{"id":"https://openalex.org/W2597257110","doi":"https://doi.org/10.1109/isit.2014.6874934","title":"The CEO problem with secrecy constraints","display_name":"The CEO problem with secrecy constraints","publication_year":2014,"publication_date":"2014-06-01","ids":{"openalex":"https://openalex.org/W2597257110","doi":"https://doi.org/10.1109/isit.2014.6874934","mag":"2597257110"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2014.6874934","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2014.6874934","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037462979","display_name":"Farshad Naghibi","orcid":"https://orcid.org/0000-0002-9853-2608"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Farshad Naghibi","raw_affiliation_strings":["School of Electrical Engineering and ACCESS Linnaeus Center, KTH Royal Institute of Technology, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and ACCESS Linnaeus Center, KTH Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019523200","display_name":"Somayeh Salimi","orcid":null},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Somayeh Salimi","raw_affiliation_strings":["School of Electrical Engineering and ACCESS Linnaeus Center, KTH Royal Institute of Technology, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and ACCESS Linnaeus Center, KTH Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041348422","display_name":"Mikael Skoglund","orcid":"https://orcid.org/0000-0002-7926-5081"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Mikael Skoglund","raw_affiliation_strings":["School of Electrical Engineering and ACCESS Linnaeus Center, KTH Royal Institute of Technology, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and ACCESS Linnaeus Center, KTH Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5037462979"],"corresponding_institution_ids":["https://openalex.org/I86987016"],"apc_list":null,"apc_paid":null,"fwci":1.256,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.8356426,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"63","issue":null,"first_page":"756","last_page":"760"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9768000245094299,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/equivocation","display_name":"Equivocation","score":0.8655052185058594},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.8116310834884644},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6529467105865479},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.5857656598091125},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.5416041612625122},{"id":"https://openalex.org/keywords/rate-distortion","display_name":"Rate distortion","score":0.5021519660949707},{"id":"https://openalex.org/keywords/distributed-source-coding","display_name":"Distributed source coding","score":0.4555529057979584},{"id":"https://openalex.org/keywords/rate\u2013distortion-theory","display_name":"Rate\u2013distortion theory","score":0.4310588240623474},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.42277902364730835},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.4031060039997101},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.40196219086647034},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.307158887386322},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2961180806159973},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2734680771827698},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.24967068433761597},{"id":"https://openalex.org/keywords/channel-code","display_name":"Channel code","score":0.22498482465744019},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.21200093626976013},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.10672089457511902},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.10112583637237549},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.08166807889938354}],"concepts":[{"id":"https://openalex.org/C17859611","wikidata":"https://www.wikidata.org/wiki/Q10797615","display_name":"Equivocation","level":2,"score":0.8655052185058594},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.8116310834884644},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6529467105865479},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.5857656598091125},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.5416041612625122},{"id":"https://openalex.org/C2982755384","wikidata":"https://www.wikidata.org/wiki/Q843483","display_name":"Rate distortion","level":3,"score":0.5021519660949707},{"id":"https://openalex.org/C200801453","wikidata":"https://www.wikidata.org/wiki/Q5283181","display_name":"Distributed source coding","level":4,"score":0.4555529057979584},{"id":"https://openalex.org/C64185310","wikidata":"https://www.wikidata.org/wiki/Q843483","display_name":"Rate\u2013distortion theory","level":3,"score":0.4310588240623474},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.42277902364730835},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.4031060039997101},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.40196219086647034},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.307158887386322},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2961180806159973},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2734680771827698},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.24967068433761597},{"id":"https://openalex.org/C166366890","wikidata":"https://www.wikidata.org/wiki/Q602136","display_name":"Channel code","level":3,"score":0.22498482465744019},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.21200093626976013},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.10672089457511902},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.10112583637237549},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.08166807889938354},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2014.6874934","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2014.6874934","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W144241252","https://openalex.org/W171093906","https://openalex.org/W1967750896","https://openalex.org/W2021380203","https://openalex.org/W2057124070","https://openalex.org/W2068143054","https://openalex.org/W2075851072","https://openalex.org/W2079364662","https://openalex.org/W2096704225","https://openalex.org/W2109547112","https://openalex.org/W2115942674","https://openalex.org/W2119985618","https://openalex.org/W2135541923","https://openalex.org/W2141356835","https://openalex.org/W2149094627","https://openalex.org/W2150412388","https://openalex.org/W2155253681","https://openalex.org/W2199707703","https://openalex.org/W2269413506","https://openalex.org/W2478708596","https://openalex.org/W2554387170","https://openalex.org/W2597257110","https://openalex.org/W3102949288","https://openalex.org/W3216977419","https://openalex.org/W4293702014","https://openalex.org/W6605850000","https://openalex.org/W6606872340","https://openalex.org/W6674550039"],"related_works":["https://openalex.org/W2949679674","https://openalex.org/W2120182993","https://openalex.org/W1554604567","https://openalex.org/W2159754152","https://openalex.org/W2153621579","https://openalex.org/W2141356835","https://openalex.org/W2121443236","https://openalex.org/W1983499333","https://openalex.org/W2153237443","https://openalex.org/W2026641099"],"abstract_inverted_index":{"A":[0],"lossy":[1],"source":[2,14,38,85],"coding":[3],"problem":[4,93,100],"with":[5,101],"secrecy":[6,104],"constraints":[7],"is":[8],"considered":[9],"where":[10],"a":[11,19,88],"remote":[12,84],"information":[13],"should":[15,81],"be":[16,95],"transmitted":[17],"to":[18,46,54,67,70,87],"single":[20],"destination":[21,48,69,80],"via":[22,49],"multiple":[23],"agents":[24,32,66],"in":[25],"the":[26,37,47,55,62,65,68,77,83,98,113,120,125,130],"presence":[27],"of":[28,36,61,103],"an":[29,57],"eavesdropper.":[30],"The":[31,79],"observe":[33],"noisy":[34],"versions":[35],"and":[39,42,109],"independently":[40],"encode":[41],"transmit":[43],"their":[44],"observations":[45],"noiseless":[50],"rate-limited":[51],"links.":[52],"Unbeknownst":[53],"agents,":[56],"eavesdropper":[58,131],"intercepts":[59],"one":[60],"links":[63],"from":[64],"learn":[71],"as":[72,74,97],"much":[73],"possible":[75],"about":[76],"source.":[78],"estimate":[82],"subject":[86],"mean":[89],"distortion":[90],"threshold.":[91],"This":[92],"can":[94],"viewed":[96],"CEO":[99],"addition":[102],"constraints.":[105],"We":[106],"establish":[107],"inner":[108],"outer":[110],"bounds":[111],"on":[112],"rate-distortion-equivocation":[114,122],"region.":[115],"In":[116],"addition,":[117],"we":[118],"provide":[119],"optimal":[121],"region":[123],"for":[124],"quadratic":[126],"Gaussian":[127],"case":[128],"when":[129],"has":[132],"no":[133],"side":[134],"information.":[135]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
