


Остановите войну!
for scientists:


default search action
Oliver Kosut
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j19]Caspar von Lengerke
, Alexander Hefele
, Juan A. Cabrera
, Oliver Kosut
, Martin Reisslein
, Frank H. P. Fitzek
:
Identification Codes: A Topical Review With Design Guidelines for Practical Systems. IEEE Access 11: 14961-14982 (2023) - [j18]Eric Graves
, Allison Beemer
, Jörg Kliewer
, Oliver Kosut
, Paul L. Yu
:
Keyless Authentication for AWGN Channels. IEEE Trans. Inf. Theory 69(1): 496-519 (2023) - 2022
- [j17]Anguluri Rajasekhar
, Gautam Dasarathy
, Oliver Kosut
, Lalitha Sankar
:
Grid Topology Identification With Hidden Nodes via Structured Norm Minimization. IEEE Control. Syst. Lett. 6: 1244-1249 (2022) - [j16]Oliver Kosut
:
A Second-Order Converse Bound for the Multiple-Access Channel via Wringing Dependence. IEEE Trans. Inf. Theory 68(6): 3552-3584 (2022) - [c54]Wael Alghamdi, Shahab Asoodeh, Flávio P. Calmon
, Oliver Kosut, Lalitha Sankar, Fei Wei:
Cactus Mechanisms: Optimal Differential Privacy Mechanisms in the Large-Composition Regime. ISIT 2022: 1838-1843 - [c53]Oliver Kosut, Michelle Effros, Michael Langberg:
On the Benefit of Cooperation in Relay Networks. ISIT 2022: 1945-1950 - [c52]Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:
A Variational Formula for Infinity-Rényi Divergence with Applications to Information Leakage. ISIT 2022: 2493-2498 - [c51]Atefeh Gilani, Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:
An Alphabet of Leakage Measures. ITW 2022: 458-463 - [i50]Oliver Kosut, Michelle Effros, Michael Langberg:
On the Benefit of Cooperation in Relay Networks. CoRR abs/2202.01878 (2022) - [i49]Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:
A Variational Formula for Infinity-Rényi Divergence with Applications to Information Leakage. CoRR abs/2202.06040 (2022) - [i48]Nima T. Bazargani, Gautam Dasarathy, Lalitha Sankar, Oliver Kosut:
A Machine Learning Framework for Event Identification via Modal Analysis of PMU Data. CoRR abs/2202.06836 (2022) - [i47]Wael Alghamdi, Shahab Asoodeh, Flávio P. Calmon, Oliver Kosut, Lalitha Sankar, Fei Wei:
Cactus Mechanisms: Optimal Differential Privacy Mechanisms in the Large-Composition Regime. CoRR abs/2207.00420 (2022) - [i46]Anguluri Rajasekhar, Lalitha Sankar, Oliver Kosut:
Parameter Estimation in Ill-conditioned Low-inertia Power Systems. CoRR abs/2208.04471 (2022) - [i45]Wael Alghamdi, Shahab Asoodeh, Flávio P. Calmon, Juan Felipe Gómez, Oliver Kosut, Lalitha Sankar, Fei Wei:
The Saddle-Point Accountant for Differential Privacy. CoRR abs/2208.09595 (2022) - [i44]Gowtham R. Kurri, Lalitha Sankar, Oliver Kosut:
An Operational Approach to Information Leakage via Generalized Gain Functions. CoRR abs/2209.13862 (2022) - [i43]Abrar Zahin, Rajasekhar Anguluri, Oliver Kosut, Lalitha Sankar, Gautam Dasarathy:
Robust Model Selection of Non Tree-Structured Gaussian Graphical Models. CoRR abs/2211.05690 (2022) - [i42]Atefeh Gilani, Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:
An Alphabet of Leakage Measures. CoRR abs/2211.15453 (2022) - 2021
- [j15]Shahab Asoodeh
, Jiachun Liao
, Flávio P. Calmon
, Oliver Kosut
, Lalitha Sankar
:
Three Variants of Differential Privacy: Lossless Conversion and Applications. IEEE J. Sel. Areas Inf. Theory 2(1): 208-222 (2021) - [c50]Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:
Evaluating Multiple Guesses by an Adversary via a Tunable Loss Function. ISIT 2021: 2002-2007 - [c49]Oliver Kosut, Michelle Effros, Michael Langberg:
Every Bit Counts: Second-Order Analysis of Cooperation in the Multiple-Access Channel. ISIT 2021: 2214-2219 - [c48]Fei Wei, Oliver Kosut:
A Wringing-Based Proof of a Second-Order Converse for the Multiple-Access Channel under Maximal Error Probability. ISIT 2021: 2220-2225 - [i41]Oliver Kosut, Michelle Effros, Michael Langberg:
Every Bit Counts: Second-Order Analysis of Cooperation in the Multiple-Access Channel. CoRR abs/2102.01247 (2021) - [i40]Zhigang Chu, Andrea Pinceti, Ramin Kaviani, Roozbeh Khodadadeh, Xingpeng Li, Jiazi Zhang, Karthik Saikumar, Mostafa Sahraei-Ardakani, Christopher Mosier, Robin Podmore, Kory W. Hedman, Oliver Kosut, Lalitha Sankar:
A Verifiable Framework for Cyber-Physical Attacks and Countermeasures in a Resilient Electric Power Grid. CoRR abs/2104.13908 (2021) - [i39]Fatemeh Hosseinigoki, Oliver Kosut:
Capacity of Gaussian Arbitrarily-Varying Fading Channels. CoRR abs/2106.07189 (2021) - [i38]Andrea Pinceti, Lalitha Sankar, Oliver Kosut:
Synthetic Time-Series Load Data via Conditional Generative Adversarial Networks. CoRR abs/2107.03545 (2021) - [i37]Andrea Pinceti, Lalitha Sankar, Oliver Kosut:
Generation of Synthetic Multi-Resolution Time Series Load Data. CoRR abs/2107.03547 (2021) - [i36]Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:
Evaluating Multiple Guesses by an Adversary via a Tunable Loss Function. CoRR abs/2108.08774 (2021) - [i35]Eric Graves, Allison Beemer, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Keyless Authentication for AWGN Channels. CoRR abs/2111.06386 (2021) - 2020
- [c47]Allison Beemer, Eric Graves, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Authentication and Partial Message Correction over Adversarial Multiple-Access Channels. CNS 2020: 1-6 - [c46]Jiachun Liao, Lalitha Sankar, Oliver Kosut, Flávio P. Calmon:
Maximal α-Leakage and its Properties. CNS 2020: 1-6 - [c45]Shahab Asoodeh, Jiachun Liao, Flávio P. Calmon
, Oliver Kosut, Lalitha Sankar:
A Better Bound Gives a Hundred Rounds: Enhanced Privacy Guarantees via f-Divergences. ISIT 2020: 920-925 - [c44]Allison Beemer, Eric Graves, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Authentication with Mildly Myopic Adversaries. ISIT 2020: 984-989 - [c43]Fatemeh Hosseinigoki, Oliver Kosut:
Capacity Region of the Gaussian Arbitrarily-Varying Broadcast Channel. ISIT 2020: 1007-1011 - [c42]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
Vulnerability Assessment of Large-scale Power Systems to False Data Injection Attacks. SmartGridComm 2020: 1-6 - [i34]Allison Beemer, Eric Graves, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Authentication Against a Myopic Adversary. CoRR abs/2001.03593 (2020) - [i33]Shahab Asoodeh, Jiachun Liao, Flávio P. Calmon, Oliver Kosut, Lalitha Sankar:
A Better Bound Gives a Hundred Rounds: Enhanced Privacy Guarantees via $f$-Divergences. CoRR abs/2001.05990 (2020) - [i32]Zhigang Chu, Oliver Kosut, Lalitha Sankar:
Detecting Load Redistribution Attacks via Support Vector Models. CoRR abs/2003.06543 (2020) - [i31]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
N-1 Reliability Makes It Difficult for False Data Injection Attacks to Cause Physical Consequences. CoRR abs/2003.07699 (2020) - [i30]Oliver Kosut:
A Second-Order Converse Bound for the Multiple-Access Channel via Wringing Dependence. CoRR abs/2007.15664 (2020) - [i29]Shahab Asoodeh, Jiachun Liao, Flávio P. Calmon, Oliver Kosut, Lalitha Sankar:
Three Variants of Differential Privacy: Lossless Conversion and Applications. CoRR abs/2008.06529 (2020)
2010 – 2019
- 2019
- [j14]Fatemeh Hosseinigoki
, Oliver Kosut
:
List-Decoding Capacity of the Gaussian Arbitrarily-Varying Channel. Entropy 21(6): 575 (2019) - [j13]Nematollah Iri
, Oliver Kosut
:
Fine Asymptotics for Universal One-to-One Compression of Parametric Sources. IEEE Trans. Inf. Theory 65(4): 2442-2458 (2019) - [j12]Oliver Kosut
, Jörg Kliewer
:
Strong Converses are Just Edge Removal Properties. IEEE Trans. Inf. Theory 65(6): 3315-3339 (2019) - [j11]Nematollah Iri, Oliver Kosut:
Corrections to "Fine Asymptotics for Universal One-to-One Compression of Parametric Sources". IEEE Trans. Inf. Theory 65(7): 4640 (2019) - [j10]Jiachun Liao
, Oliver Kosut
, Lalitha Sankar
, Flávio du Pin Calmon
:
Tunable Measures for Information Leakage and Applications to Privacy-Utility Tradeoffs. IEEE Trans. Inf. Theory 65(12): 8043-8066 (2019) - [c41]Fatemeh Hosseinigoki, Oliver Kosut:
Capacity of Gaussian Arbitrarily-Varying Fading Channels. CISS 2019: 1-6 - [c40]Allison Beemer, Oliver Kosut, Jörg Kliewer, Eric Graves, Paul L. Yu:
Authentication Against a Myopic Adversary. CNS 2019: 1-5 - [c39]Allison Beemer, Oliver Kosut, Jörg Kliewer, Eric Graves, Paul L. Yu:
Structured Coding for Authentication in the Presence of a Malicious Adversary. ISIT 2019: 617-621 - [c38]Jiachun Liao, Lalitha Sankar, Oliver Kosut, Flávio P. Calmon:
Robustness of Maximal α-Leakage to Side Information. ISIT 2019: 642-646 - [c37]Zhigang Chu, Andrea Pinceti, Reetam Sen Biswas
, Oliver Kosut, Anamitra Pal, Lalitha Sankar:
Can Predictive Filters Detect Gradually Ramping False Data Injection Attacks Against PMUs? SmartGridComm 2019: 1-6 - [i28]Jiachun Liao, Lalitha Sankar, Oliver Kosut, Flávio P. Calmon:
Robustness of Maximal α-Leakage to Side Information. CoRR abs/1901.07105 (2019) - [i27]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
Vulnerability Assessment of N-1 Reliable Power Systems to False Data Injection Attacks. CoRR abs/1903.07781 (2019) - [i26]Zhigang Chu, Andrea Pinceti, Reetam Sen Biswas, Oliver Kosut, Anamitra Pal, Lalitha Sankar:
Can Predictive Filters Detect Gradually Ramping False Data Injection Attacks Against PMUs? CoRR abs/1905.02271 (2019) - [i25]Andrea Pinceti, Lalitha Sankar, Oliver Kosut:
Detection and Localization of Load Redistribution Attacks on Large Scale Systems. CoRR abs/1912.09453 (2019) - 2018
- [j9]Xiaoqing Fan
, Oliver Kosut
, Aaron B. Wagner
:
Variable Packet-Error Coding. IEEE Trans. Inf. Theory 64(3): 1530-1547 (2018) - [c36]Fatemeh Hosseinigoki, Oliver Kosut:
Capacity of the Gaussian Arbitrarily-Varying Channel with List Decoding. ISIT 2018: 471-475 - [c35]Jiachun Liao, Oliver Kosut, Lalitha Sankar, Flávio P. Calmon:
A Tunable Measure for Information Leakage. ISIT 2018: 701-705 - [c34]Oliver Kosut, Jörg Kliewer:
Finite Blocklength and Dispersion Bounds for the Arbitrarily- Varying Channel. ISIT 2018: 2007-2011 - [c33]Oliver Kosut, Jörg Kliewer:
Authentication Capacity of Adversarial Channels. ITW 2018: 1-5 - [c32]Jiachun Liao, Oliver Kosut, Lalitha Sankar, Flávio P. Calmon:
Privacy Under Hard Distortion Constraints. ITW 2018: 1-5 - [c31]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
Unobservable False Data Injection Attacks against PMUs: Feasible Conditions and Multiplicative Attacks. SmartGridComm 2018: 1-6 - [i24]Oliver Kosut, Jörg Kliewer:
Finite Blocklength and Dispersion Bounds for the Arbitrarily-Varying Channel. CoRR abs/1801.03594 (2018) - [i23]Jiachun Liao, Oliver Kosut, Lalitha Sankar, Flávio P. Calmon:
Privacy Under Hard Distortion Constraints. CoRR abs/1806.00063 (2018) - [i22]Jiachun Liao, Oliver Kosut, Lalitha Sankar, Flávio P. Calmon:
A Tunable Measure for Information Leakage. CoRR abs/1806.03332 (2018) - [i21]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
Unobservable False Data Injection Attacks against PMUs: Feasible Conditions and Multiplicative Attacks. CoRR abs/1806.05057 (2018) - [i20]Jiachun Liao, Oliver Kosut, Lalitha Sankar, Flávio du Pin Calmon:
Tunable Measures for Information Leakage and Applications to Privacy-Utility Tradeoffs. CoRR abs/1809.09231 (2018) - 2017
- [j8]Oliver Kosut
, Lalitha Sankar:
Asymptotics and Non-Asymptotics for Universal Fixed-to-Variable Source Coding. IEEE Trans. Inf. Theory 63(6): 3757-3772 (2017) - [j7]Oliver Kosut
, Jörg Kliewer:
Equivalence for Networks With Adversarial State. IEEE Trans. Inf. Theory 63(7): 4137-4154 (2017) - [c30]Nematollah Iri, Oliver Kosut:
Fundamental limits of universal variable-to-fixed length coding of parametric sources. Allerton 2017: 31-37 - [c29]Nematollah Iri, Oliver Kosut:
Universal coding with point type classes. CISS 2017: 1-6 - [c28]Oliver Kosut, Jörg Kliewer:
Dispersion of the discrete arbitrarily-varying channel with limited shared randomness. ISIT 2017: 1242-1246 - [c27]Kousha Kalantari, Lalitha Sankar, Oliver Kosut:
On information-theoretic privacy with general distortion cost functions. ISIT 2017: 2865-2869 - [c26]Jiazi Zhang, Zhigang Chu, Lalitha Sankar, Oliver Kosut:
False data injection attacks on phasor measurements that bypass low-rank decomposition. SmartGridComm 2017: 96-101 - [i19]Jiazi Zhang, Zhigang Chu, Lalitha Sankar, Oliver Kosut:
Can Attackers with Limited Information Exploit Historical Data to Mount Successful False Data Injection Attacks on Power Systems? CoRR abs/1703.07500 (2017) - [i18]Jiazi Zhang, Zhigang Chu, Lalitha Sankar, Oliver Kosut:
False Data Injection Attacks on Phasor Measurements That Bypass Low-rank Decomposition. CoRR abs/1705.02038 (2017) - [i17]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
Vulnerability Assessment of Large-scale Power Systems to False Data Injection Attacks. CoRR abs/1705.04218 (2017) - [i16]Nematollah Iri, Oliver Kosut:
Fundamental Limits of Universal Variable-to-Fixed Length Coding of Parametric Sources. CoRR abs/1706.07582 (2017) - [i15]Oliver Kosut, Jörg Kliewer:
Strong Converses Are Just Edge Removal Properties. CoRR abs/1706.08172 (2017) - [i14]Kousha Kalantari, Oliver Kosut, Lalitha Sankar:
Information-Theoretic Privacy with General Distortion Constraints. CoRR abs/1708.05468 (2017) - [i13]Fatemeh Hosseinigoki, Oliver Kosut:
The Gaussian Interference Channel in the Presence of Malicious Jammers. CoRR abs/1712.04133 (2017) - 2016
- [j6]Inaki Esnaola
, Samir Medina Perlaza
, H. Vincent Poor
, Oliver Kosut:
Maximum Distortion Attacks in Electricity Grids. IEEE Trans. Smart Grid 7(4): 2007-2015 (2016) - [c25]Kousha Kalantari, Oliver Kosut, Lalitha Sankar:
On the fine asymptotics of information theoretic privacy. Allerton 2016: 532-539 - [c24]Fatemeh Hosseinigoki, Oliver Kosut:
The Gaussian interference channel in the presence of a malicious jammer. Allerton 2016: 679-686 - [c23]Nematollah Iri, Oliver Kosut:
A new Type Size code for universal one-to-one compression of parametric sources. ISIT 2016: 1227-1231 - [c22]Oliver Kosut, Jörg Kliewer:
On the relationship between edge removal and strong converses. ISIT 2016: 1779-1783 - [c21]Peida Tian, Sidharth Jaggi, Mayank Bakshi
, Oliver Kosut:
Arbitrarily varying networks: Capacity-achieving computationally efficient codes. ISIT 2016: 2139-2143 - [c20]Oliver Kosut, Jörg Kliewer:
Network equivalence for a joint compound-arbitrarily-varying network model. ITW 2016: 141-145 - [c19]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
Evaluating power system vulnerability to false data injection attacks via scalable optimization. SmartGridComm 2016: 260-265 - [c18]Inaki Esnaola
, Samir Medina Perlaza, H. Vincent Poor, Oliver Kosut:
Decentralized MMSE attacks in electricity grids. SSP 2016: 1-5 - [i12]Peida Tian, Sidharth Jaggi, Mayank Bakshi, Oliver Kosut:
Arbitrarily Varying Networks: Capacity-achieving Computationally Efficient Codes. CoRR abs/1605.01834 (2016) - [i11]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
Evaluating Power System Vulnerability to False Data Injection Attacks via Scalable Optimization. CoRR abs/1605.06557 (2016) - [i10]Xiaoqing Fan, Oliver Kosut, Aaron B. Wagner:
Variable Packet-Error Coding. CoRR abs/1608.01408 (2016) - [i9]Nematollah Iri, Oliver Kosut:
Fine Asymptotics for Universal One-to-One Compression of Parametric Sources. CoRR abs/1612.06448 (2016) - 2015
- [j5]Ying Liu, Oliver Kosut, Alan S. Willsky:
Sampling From Gaussian Markov Random Fields Using Stationary and Non-Stationary Subgraph Perturbations. IEEE Trans. Signal Process. 63(3): 576-589 (2015) - [c17]Nematollah Iri, Oliver Kosut:
Third-order coding rate for universal compression of Markov sources. ISIT 2015: 1996-2000 - [c16]Oliver Kosut:
Boosting output distributions in finite blocklength channel coding converse bounds. ITW 2015: 1-5 - [i8]Jingwen Liang, Lalitha Sankar, Oliver Kosut:
Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation. CoRR abs/1506.03774 (2015) - 2014
- [j4]Vincent Y. F. Tan, Oliver Kosut:
On the Dispersions of Three Network Information Theory Problems. IEEE Trans. Inf. Theory 60(2): 881-903 (2014) - [j3]Oliver Kosut, Lang Tong, David N. C. Tse:
Polytope Codes Against Adversaries in Networks. IEEE Trans. Inf. Theory 60(6): 3308-3344 (2014) - [c15]Oliver Kosut:
Max-flow min-cut for power system security index computation. SAM 2014: 61-64 - [c14]Oliver Kosut, Jörg Kliewer:
Equivalence for networks with adversarial state. ISIT 2014: 2401-2405 - [c13]Oliver Kosut, Lalitha Sankar:
New results on third-order coding rate for universal fixed-to-variable source coding. ISIT 2014: 2689-2693 - [c12]Oliver Kosut, Li-Wei Kao:
On generalized active attacks by causal adversaries in networks. ITW 2014: 247-251 - [i7]Oliver Kosut, Jörg Kliewer:
Equivalence for Networks with Adversarial State. CoRR abs/1404.6701 (2014) - [i6]Oliver Kosut, Lalitha Sankar:
Asymptotics and Non-asymptotics for Universal Fixed-to-Variable Source Coding. CoRR abs/1412.4444 (2014) - 2013
- [c11]Oliver Kosut:
Malicious data attacks against dynamic state estimation in the presence of random noise. GlobalSIP 2013: 261-264 - [c10]Oliver Kosut, Lalitha Sankar:
Universal fixed-to-variable source coding in the finite blocklength regime. ISIT 2013: 649-653 - [c9]Oliver Kosut:
Polytope codes for distributed storage in the presence of an active omniscient adversary. ISIT 2013: 897-901 - [c8]Ying Liu, Oliver Kosut, Alan S. Willsky:
Sampling from Gaussian graphical models using subgraph perturbations. ISIT 2013: 2498-2502 - 2012
- [c7]Vincent Y. F. Tan, Oliver Kosut:
On the dispersions of three network information theory problems. CISS 2012: 1-6 - [c6]Vincent Y. F. Tan, Oliver Kosut:
The dispersion of Slepian-Wolf coding. ISIT 2012: 915-919 - [i5]Vincent Y. F. Tan, Oliver Kosut:
On the Dispersions of Three Network Information Theory Problems. CoRR abs/1201.3901 (2012) - 2011
- [j2]Oliver Kosut, Liyan Jia, Robert J. Thomas, Lang Tong:
Malicious Data Attacks on the Smart Grid. IEEE Trans. Smart Grid 2(4): 645-658 (2011) - [i4]Oliver Kosut, Lang Tong, David Tse:
Polytope Codes Against Adversaries in Networks. CoRR abs/1112.3307 (2011) - 2010
- [c5]Oliver Kosut, Liyan Jia, Robert J. Thomas, Lang Tong:
Limiting false data attacks on power system state estimation. CISS 2010: 1-6 - [c4]Oliver Kosut, Lang Tong, David N. C. Tse:
Polytope codes against adversaries in networks. ISIT 2010: 2423-2427
2000 – 2009
- 2009
- [c3]Oliver Kosut, Lang Tong:
The quadratic Gaussian CEO problem with byzantine agents. ISIT 2009: 1145-1149 - 2008
- [j1]Oliver Kosut, Lang Tong:
Distributed Source Coding in the Presence of Byzantine Sensors. IEEE Trans. Inf. Theory 54(6): 2550-2565 (2008) - [c2]Oliver Kosut, Lang Tong:
The Byzantine CEO Problem. ISIT 2008: 46-50 - 2007
- [c1]Oliver Kosut, Lang Tong:
Variable-Rate Distributed Source Coding in the Presence of Byzantine Sensors. ISIT 2007: 2121-2125 - [i3]Oliver Kosut, Lang Tong:
Variable-Rate Distributed Source Coding in the Presence of Byzantine Sensors. CoRR abs/0705.0932 (2007) - [i2]Oliver Kosut, Lang Tong:
Distributed Source Coding in the Presence of Byzantine Sensors. CoRR abs/0710.4905 (2007) - 2006
- [i1]