


Остановите войну!
for scientists:


default search action
Lalitha Sankar
Lalitha Sankaranarayanan
Person information

- affiliation: Arizona State University, Tempe, Arizona, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j31]Anjana Arunkumar
, Andrea Pinceti
, Lalitha Sankar
, Chris Bryan
:
PMU Tracker: A Visualization Platform for Epicentric Event Propagation Analysis in the Power Grid. IEEE Trans. Vis. Comput. Graph. 29(1): 1081-1090 (2023) - [i78]Tyler Sypherd, Nathan Stromberg, Richard Nock, Visar Berisha, Lalitha Sankar:
Smoothly Giving up: Robustness for Simple Models. CoRR abs/2302.09114 (2023) - [i77]Monica Welfert, Kyle Otstot, Gowtham R. Kurri, Lalitha Sankar:
Towards Addressing GAN Training Instabilities: Dual-objective GANs with Tunable Parameters. CoRR abs/2302.14320 (2023) - 2022
- [j30]Anjana Arunkumar
, Nitin Gupta
, Andrea Pinceti
, Lalitha Sankar
, Chris Bryan
:
PMUVis : A Large-Scale Platform to Assist Power System Operators in a Smart Grid. IEEE Computer Graphics and Applications 42(6): 84-95 (2022) - [j29]Anguluri Rajasekhar
, Gautam Dasarathy
, Oliver Kosut
, Lalitha Sankar
:
Grid Topology Identification With Hidden Nodes via Structured Norm Minimization. IEEE Control. Syst. Lett. 6: 1244-1249 (2022) - [j28]Peter Kairouz, Jiachun Liao
, Chong Huang, Maunil Vyas, Monica Welfert
, Lalitha Sankar
:
Generating Fair Universal Representations Using Adversarial Models. IEEE Trans. Inf. Forensics Secur. 17: 1970-1985 (2022) - [j27]Tyler Sypherd
, Mario Díaz
, John Kevin Cava, Gautam Dasarathy
, Peter Kairouz, Lalitha Sankar
:
A Tunable Loss Function for Robust Classification: Calibration, Landscape, and Generalization. IEEE Trans. Inf. Theory 68(9): 6021-6051 (2022) - [c55]Tyler Sypherd, Richard Nock, Lalitha Sankar:
Being Properly Improper. ICML 2022: 20891-20932 - [c54]Gowtham R. Kurri, Monica Welfert, Tyler Sypherd, Lalitha Sankar:
α-GAN: Convergence and Estimation Guarantees. ISIT 2022: 276-281 - [c53]Wael Alghamdi, Shahab Asoodeh, Flávio P. Calmon, Oliver Kosut, Lalitha Sankar, Fei Wei:
Cactus Mechanisms: Optimal Differential Privacy Mechanisms in the Large-Composition Regime. ISIT 2022: 1838-1843 - [c52]Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:
A Variational Formula for Infinity-Rényi Divergence with Applications to Information Leakage. ISIT 2022: 2493-2498 - [c51]Atefeh Gilani, Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:
An Alphabet of Leakage Measures. ITW 2022: 458-463 - [i76]Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:
A Variational Formula for Infinity-Rényi Divergence with Applications to Information Leakage. CoRR abs/2202.06040 (2022) - [i75]Nima T. Bazargani, Gautam Dasarathy, Lalitha Sankar, Oliver Kosut:
A Machine Learning Framework for Event Identification via Modal Analysis of PMU Data. CoRR abs/2202.06836 (2022) - [i74]Gowtham R. Kurri, Monica Welfert, Tyler Sypherd, Lalitha Sankar:
α-GAN: Convergence and Estimation Guarantees. CoRR abs/2205.06393 (2022) - [i73]Kyle Otstot, John Kevin Cava, Tyler Sypherd, Lalitha Sankar:
AugLoss: A Learning Methodology for Real-World Dataset Corruption. CoRR abs/2206.02286 (2022) - [i72]Wael Alghamdi, Shahab Asoodeh, Flávio P. Calmon, Oliver Kosut, Lalitha Sankar, Fei Wei:
Cactus Mechanisms: Optimal Differential Privacy Mechanisms in the Large-Composition Regime. CoRR abs/2207.00420 (2022) - [i71]Anguluri Rajasekhar, Lalitha Sankar, Oliver Kosut:
