Skip to main content

Showing 1–21 of 21 results for author: Günlü, O

Searching in archive eess. Search in all archives.
.
  1. arXiv:2408.17050  [pdf, ps, other

    cs.IT cs.CR eess.SP eess.SY

    Secure Integrated Sensing and Communication Under Correlated Rayleigh Fading

    Authors: Martin Mittelbach, Rafael F. Schaefer, Matthieu Bloch, Aylin Yener, Onur Günlü

    Abstract: We consider a secure integrated sensing and communication (ISAC) scenario, in which a signal is transmitted through a state-dependent wiretap channel with one legitimate receiver with which the transmitter communicates and one honest-but-curious target that the transmitter wants to sense. The secure ISAC channel is modeled as two state-dependent fast-fading channels with correlated Rayleigh fading… ▽ More

    Submitted 30 August, 2024; originally announced August 2024.

  2. arXiv:2303.11350  [pdf, other

    cs.IT cs.CR eess.SP eess.SY

    Secure Integrated Sensing and Communication

    Authors: Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer, Aylin Yener

    Abstract: This work considers the problem of mitigating information leakage between communication and sensing in systems jointly performing both operations. Specifically, a discrete memoryless state-dependent broadcast channel model is studied in which (i) the presence of feedback enables a transmitter to convey information, while simultaneously performing channel state estimation; (ii) one of the receivers… ▽ More

    Submitted 20 March, 2023; originally announced March 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2202.10790

  3. arXiv:2209.01701  [pdf, other

    cs.IT cs.LG eess.SP

    Concatenated Classic and Neural (CCN) Codes: ConcatenatedAE

    Authors: Onur Günlü, Rick Fritschek, Rafael F. Schaefer

    Abstract: Small neural networks (NNs) used for error correction were shown to improve on classic channel codes and to address channel model changes. We extend the code dimension of any such structure by using the same NN under one-hot encoding multiple times, then serially-concatenated with an outer classic code. We design NNs with the same network parameters, where each Reed-Solomon codeword symbol is an i… ▽ More

    Submitted 31 March, 2023; v1 submitted 4 September, 2022; originally announced September 2022.

    Comments: 6 pages, IEEE WCNC 2023

  4. arXiv:2205.05068  [pdf, ps, other

    cs.IT cs.CR cs.IR cs.LG eess.SP

    Secure and Private Source Coding with Private Key and Decoder Side Information

    Authors: Onur Günlü, Rafael F. Schaefer, Holger Boche, H. Vincent Poor

    Abstract: The problem of secure source coding with multiple terminals is extended by considering a remote source whose noisy measurements are the correlated random variables used for secure source reconstruction. The main additions to the problem include 1) all terminals noncausally observe a noisy measurement of the remote source; 2) a private key is available to all legitimate terminals; 3) the public com… ▽ More

    Submitted 9 November, 2022; v1 submitted 10 May, 2022; originally announced May 2022.

    Comments: Shorter version to appear in the 2022 IEEE Information Theory Workshop

  5. arXiv:2202.10790  [pdf, ps, other

    cs.IT cs.CR cs.IR eess.SP

    Secure Joint Communication and Sensing

    Authors: Onur Günlü, Matthieu Bloch, Rafael F. Schaefer, Aylin Yener

    Abstract: This work considers the problem of mitigating information leakage between communication and sensing in systems jointly performing both operations. Specifically, a discrete memoryless state-dependent broadcast channel model is studied in which (i) the presence of feedback enables a transmitter to convey information, while simultaneously performing channel state estimation; (ii) one of the receivers… ▽ More

    Submitted 15 August, 2022; v1 submitted 22 February, 2022; originally announced February 2022.

    Comments: Shorter version to appear in the 2022 IEEE International Symposium on Information Theory

  6. arXiv:2107.05675  [pdf, ps, other

    eess.SP cs.CR cs.IT cs.LG

    Quality of Service Guarantees for Physical Unclonable Functions

    Authors: Onur Günlü, Rafael F. Schaefer, H. Vincent Poor

    Abstract: We consider a secret key agreement problem in which noisy physical unclonable function (PUF) outputs facilitate reliable, secure, and private key agreement with the help of public, noiseless, and authenticated storage. PUF outputs are highly correlated, so transform coding methods have been combined with scalar quantizers to extract uncorrelated bit sequences with reliability guarantees. For PUF c… ▽ More

    Submitted 11 October, 2021; v1 submitted 12 July, 2021; originally announced July 2021.

