instead of a probability measure. This generalization allows for a larger degree of flexibility in the incorporation of prior knowledge over the set of models. In this setting, the interplay of the re… ▽ More

    Submitted 12 November, 2022; v1 submitted 9 February, 2022; originally announced February 2022.

    Comments: In Proc. IEEE International Symposium on Information Theory (ISIT), Aalto, Finland, Jul., 2022

  12. arXiv:2112.14698  [pdf, other

    cs.IT eess.SP eess.SY

    Asymptotic Learning Requirements for Stealth Attacks on Linearized State Estimation

    Authors: Ke Sun, Iñaki Esnaola, Antonia M. Tulino, H. Vincent Poor

    Abstract: Information-theoretic stealth attacks are data injection attacks that minimize the amount of information acquired by the operator about the state variables, while simultaneously limiting the Kullback-Leibler divergence between the distribution of the measurements under attack and the distribution under normal operation with the aim of controling the probability of detection. For Gaussian distribut… ▽ More

    Submitted 11 January, 2023; v1 submitted 22 December, 2021; originally announced December 2021.

    Comments: accepted by IEEE Transactions on Smart Grid

  13. arXiv:1905.00111  [pdf, other

    cs.IT

    Universal Mutual Information Privacy Guarantees for Smart Meters

    Authors: Miguel Arrieta, Iñaki Esnaola, Michelle Effros

    Abstract: Smart meters enable improvements in electricity distribution system efficiency at some cost in customer privacy. Users with home batteries can mitigate this privacy loss by applying charging policies that mask their underlying energy use. A battery charging policy is proposed and shown to provide universal privacy guarantees subject to a constraint on energy cost. The guarantee bounds our strategy… ▽ More

    Submitted 30 April, 2019; originally announced May 2019.

  14. arXiv:1902.08222  [pdf, other

    cs.IT eess.SP eess.SY

    Learning requirements for stealth attacks

    Authors: Ke Sun, Iñaki Esnaola, Antonia M. Tulino, H. Vincent Poor

    Abstract: The learning data requirements are analyzed for the construction of stealth attacks in state estimation. In particular, the training data set is used to compute a sample covariance matrix that results in a random matrix with a Wishart distribution. The ergodic attack performance is defined as the average attack performance obtained by taking the expectation with respect to the distribution of the… ▽ More

    Submitted 21 February, 2019; originally announced February 2019.

    Comments: International Conference on Acoustics, Speech, and Signal Processing 2019

    Journal ref: in Proc. IEEE Int. Conf. on Acoust., Speech, and Signal Process., Brighton, UK, May 2019, pp. 8102-8106

  15. arXiv:1808.04184  [pdf, other

    cs.IT eess.SY

    Stealth Attacks on the Smart Grid

    Authors: Ke Sun, Iñaki Esnaola, Samir M. Perlaza, H. Vincent Poor

    Abstract: Random attacks that jointly minimize the amount of information acquired by the operator about the state of the grid and the probability of attack detection are presented. The attacks minimize the information acquired by the operator by minimizing the mutual information between the observations and the state variables describing the grid. Simultaneously, the attacker aims to minimize the probabilit… ▽ More

    Submitted 7 April, 2020; v1 submitted 13 August, 2018; originally announced August 2018.

    Comments: IEEE Trans. Smart Grid

    Journal ref: IEEE Trans. Smart Grid, vol. 11 , no. 2, pp. 1276-1285, Mar. 2020

  16. arXiv:1708.07810  [pdf, other

    cs.IT eess.SY

    Information-Theoretic Attacks in the Smart Grid

    Authors: Ke Sun, Inaki Esnaola, Samir M. Perlaza, H. Vincent Poor

    Abstract: Gaussian random attacks that jointly minimize the amount of information obtained by the operator from the grid and the probability of attack detection are presented. The construction of the attack is posed as an optimization problem with a utility function that captures two effects: firstly, minimizing the mutual information between the measurements and the state variables; secondly, minimizing th… ▽ More

    Submitted 25 August, 2017; originally announced August 2017.

    Comments: 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm)

    Journal ref: in Proc. IEEE Int. Conf. on Smart Grid Commun., Dresden, Germany, Oct. 2017, pp. 455-460

  17. arXiv:1708.04429  [pdf, other

    cs.IT eess.SY

    Smart Meter Privacy via the Trapdoor Channel

    Authors: Miguel Arrieta, Inaki Esnaola

    Abstract: A battery charging policy that provides privacy guarantees for smart meter systems with finite capacity battery is proposed. For this policy an upper bound on the information leakage rate is provided. The upper bound applies for general random processes modelling the energy consumption of the user. It is shown that the average energy consumption of the user determines the information leakage rate… ▽ More

    Submitted 15 August, 2017; originally announced August 2017.

    Comments: 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm)

  18. arXiv:1612.07761  [pdf

    cs.IT cs.NI

    Compressed Sensing Algorithms for OFDM Channel Estimation

    Authors: Jonathan Ling, Dmitry Chizhik, A. Tulino, Inaki Esnaola

    Abstract: Radio channels are typically sparse in the delay domain, and ideal for compressed sensing. A new compressed sensing algorithm called eX-OMP is developed that yields performance similar to that of the optimal MMSE estimator. The new algorithm relies on a small amount additional data. Both eX-OMP and the MMSE estimator adaptively balance channel tracking and noise reduction. They perform better than… ▽ More

    Submitted 22 December, 2016; originally announced December 2016.