Parameter Estimation in Ill-conditioned Low-inertia Power Systems. CoRR abs/2208.04471 (2022) - [i70]Wael Alghamdi, Shahab Asoodeh, Flávio P. Calmon, Juan Felipe Gómez, Oliver Kosut, Lalitha Sankar, Fei Wei:
The Saddle-Point Accountant for Differential Privacy. CoRR abs/2208.09595 (2022) - [i69]Anjana Arunkumar, Andrea Pinceti, Lalitha Sankar, Chris Bryan:
PMU Tracker: A Visualization Platform for Epicentric Event Propagation Analysis in the Power Grid. CoRR abs/2209.03514 (2022) - [i68]Gowtham R. Kurri, Lalitha Sankar, Oliver Kosut:
An Operational Approach to Information Leakage via Generalized Gain Functions. CoRR abs/2209.13862 (2022) - [i67]Abrar Zahin, Rajasekhar Anguluri, Oliver Kosut, Lalitha Sankar, Gautam Dasarathy:
Robust Model Selection of Non Tree-Structured Gaussian Graphical Models. CoRR abs/2211.05690 (2022) - [i66]Atefeh Gilani, Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:
An Alphabet of Leakage Measures. CoRR abs/2211.15453 (2022) - 2021
- [j26]H. Vincent Poor, Matthieu R. Bloch, Onur Günlü, Frédérique E. Oggier, Lalitha Sankar, Rafael F. Schaefer, Aylin Yener:
Editorial. IEEE J. Sel. Areas Inf. Theory 2(1): 3-4 (2021) - [j25]Matthieu R. Bloch
, Onur Günlü
, Aylin Yener
, Frédérique E. Oggier, H. Vincent Poor
, Lalitha Sankar
, Rafael F. Schaefer
:
An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications. IEEE J. Sel. Areas Inf. Theory 2(1): 5-22 (2021) - [j24]Shahab Asoodeh
, Jiachun Liao
, Flávio P. Calmon
, Oliver Kosut
, Lalitha Sankar
:
Three Variants of Differential Privacy: Lossless Conversion and Applications. IEEE J. Sel. Areas Inf. Theory 2(1): 208-222 (2021) - [c50]Mario Díaz
, Peter Kairouz, Jiachun Liao, Lalitha Sankar:
Neural Network-based Estimation of the MMSE. ISIT 2021: 1023-1028 - [c49]Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:
Evaluating Multiple Guesses by an Adversary via a Tunable Loss Function. ISIT 2021: 2002-2007 - [c48]Gowtham R. Kurri, Tyler Sypherd, Lalitha Sankar:
Realizing GANs via a Tunable Loss Function. ITW 2021: 1-6 - [i65]Zhigang Chu, Andrea Pinceti, Ramin Kaviani, Roozbeh Khodadadeh, Xingpeng Li, Jiazi Zhang, Karthik Saikumar, Mostafa Sahraei-Ardakani, Christopher Mosier, Robin Podmore, Kory W. Hedman, Oliver Kosut, Lalitha Sankar:
A Verifiable Framework for Cyber-Physical Attacks and Countermeasures in a Resilient Electric Power Grid. CoRR abs/2104.13908 (2021) - [i64]Gowtham R. Kurri, Tyler Sypherd, Lalitha Sankar:
Realizing GANs via a Tunable Loss Function. CoRR abs/2106.05232 (2021) - [i63]Richard Nock, Tyler Sypherd, Lalitha Sankar:
Being Properly Improper. CoRR abs/2106.09920 (2021) - [i62]Andrea Pinceti, Lalitha Sankar, Oliver Kosut:
Synthetic Time-Series Load Data via Conditional Generative Adversarial Networks. CoRR abs/2107.03545 (2021) - [i61]Andrea Pinceti, Lalitha Sankar, Oliver Kosut:
Generation of Synthetic Multi-Resolution Time Series Load Data. CoRR abs/2107.03547 (2021) - [i60]Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:
Evaluating Multiple Guesses by an Adversary via a Tunable Loss Function. CoRR abs/2108.08774 (2021) - [i59]Mario Díaz, Peter Kairouz, Lalitha Sankar:
Lower Bounds for the Minimum Mean-Square Error via Neural Network-based Estimation. CoRR abs/2108.12851 (2021) - 2020
- [j23]Mario Díaz
, Hao Wang
, Flávio P. Calmon
, Lalitha Sankar
:
On the Robustness of Information-Theoretic Privacy Measures and Mechanisms. IEEE Trans. Inf. Theory 66(4): 1949-1978 (2020) - [c47]Jiachun Liao, Lalitha Sankar, Oliver Kosut, Flávio P. Calmon:
Maximal α-Leakage and its Properties. CNS 2020: 1-6 - [c46]Shahab Asoodeh, Jiachun Liao, Flávio P. Calmon
, Oliver Kosut, Lalitha Sankar:
A Better Bound Gives a Hundred Rounds: Enhanced Privacy Guarantees via f-Divergences. ISIT 2020: 920-925 - [c45]Tyler Sypherd, Mario Díaz
, Lalitha Sankar, Gautam Dasarathy:
On the α-loss Landscape in the Logistic Model. ISIT 2020: 2700-2705 - [c44]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
Vulnerability Assessment of Large-scale Power Systems to False Data Injection Attacks. SmartGridComm 2020: 1-6 - [i58]Shahab Asoodeh, Jiachun Liao, Flávio P. Calmon, Oliver Kosut, Lalitha Sankar:
A Better Bound Gives a Hundred Rounds: Enhanced Privacy Guarantees via $f$-Divergences. CoRR abs/2001.05990 (2020) - [i57]Zhigang Chu, Oliver Kosut, Lalitha Sankar:
Detecting Load Redistribution Attacks via Support Vector Models. CoRR abs/2003.06543 (2020) - [i56]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
N-1 Reliability Makes It Difficult for False Data Injection Attacks to Cause Physical Consequences. CoRR abs/2003.07699 (2020) - [i55]Tyler Sypherd, Mario Díaz, Lalitha Sankar, Gautam Dasarathy:
On the alpha-loss Landscape in the Logistic Model. CoRR abs/2006.12406 (2020) - [i54]Shahab Asoodeh, Jiachun Liao, Flávio P. Calmon, Oliver Kosut, Lalitha Sankar:
Three Variants of Differential Privacy: Lossless Conversion and Applications. CoRR abs/2008.06529 (2020)
2010 – 2019
- 2019
- [j22]Jiachun Liao
, Oliver Kosut
, Lalitha Sankar
, Flávio du Pin Calmon
:
Tunable Measures for Information Leakage and Applications to Privacy-Utility Tradeoffs. IEEE Trans. Inf. Theory 65(12): 8043-8066 (2019) - [c43]Jiachun Liao, Lalitha Sankar, Oliver Kosut, Flávio P. Calmon:
Robustness of Maximal α-Leakage to Side Information. ISIT 2019: 642-646 - [c42]Tyler Sypherd, Mario Díaz
, Lalitha Sankar, Peter Kairouz:
A Tunable Loss Function for Binary Classification. ISIT 2019: 2479-2483 - [c41]Zhigang Chu, Andrea Pinceti, Reetam Sen Biswas, Oliver Kosut, Anamitra Pal, Lalitha Sankar:
Can Predictive Filters Detect Gradually Ramping False Data Injection Attacks Against PMUs? SmartGridComm 2019: 1-6 - [i53]Jiachun Liao, Lalitha Sankar, Oliver Kosut, Flávio P. Calmon:
Robustness of Maximal α-Leakage to Side Information. CoRR abs/1901.07105 (2019) - [i52]Tyler Sypherd, Mario Díaz, Lalitha Sankar, Peter Kairouz:
A Tunable Loss Function for Binary Classification. CoRR abs/1902.04639 (2019) - [i51]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
Vulnerability Assessment of N-1 Reliable Power Systems to False Data Injection Attacks. CoRR abs/1903.07781 (2019) - [i50]Zhigang Chu, Andrea Pinceti, Reetam Sen Biswas, Oliver Kosut, Anamitra Pal, Lalitha Sankar:
Can Predictive Filters Detect Gradually Ramping False Data Injection Attacks Against PMUs? CoRR abs/1905.02271 (2019) - [i49]Tyler Sypherd, Mario Díaz, Harshit Laddha, Lalitha Sankar, Peter Kairouz, Gautam Dasarathy:
A Tunable Loss Function for Classification. CoRR abs/1906.02314 (2019) - [i48]Jiachun Liao, Chong Huang, Peter Kairouz, Lalitha Sankar:
Learning Generative Adversarial RePresentations (GAP) under Fairness and Censoring Constraints. CoRR abs/1910.00411 (2019) - [i47]Mario Díaz, Peter Kairouz, Jiachun Liao, Lalitha Sankar:
Theoretical Guarantees for Model Auditing with Finite Adversaries. CoRR abs/1911.03405 (2019) - [i46]Andrea Pinceti, Lalitha Sankar, Oliver Kosut:
Detection and Localization of Load Redistribution Attacks on Large Scale Systems. CoRR abs/1912.09453 (2019) - 2018
- [j21]Jiachun Liao
, Lalitha Sankar
, Vincent Y. F. Tan
, Flávio du Pin Calmon
:
Hypothesis Testing Under Mutual Information Privacy Constraints in the High Privacy Regime. IEEE Trans. Inf. Forensics Secur. 13(4): 1058-1071 (2018) - [j20]Kousha Kalantari
, Lalitha Sankar
, Anand D. Sarwate
:
Robust Privacy-Utility Tradeoffs Under Differential Privacy and Hamming Distortion. IEEE Trans. Inf. Forensics Secur. 13(11): 2816-2830 (2018) - [c40]Chong Huang, Peter Kairouz, Lalitha Sankar:
Generative Adversarial Privacy: A Data-Driven Approach to Information-Theoretic Privacy. ACSSC 2018: 2162-2166 - [c39]Chong Huang, Lalitha Sankar:
Impact of Privacy on Free Online Service Markets. GameSec 2018: 1-21 - [c38]Jiachun Liao, Oliver Kosut, Lalitha Sankar, Flávio P. Calmon:
A Tunable Measure for Information Leakage. ISIT 2018: 701-705 - [c37]Hao Wang, Mario Díaz
, Flávio P. Calmon, Lalitha Sankar:
The Utility Cost of Robust Privacy Guarantees. ISIT 2018: 706-710 - [c36]Jiachun Liao, Oliver Kosut, Lalitha Sankar, Flávio P. Calmon:
Privacy Under Hard Distortion Constraints. ITW 2018: 1-5 - [c35]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
Unobservable False Data Injection Attacks against PMUs: Feasible Conditions and Multiplicative Attacks. SmartGridComm 2018: 1-6 - [i45]Hao Wang, Mario Díaz, Flávio P. Calmon, Lalitha Sankar:
The Utility Cost of Robust Privacy Guarantees. CoRR abs/1801.05926 (2018) - [i44]Mario Díaz, Lalitha Sankar, Peter Kairouz:
On the Contractivity of Privacy Mechanisms. CoRR abs/1801.06255 (2018) - [i43]Jiachun Liao, Oliver Kosut, Lalitha Sankar, Flávio P. Calmon:
Privacy Under Hard Distortion Constraints. CoRR abs/1806.00063 (2018) - [i42]Jiachun Liao, Oliver Kosut, Lalitha Sankar, Flávio P. Calmon:
A Tunable Measure for Information Leakage. CoRR abs/1806.03332 (2018) - [i41]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
Unobservable False Data Injection Attacks against PMUs: Feasible Conditions and Multiplicative Attacks. CoRR abs/1806.05057 (2018) - [i40]Chong Huang, Peter Kairouz, Xiao Chen, Lalitha Sankar, Ram Rajagopal:
Generative Adversarial Privacy. CoRR abs/1807.05306 (2018) - [i39]Jiachun Liao, Oliver Kosut, Lalitha Sankar, Flávio du Pin Calmon:
Tunable Measures for Information Leakage and Applications to Privacy-Utility Tradeoffs. CoRR abs/1809.09231 (2018) - [i38]Mario Díaz, Hao Wang, Flávio P. Calmon, Lalitha Sankar:
On the Robustness of Information-Theoretic Privacy Measures and Mechanisms. CoRR abs/1811.06057 (2018) - 2017
- [j19]Chong Huang, Peter Kairouz
, Xiao Chen, Lalitha Sankar, Ram Rajagopal:
Context-Aware Generative Adversarial Privacy. Entropy 19(12): 656 (2017) - [j18]Bahman Moraffah, Lalitha Sankar
:
Privacy-Guaranteed Two-Agent Interactions Using Information-Theoretic Mechanisms. IEEE Trans. Inf. Forensics Secur. 12(9): 2168-2183 (2017) - [j17]Oliver Kosut
, Lalitha Sankar:
Asymptotics and Non-Asymptotics for Universal Fixed-to-Variable Source Coding. IEEE Trans. Inf. Theory 63(6): 3757-3772 (2017) - [c34]Jiachun Liao, Lalitha Sankar, Flávio P. Calmon, Vincent Y. F. Tan:
Hypothesis testing under maximal leakage privacy constraints. ISIT 2017: 779-783 - [c33]Kousha Kalantari, Lalitha Sankar, Oliver Kosut:
On information-theoretic privacy with general distortion cost functions. ISIT 2017: 2865-2869 - [c32]Jiazi Zhang, Zhigang Chu, Lalitha Sankar, Oliver Kosut:
False data injection attacks on phasor measurements that bypass low-rank decomposition. SmartGridComm 2017: 96-101 - [i37]Jiachun Liao, Lalitha Sankar, Flávio du Pin Calmon, Vincent Yan Fu Tan:
Hypothesis Testing under Maximal Leakage Privacy Constraints. CoRR abs/1701.07099 (2017) - [i36]Jiazi Zhang, Zhigang Chu, Lalitha Sankar, Oliver Kosut:
Can Attackers with Limited Information Exploit Historical Data to Mount Successful False Data Injection Attacks on Power Systems? CoRR abs/1703.07500 (2017) - [i35]Jiachun Liao, Lalitha Sankar, Vincent Y. F. Tan, Flávio du Pin Calmon:
Hypothesis Testing under Mutual Information Privacy Constraints in the High Privacy Regime. CoRR abs/1704.08347 (2017) - [i34]Jiazi Zhang, Zhigang Chu, Lalitha Sankar, Oliver Kosut:
False Data Injection Attacks on Phasor Measurements That Bypass Low-rank Decomposition. CoRR abs/1705.02038 (2017) - [i33]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
Vulnerability Assessment of Large-scale Power Systems to False Data Injection Attacks. CoRR abs/1705.04218 (2017) - [i32]Kousha Kalantari, Oliver Kosut, Lalitha Sankar:
Information-Theoretic Privacy with General Distortion Constraints. CoRR abs/1708.05468 (2017) - [i31]Chong Huang, Peter Kairouz, Xiao Chen, Lalitha Sankar, Ram Rajagopal:
Context-Aware Generative Adversarial Privacy. CoRR abs/1710.09549 (2017) - 2016
- [j16]Jiazi Zhang, Lalitha Sankar:
Physical System Consequences of Unobservable State-and-Topology Cyber-Physical Attacks. IEEE Trans. Smart Grid 7(4): 2016-2025 (2016) - [c31]Kousha Kalantari, Oliver Kosut, Lalitha Sankar:
On the fine asymptotics of information theoretic privacy. Allerton 2016: 532-539 - [c30]Jiachun Liao, Lalitha Sankar, Vincent Y. F. Tan, Flávio P. Calmon:
Hypothesis testing in the high privacy limit. Allerton 2016: 649-656 - [c29]Chong Huang, Lalitha Sankar:
Incentive mechanisms for privacy-sensitive electricity consumers with alternative energy sources. CISS 2016: 175-180 - [c28]Kousha Kalantari, Lalitha Sankar, Anand D. Sarwate
:
Optimal differential privacy mechanisms under Hamming distortion for structured source classes. ISIT 2016: 2069-2073 - [c27]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
Evaluating power system vulnerability to false data injection attacks via scalable optimization. SmartGridComm 2016: 260-265 - [i30]Kousha Kalantari, Lalitha Sankar, Anand D. Sarwate:
The Optimal Differential Privacy Mechanism under Hamming Distortion for Universal Memoryless Source Classes. CoRR abs/1601.06426 (2016) - [i29]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
Evaluating Power System Vulnerability to False Data Injection Attacks via Scalable Optimization. CoRR abs/1605.06557 (2016) - [i28]Jiachun Liao, Lalitha Sankar, Vincent Y. F. Tan, Flávio P. Calmon:
Hypothesis Testing in the High Privacy Limit. CoRR abs/1607.00533 (2016) - [i27]Bahman Moraffah, Lalitha Sankar:
Privacy-guaranteed Two-Agent Interactions Using Information-Theoretic Mechanisms. CoRR abs/1610.00663 (2016) - [i26]Chong Huang, Lalitha Sankar:
Market Segmentation for Privacy Differentiated "Free" Services. CoRR abs/1611.05380 (2016) - 2015
- [j15]Chong Huang, Lalitha Sankar
, Anand D. Sarwate
:
Designing Incentive Schemes for Privacy-Sensitive Users. J. Priv. Confidentiality 7(1) (2015) - [j14]Wade Trappe, Lalitha Sankar, Radha Poovendran, Heejo Lee, Srdjan Capkun:
Introduction to the Issue on Signal and Information Processing for Privacy. IEEE J. Sel. Top. Signal Process. 9(7): 1173-1175 (2015) - [j13]Elena Veronica Belmega, Lalitha Sankar, H. Vincent Poor
:
Enabling Data Exchange in Two-Agent Interactive Systems Under Privacy Constraints. IEEE J. Sel. Top. Signal Process. 9(7): 1285-1297 (2015) - [c26]Jiale Hu, Lalitha Sankar, Darakhshan J. Mir:
Cluster-and-Connect: An algorithmic approach to generating synthetic electric power network graphs. Allerton 2015: 223-230 - [c25]Bahman Moraffah, Lalitha Sankar:
Information-theoretic private interactive mechanism. Allerton 2015: 911-918 - [c24]Chong Huang, Lalitha Sankar, Anand D. Sarwate
:
Incentive Schemes for Privacy-Sensitive Consumers. GameSec 2015: 358-369 - [c23]Jiale Hu, Lalitha Sankar, Darakhshan J. Mir:
Cluster-and-connect: A more realistic model for the electric power network topology. SmartGridComm 2015: 85-90 - [i25]Jingwen Liang, Lalitha Sankar, Oliver Kosut:
Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation. CoRR abs/1506.03774 (2015) - [i24]Chong Huang, Lalitha Sankar, Anand D. Sarwate:
Designing Incentive Schemes For Privacy-Sensitive Users. CoRR abs/1508.01818 (2015) - [i23]Jiazi Zhang, Lalitha Sankar:
Implication of Unobservable State-and-topology Cyber-physical Attacks. CoRR abs/1509.00520 (2015) - 2014
- [c22]Anand D. Sarwate
, Lalitha Sankar:
A rate-disortion perspective on local differential privacy. Allerton 2014: 903-908 - [c21]Oliver Kosut, Lalitha Sankar:
New results on third-order coding rate for universal fixed-to-variable source coding. ISIT 2014: 2689-2693 - [i22]Elena Veronica Belmega, Lalitha Sankar, H. Vincent Poor:
Enabling Data Exchange in Interactive State Estimation under Privacy Constraints. CoRR abs/1411.2498 (2014) - [i21]Oliver Kosut, Lalitha Sankar:
Asymptotics and Non-asymptotics for Universal Fixed-to-Variable Source Coding. CoRR abs/1412.4444 (2014) - 2013
- [j12]Lalitha Sankar, Wade Trappe, H. Vincent Poor
, Mérouane Debbah:
Signal Processing for Cybersecurity and Privacy [From the Guest Editors]. IEEE Signal Process. Mag. 30(5): 14-15 (2013) - [j11]Lalitha Sankar, Wade Trappe, Kannan Ramchandran, H. Vincent Poor
, Mérouane Debbah:
The Role of Signal Processing in Meeting Privacy Challenges: An Overview. IEEE Signal Process. Mag. 30(5): 95-106 (2013) - [j10]Lalitha Sankar, S. Raj Rajagopalan, H. Vincent Poor
:
Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach. IEEE Trans. Inf. Forensics Secur. 8(6): 838-852 (2013) - [j9]Ravi Tandon, Lalitha Sankar, H. Vincent Poor
:
Discriminatory Lossy Source Coding: Side Information Privacy. IEEE Trans. Inf. Theory 59(9): 5665-5677 (2013) - [j8]Lalitha Sankar, S. Raj Rajagopalan, Soheil Mohajer, H. Vincent Poor
:
Smart Meter Privacy: A Theoretical Framework. IEEE Trans. Smart Grid 4(2): 837-846 (2013) - [c20]Lalitha Sankar:
Competitive privacy: Distributed computation with privacy guarantees. GlobalSIP 2013: 325-328 - [c19]Oliver Kosut, Lalitha Sankar:
Universal fixed-to-variable source coding in the finite blocklength regime. ISIT 2013: 649-653 - 2012
- [c18]