    Comments: To appear in the IEEE International Workshop on Information Forensics and Security 2021

  7. arXiv:2106.09485  [pdf, other

    cs.IT cs.CR cs.DC cs.LG eess.SP

    Secure Multi-Function Computation with Private Remote Sources

    Authors: Onur Günlü, Matthieu Bloch, Rafael F. Schaefer

    Abstract: We consider a distributed function computation problem in which parties observing noisy versions of a remote source facilitate the computation of a function of their observations at a fusion center through public communication. The distributed function computation is subject to constraints, including not only reliability and storage but also privacy and secrecy. Specifically, 1) the remote source… ▽ More

    Submitted 29 March, 2022; v1 submitted 17 June, 2021; originally announced June 2021.

    Comments: Shorter version appeared in the IEEE International Symposium on Information Theory 2021

  8. arXiv:2105.09840  [pdf, other

    cs.IT cs.CR eess.SP

    Semantic Security for Indoor THz-Wireless Communication

    Authors: Rebekka Schulz, Onur Günlü, Robert Elschner, Rafael F. Schaefer, Carsten Schmidt-Langhorst, Colja Schubert, Robert F. H. Fischer

    Abstract: Physical-layer security (PLS) for industrial indoor terahertz (THz) wireless communication applications is considered. We use a similar model as being employed for additive white Gaussian noise (AWGN) wireless communication channels. A cell communication and a directed communication scenario are analyzed to illustrate the achievable semantic security guarantees for a wiretap channel with finite-bl… ▽ More

    Submitted 19 July, 2021; v1 submitted 20 May, 2021; originally announced May 2021.

    Comments: To appear in International Symposium on Wireless Communication Systems 2021

  9. arXiv:2105.01350  [pdf, ps, other

    cs.IT cs.CR eess.SP math.PR

    Effects of Quantization on the Multiple-Round Secret-Key Capacity

    Authors: Onur Günlü, Ueli Maurer, João Ribeiro

    Abstract: We consider the strong secret key (SK) agreement problem for the satellite communication setting, where a satellite chooses a common binary phase shift keying modulated input for three statistically independent additive white Gaussian noise measurement channels whose outputs are observed by two legitimate transceivers (Alice and Bob) and an eavesdropper (Eve), respectively. Legitimate transceivers… ▽ More

    Submitted 29 August, 2021; v1 submitted 4 May, 2021; originally announced May 2021.

  10. arXiv:2102.04737  [pdf, other

    cs.LG cs.CR cs.DC cs.IT eess.SP

    Federated Learning with Local Differential Privacy: Trade-offs between Privacy, Utility, and Communication

    Authors: Muah Kim, Onur Günlü, Rafael F. Schaefer

    Abstract: Federated learning (FL) allows to train a massive amount of data privately due to its decentralized structure. Stochastic gradient descent (SGD) is commonly used for FL due to its good empirical performance, but sensitive user information can still be inferred from weight updates shared during FL iterations. We consider Gaussian mechanisms to preserve local differential privacy (LDP) of user data… ▽ More

    Submitted 9 February, 2021; originally announced February 2021.

    Comments: To appear in IEEE International Conference on Acoustics, Speech, and Signal Processing 2021

  11. arXiv:2012.08924  [pdf, ps, other

    eess.SP cs.CR cs.CV cs.IT cs.MM

    Secret Key Agreement with Physical Unclonable Functions: An Optimality Summary

    Authors: Onur Günlü, Rafael F. Schaefer

    Abstract: We address security and privacy problems for digital devices and biometrics from an information-theoretic optimality perspective, where a secret key is generated for authentication, identification, message encryption/decryption, or secure computations. A physical unclonable function (PUF) is a promising solution for local security in digital devices and this review gives the most relevant summary… ▽ More

    Submitted 16 December, 2020; originally announced December 2020.