    Comments: Patent no: US8929390 Methods And Apparatuses For Channel Estimation In Wireless Networks

  19. arXiv:1611.05322  [pdf, other

    cs.IT

    Approximate Capacity Region of the Two-User Gaussian Interference Channel with Noisy Channel-Output Feedback

    Authors: Victor Quintero, Samir M. Perlaza, Iñaki Esnaola, Jean-Marie Gorce

    Abstract: In this paper, the capacity region of the linear deterministic interference channel with noisy channel-output feedback (LD-IC-NF) is fully characterized. The proof of achievability is based on random coding arguments and rate splitting; block-Markov superposition coding; and backward decoding. The proof of converse reuses some of the existing outer bounds and includes new ones obtained using genie… ▽ More

    Submitted 19 May, 2018; v1 submitted 15 November, 2016; originally announced November 2016.

    Comments: This work will appear in the IEEE Transactions on Information Theory. Accepted on Mar. 4, 2018. Part of this work was presented at the IEEE International Workshop on Information Theory (ITW), Cambridge, UK, Sept., 2016 (arXiv:1603.07554), and IEEE-ITW, Jeju Island, Korea, Oct., 2015 (arXiv:1502.04649). Parts of this work appear in INRIA Reports 0456 (arXiv:1608.08920) and 8861 (arXiv:1608.08907)

  20. arXiv:1608.08907  [pdf, other

    cs.IT

    Approximate Capacity of the Two-User Gaussian Interference Channel with Noisy Channel-Output Feedback

    Authors: Victor Quintero, Samir M. Perlaza, Iñaki Esnaola, Jean-Marie Gorce

    Abstract: In this research report, an achievability region and a converse region for the two-user Gaussian interference channel with noisy channel-output feedback (G-IC-NOF) are presented. The achievability region is obtained using a random coding argument and three well-known techniques: rate splitting, superposition coding and backward decoding. The converse region is obtained using some of the existing p… ▽ More

    Submitted 15 November, 2016; v1 submitted 31 August, 2016; originally announced August 2016.

    Comments: INRIA Research report 8861. 38 pages. 5 figures. arXiv admin note: text overlap with arXiv:1608.08920

    Report number: INRIA RR 8861

  21. Approximate Capacity of the Gaussian Interference Channel with Noisy Channel-Output Feedback

    Authors: Victor Quintero, Samir M. Perlaza, Iñaki Esnaola, Jean-Marie Gorce

    Abstract: In this paper, an achievability region and a converse region for the two-user Gaussian interference channel with noisy channel-output feedback (G-IC-NOF) are presented. The achievability region is obtained using a random coding argument and three well-known techniques: rate splitting, superposition coding and backward decoding. The converse region is obtained using some of the existing perfect-out… ▽ More

    Submitted 14 November, 2016; v1 submitted 24 March, 2016; originally announced March 2016.

    Comments: 5 Pages, 3 figures. Paper in IEEE Information Theory Workshop 2016 (ITW-2016)

  22. arXiv:1503.06468  [pdf, ps, other

    cs.LG cs.CR eess.SY

    Machine Learning Methods for Attack Detection in the Smart Grid

    Authors: Mete Ozay, Inaki Esnaola, Fatos T. Yarman Vural, Sanjeev R. Kulkarni, H. Vincent Poor

    Abstract: Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the syste… ▽ More

    Submitted 22 March, 2015; originally announced March 2015.

    Comments: 14 pages, 11 Figures

    Journal ref: A version of the manuscript was published in IEEE Transactions on Neural Networks and Learning Systems, 19 March 2015

  23. Sparse Attack Construction and State Estimation in the Smart Grid: Centralized and Distributed Models

    Authors: Mete Ozay, Inaki Esnaola, Fatos T. Yarman Vural, Sanjeev R. Kulkarni, H. Vincent Poor

    Abstract: New methods that exploit sparse structures arising in smart grid networks are proposed for the state estimation problem when data injection attacks are present. First, construction strategies for unobservable sparse data injection attacks on power grids are proposed for an attacker with access to all network information and nodes. Specifically, novel formulations for the optimization problem that… ▽ More

    Submitted 14 February, 2015; originally announced February 2015.

    Comments: 11 pages, 5 figures

    Journal ref: IEEE JSAC, vol. 31, no. 7, pp. 1306-1318, Jul. 2013

  24. Power Allocation Strategies in Energy Harvesting Wireless Cooperative Networks

    Authors: Zhiguo Ding, Samir M. Perlaza, Inaki Esnaola, H. Vincent Poor

    Abstract: In this paper, a wireless cooperative network is considered, in which multiple source-destination pairs communicate with each other via an energy harvesting relay. The focus of this paper is on the relay's strategies to distribute the harvested energy among the multiple users and their impact on the system performance. Specifically, a non-cooperative strategy is to use the energy harvested from th… ▽ More

    Submitted 15 July, 2013; v1 submitted 5 July, 2013; originally announced July 2013.

    Comments: submitted to IEEE TWireless