Experts in data analytics and power engineering present techniques addressing the needs of modern power systems, covering theory and applications related to power system reliability, efficiency, and security. With topics spanning large-scale and distributed optimization, statistical learning, big data analytics, graph theory, and game theory,...
-
January 1, 2021 (v1)BookUploaded on: December 4, 2022
-
June 29, 2021 (v1)Publication
No description
Uploaded on: December 4, 2022 -
February 27, 2025 (v1)Publication
Closed-form expressions are presented for the variation of the expectation of a given function due to changes in the probability measure used for the expectation. They unveil interesting connections with Gibbs probability measures, the mutual information, and the lautum information.
Uploaded on: April 4, 2025 -
January 29, 2024 (v1)Publication
This paper studies an instance of zero-sum games in which one player (the leader) commits to its opponent (the follower) to choose its actions by sampling a given probability measure (strategy). The actions of the leader are observed by the follower as the output of an arbitrary channel. In response to that, the follower chooses its action...
Uploaded on: February 7, 2024 -
November 18, 2024 (v1)Publication
In this paper, the method of gaps, a technique for deriving closed-form expressions in terms of information measures for the generalization error of machine learning algorithms is introduced. The method relies on two central observations: (a) The generalization error is an average of the variation of the expected empirical risk with respect to...
Uploaded on: January 13, 2025 -
January 29, 2024 (v1)Report
This report studies an instance of zero-sum games in which one player(the leader) commits to its opponent(the follower) to choose its actions by sampling a given probability measure(strategy). The actions of the leader are observed by the follower as the output of an arbitrary channel. In response to that, the follower chooses its action based...
Uploaded on: February 4, 2024 -
January 28, 2021 (v1)Book section
International audience
Uploaded on: December 4, 2022 -
October 17, 2021 (v1)Conference paper
In this paper, the fundamental limits on the rates at which information and energy can be simultaneously transmitted over an additive white Gaussian noise channel are studied under the following assumptions: (a) the channel is memoryless; (b) the number of channel input symbols (constellation size) and block length are finite; and (c) the...
Uploaded on: December 4, 2022 -
July 1, 2020 (v1)Journal article
International audience
Uploaded on: December 4, 2022 -
February 27, 2025 (v1)Publication
Rigorous statements and formal proofs are presented for both foundational and advanced folklore theorems on the Radon-Nikodym derivative. The cases of product and marginal measures are carefully considered; and the hypothesis under which the statements hold are rigorously enumerated.
Uploaded on: April 4, 2025 -
September 20, 2022 (v1)Report
In this report, sparse stealth attack constructions that minimize the mutual information between the state variables and the observations are proposed. The attack construction is formulated as the design of a multivariate Gaussian distribution aiming to minimize the mutual information while limiting the Kullback-Leibler divergence between the...
Uploaded on: February 22, 2023 -
July 7, 2024 (v1)Conference paper
The solution to empirical risk minimization with f-divergence regularization (ERM-fDR) is presented under mild conditions on f. Under such conditions, the optimal measure is shown to be unique. Examples of the solution for particular choices of the function f are presented. Previously known solutions to common regularization choices are...
Uploaded on: April 5, 2025 -
May 9, 2024 (v1)Journal article
A novel metric that describes the vulnerability of the measurements in power systems to data integrity attacks is proposed. The new metric, coined vulnerability index (VuIx), leverages information theoretic measures to assess the attack effect in terms of the fundamental limits of the disruption and detection tradeoff. The result of computing...
Uploaded on: April 5, 2025 -
January 2022 (v1)Report
In this report, the fundamental limits on the rates at which information and energy can be simultaneously transmitted over an additive white Gaussian noise channel are studied under the following assumptions: (a) the channel is memoryless; (b) the number of channel input symbols (constellation size) and block length are finite; and (c) the...
Uploaded on: December 3, 2022 -
June 24, 2023 (v1)Conference paper
The dependence on training data of the Gibbs algorithm (GA) is analytically characterized. By adopting the expected empirical risk as the performance metric, the sensitivity of the GA is obtained in closed-form. In this case, sensitivity is the performance difference with respect to an arbitrary alternative algorithm. This description enables...
Uploaded on: May 14, 2023 -
January 7, 2022 (v1)Publication
Sparse stealth attack constructions that minimize the mutual information between the state variables and the observations are proposed. The attack construction is formulated as the design of a multivariate Gaussian distribution that aims to minimize the mutual information while limiting the Kullback-Leibler divergence between the distribution...
Uploaded on: December 3, 2022 -
April 2020 (v1)Report
This report introduces an upper bound on the absolute difference between:$(a)$~the cumulative distribution function (CDF) of the sum of a finite number of independent and identically distributed random variables; and $(b)$~a saddlepoint approximation of such CDF.%This upper bound, which is particularly precise in the regime of large...
Uploaded on: December 4, 2022 -
May 27, 2020 (v1)Report
In this report, a formula for estimating the prevalence ratio of a disease in a population that is tested with imperfect tests is given. The formula is in terms of the fraction of positive test results and test parameters, i.e., probability of true positives (sensitivity) and the probability of true negatives (specificity). The motivation of...
Uploaded on: December 4, 2022 -
August 21, 2023 (v1)Report
In this report, the worst-case probability measure over the data is introduced as a tool for characterizing the generalization capabilities of machine learning algorithms. More specifically, the worst-case probability measure is a solution to the maximization of the expected loss under a relative entropy constraint with respect to a reference...
Uploaded on: October 11, 2023 -
June 24, 2023 (v1)Conference paper
The effect of the relative entropy asymmetry is analyzed in the empirical risk minimization with relative entropy regularization (ERM-RER) problem. A novel regularization is introduced, coined Type-II regularization, that allows for solutions to the ERM-RER problem with a support that extends outside the support of the reference measure. The...
Uploaded on: May 17, 2023 -
June 7, 2020 (v1)Conference paper
This paper introduces an upper-bound on the absolute difference between: (a) the cumulative distribution function (c.d.f.) of the sum of a finite number of independent and identically distributed (i.i.d) random variables; and (b) a saddlepoint approximation of such c.d.f. This upperbound is general and particularly precise in the regime of...
Uploaded on: December 4, 2022 -
October 25, 2023 (v1)Report
This report presents the solution to the empirical risk minimization with $f$-divergence regularization, under mild conditions on $f$. Under such conditions, the optimal measure is shown to be unique and to always exist. The solution is presented as a closed-form expression of the Radon-Nikodym derivative of the optimal probability measure...
Uploaded on: November 25, 2023