    Comments: To appear in MDPI Entropy Journal. arXiv admin note: text overlap with arXiv:2002.11687

  12. arXiv:2005.08210  [pdf, other

    cs.IT cs.CR cs.MM eess.SP

    Multi-Entity and Multi-Enrollment Key Agreement with Correlated Noise

    Authors: Onur Günlü

    Abstract: A basic model for key agreement with a remote (or hidden) source is extended to a multi-user model with joint secrecy and privacy constraints over all entities that do not trust each other after key agreement. Multiple entities using different measurements of the same source through broadcast channels (BCs) to agree on mutually-independent local secret keys are considered. Our model is the proper… ▽ More

    Submitted 17 October, 2020; v1 submitted 17 May, 2020; originally announced May 2020.

    Comments: To appear in the IEEE Transactions on Information Forensics and Security

  13. arXiv:2004.12091  [pdf, ps, other

    cs.IT cs.CR cs.MM eess.SP

    Randomized Nested Polar Subcode Constructions for Privacy, Secrecy, and Storage

    Authors: Onur Günlü, Peter Trifonov, Muah Kim, Rafael F. Schaefer, Vladimir Sidorenko

    Abstract: We consider polar subcodes (PSCs), which are polar codes (PCs) with dynamically-frozen symbols, to increase the minimum distance as compared to corresponding PCs. A randomized nested PSC construction with a low-rate PSC and a high-rate PC, is proposed for list and sequential successive cancellation decoders. This code construction aims to perform lossy compression with side information. Nested PSC… ▽ More

    Submitted 29 July, 2020; v1 submitted 25 April, 2020; originally announced April 2020.

    Comments: Shorter version to appear in 2020 IEEE International Symposium on Information Theory and Applications. Decoding complexity results are added

  14. arXiv:2004.01872  [pdf, ps, other

    eess.SP cs.CR cs.IT cs.MM

    Low-complexity and Reliable Transforms for Physical Unclonable Functions

    Authors: Onur Günlü, Rafael F. Schaefer

    Abstract: Noisy measurements of a physical unclonable function (PUF) are used to store secret keys with reliability, security, privacy, and complexity constraints. A new set of low-complexity and orthogonal transforms with no multiplication is proposed to obtain bit-error probability results significantly better than all methods previously proposed for key binding with PUFs. The uniqueness and security perf… ▽ More

    Submitted 4 April, 2020; originally announced April 2020.

    Comments: To appear in IEEE International Conference on Acoustics, Speech, and Signal Processing 2020

  15. arXiv:2002.11687  [pdf, ps, other

    cs.CR cs.IT eess.IV eess.SP math.PR

    Secure and Reliable Key Agreement with Physical Unclonable Functions

    Authors: Onur Günlü, Tasnad Kernetzky, Onurcan İşcan, Vladimir Sidorenko, Gerhard Kramer, Rafael F. Schaefer

    Abstract: Different transforms used in binding a secret key to correlated physical-identifier outputs are compared. Decorrelation efficiency is the metric used to determine transforms that give highly-uncorrelated outputs. Scalar quantizers are applied to transform outputs to extract uniformly distributed bit sequences to which secret keys are bound. A set of transforms that perform well in terms of the dec… ▽ More

    Submitted 27 February, 2020; v1 submitted 26 February, 2020; originally announced February 2020.

    Comments: An extra term in the last page due to the mismatch between the Arxiv compiler and MDPI template is eliminated. No other changes

    Journal ref: MDPI Entropy Journal 20 (2018) 340:1-340:19

  16. arXiv:2002.08972  [pdf, other

    cs.CR cs.HC cs.LG eess.SP stat.ML

    Differential Privacy for Eye Tracking with Temporal Correlations

    Authors: Efe Bozkir, Onur Günlü, Wolfgang Fuhl, Rafael F. Schaefer, Enkelejda Kasneci

    Abstract: New generation head-mounted displays, such as VR and AR glasses, are coming into the market with already integrated eye tracking and are expected to enable novel ways of human-computer interaction in numerous applications. However, since eye movement properties contain biometric information, privacy concerns have to be handled properly. Privacy-preservation techniques such as differential privacy… ▽ More

    Submitted 20 December, 2021; v1 submitted 20 February, 2020; originally announced February 2020.

    Comments: In PLOS ONE

  17. arXiv:2001.00847  [pdf, ps, other

    cs.IT cs.CR cs.MM eess.SP math.PR

    Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication

    Authors: Onur Günlü, Rafael F. Schaefer, H. Vincent Poor

    Abstract: The problem of secret-key based authentication under privacy and storage constraints on the source sequence is considered. The identifier measurement channels during authentication are assumed to be controllable via a cost-constrained action sequence. Single-letter inner and outer bounds for the key-leakage-storage-cost regions are derived for a generalization of a classic two-terminal key agreeme… ▽ More

    Submitted 23 July, 2020; v1 submitted 3 January, 2020; originally announced January 2020.

    Comments: Shorter version to appear in the IEEE International Symposium on Information Theory 2020

  18. arXiv:1907.01081  [pdf, ps, other

    cs.IT cs.CR cs.MM eess.SP math.PR

    Private Authentication with Physical Identifiers Through Broadcast Channel Measurements

    Authors: Onur Günlü, Rafael F. Schaefer, Gerhard Kramer

    Abstract: A basic model for key agreement with biometric or physical identifiers is extended to include measurements of a hidden source through a general broadcast channel (BC). An inner bound for strong secrecy, maximum key rate, and minimum privacy-leakage and database-storage rates is proposed. The inner bound is shown to be tight for physically-degraded and less-noisy BCs.

    Submitted 4 March, 2020; v1 submitted 1 July, 2019; originally announced July 2019.

    Comments: Longer version of the published paper

    Journal ref: IEEE Information Theory Workshop (2019) 1-5

  19. arXiv:1804.01430  [pdf, other

    cs.IT cs.CR cs.MM eess.SP math.PR

    Controllable Identifier Measurements for Private Authentication with Secret Keys

    Authors: Onur Günlü, Kittipong Kittichokechai, Rafael F. Schaefer, Giuseppe Caire

    Abstract: The problem of secret-key based authentication under a privacy constraint on the source sequence is considered. The identifier measurements during authentication are assumed to be controllable via a cost-constrained "action" sequence. Single-letter characterizations of the optimal trade-off among the secret-key rate, storage rate, privacy-leakage rate, and action cost are given for the four proble… ▽ More

    Submitted 4 April, 2018; originally announced April 2018.

    Comments: 15 pages

    Journal ref: IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 1945-1959 (Aug. 2018)

  20. arXiv:1709.00275  [pdf, ps, other

    cs.IT cs.CR cs.MM eess.SP math.PR

    Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems

    Authors: Onur Günlü, Onurcan İşcan, Vladimir Sidorenko, Gerhard Kramer

    Abstract: The two-terminal key agreement problem with biometric or physical identifiers is considered. Two linear code constructions based on Wyner-Ziv coding are developed. The first construction uses random linear codes and achieves all points of the key-leakage-storage regions of the generated-secret and chosen-secret models. The second construction uses nested polar codes for vector quantization during… ▽ More

    Submitted 3 April, 2019; v1 submitted 1 September, 2017; originally announced September 2017.

    Comments: To appear in IEEE Transactions on Information Forensics and Security

  21. arXiv:1601.06756  [pdf, other

    cs.IT cs.CR cs.MM eess.SP math.PR

    Privacy, Secrecy, and Storage with Multiple Noisy Measurements of Identifiers

    Authors: Onur Günlü, Gerhard Kramer

    Abstract: The key-leakage-storage region is derived for a generalization of a classic two-terminal key agreement model. The additions to the model are that the encoder observes a hidden, or noisy, version of the identifier, and that the encoder and decoder can perform multiple measurements. To illustrate the behavior of the region, the theory is applied to binary identifiers and noise modeled via binary sym… ▽ More

    Submitted 30 April, 2018; v1 submitted 25 January, 2016; originally announced January 2016.

    Comments: To appear in IEEE Transactions on Information Forensics and Security