Search Results for author: Ecenaz Erdemir

Found 8 papers, 1 papers with code

Secure Deep-JSCC Against Multiple Eavesdroppers

no code implementations5 Aug 2023 Seyyed AmirHossein Ameli Kalkhoran, Mehdi Letafati, Ecenaz Erdemir, Babak Hossein Khalaj, Hamid Behroozi, Deniz Gündüz

Adversarial accuracy of eavesdroppers are also studied over Rayleigh fading, Nakagami-m, and AWGN channels to verify the generalization of the proposed scheme.

Ensemble Learning

Generative Joint Source-Channel Coding for Semantic Image Transmission

no code implementations24 Nov 2022 Ecenaz Erdemir, Tze-Yang Tung, Pier Luigi Dragotti, Deniz Gunduz

In GenerativeJSCC, we carry out end-to-end training of an encoder and a StyleGAN-based decoder, and show that GenerativeJSCC significantly outperforms DeepJSCC both in terms of distortion and perceptual quality.

Denoising Generative Adversarial Network

Active Privacy-Utility Trade-off Against Inference in Time-Series Data Sharing

no code implementations11 Feb 2022 Ecenaz Erdemir, Pier Luigi Dragotti, Deniz Gunduz

For privacy measure, we consider both the probability of correctly detecting the true value of the secret and the mutual information (MI) between the secret and the released data.

Action Detection Activity Detection +2

Adversarial Robustness with Non-uniform Perturbations

1 code implementation NeurIPS 2021 Ecenaz Erdemir, Jeffrey Bickford, Luca Melis, Sergul Aydore

Robustness of machine learning models is critical for security related applications, where real-world adversaries are uniquely focused on evading neural network based detectors.

Adversarial Robustness Malware Classification +1

Active Privacy-utility Trade-off Against a Hypothesis Testing Adversary

no code implementations16 Feb 2021 Ecenaz Erdemir, Pier Luigi Dragotti, Deniz Gunduz

We consider a user releasing her data containing some personal information in return of a service.

Reinforcement Learning (RL)

Privacy-Aware Location Sharing with Deep Reinforcement Learning

no code implementations17 Jul 2019 Ecenaz Erdemir, Pier Luigi Dragotti, Deniz Gunduz

Existing approaches are mainly focused on privacy of sharing a single location or myopic location trace privacy; neither of them taking into account the temporal correlations between the past and current locations.

Information Theory Cryptography and Security Information Theory

Cannot find the paper you are looking for? You can Submit a new open access paper.