2019
DOI: 10.3390/e21050478
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Hypothesis Testing with Privacy Constraints

Abstract: We revisit the distributed hypothesis testing (or hypothesis testing with communication constraints) problem from the viewpoint of privacy. Instead of observing the raw data directly, the transmitter observes a sanitized or randomized version of it. We impose an upper bound on the mutual information between the raw and randomized data. Under this scenario, the receiver, which is also provided with side information, is required to make a decision on whether the null or alternative hypothesis is in effect. We fi… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
20
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 24 publications
(21 citation statements)
references
References 38 publications
1
20
0
Order By: Relevance
“…Thus, in the future, one may refine the proof in the current paper by deriving secondorder converse or exact second-order asymptotics. Furthermore, one may also consider deriving strong converse theorems or simplifying existing strong converse proofs for hypothesis testing problems with both communication and privacy constraints such as that in [21] by using the techniques in the current paper. It is also interesting to explore whether the current techniques can be applied to obtain strong converse theorems for hypothesis testing with zero-rate compression problems [3].…”
Section: Analyses Of Communication Constraints and Single-letterizmentioning
confidence: 99%
“…Thus, in the future, one may refine the proof in the current paper by deriving secondorder converse or exact second-order asymptotics. Furthermore, one may also consider deriving strong converse theorems or simplifying existing strong converse proofs for hypothesis testing problems with both communication and privacy constraints such as that in [21] by using the techniques in the current paper. It is also interesting to explore whether the current techniques can be applied to obtain strong converse theorems for hypothesis testing with zero-rate compression problems [3].…”
Section: Analyses Of Communication Constraints and Single-letterizmentioning
confidence: 99%
“…Thus, in the future, one may refine the proof in the current paper by deriving second-order converse or exact second-order asymptotics. Furthermore, one may also consider deriving strong converse theorems or simplifying existing strong converse proofs for hypothesis testing problems with both communication and privacy constraints such as that in [ 23 ] by using the techniques in the current paper. It is also interesting to explore whether current techniques can be applied to obtain strong converse theorems for hypothesis testing with zero-rate compression problems [ 3 ].…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…The detector performs HT on the probability distribution of the observer’s data, and the optimal privacy mechanism that maximizes the error exponent while satisfying the privacy constraint is analyzed. Recently, a distributed version of this problem has been studied in [ 27 ], where the observer applies a privacy mechanism to its observed data prior to further coding for compression, and the goal at the detector is to perform a HT on the joint distribution of its own observations with those of the observer. In contrast with [ 25 , 26 , 27 ], we study DHT with a privacy constraint , but without considering a separate privacy mechanism at the observer.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, a distributed version of this problem has been studied in [ 27 ], where the observer applies a privacy mechanism to its observed data prior to further coding for compression, and the goal at the detector is to perform a HT on the joint distribution of its own observations with those of the observer. In contrast with [ 25 , 26 , 27 ], we study DHT with a privacy constraint , but without considering a separate privacy mechanism at the observer. In Section 2 , we will further discuss the differences between the system model considered here and that of [ 27 ].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation