From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hypothesis Testing Under Mutual Information Privacy Constraints in the High Privacy Regime., , , и . IEEE Trans. Inf. Forensics Secur., 13 (4): 1058-1071 (2018)Incentive Schemes for Privacy-Sensitive Consumers., , и . GameSec, том 9406 из Lecture Notes in Computer Science, стр. 358-369. Springer, (2015)An Operational Approach to Information Leakage via Generalized Gain Functions., , и . CoRR, (2022)The Saddle-Point Accountant for Differential Privacy., , , , , , и . CoRR, (2022)PMU Tracker: A Visualization Platform for Epicentric Event Propagation Analysis in the Power Grid., , , и . CoRR, (2022)Detection and Localization of Load Redistribution Attacks on Large Scale Systems., , и . CoRR, (2019)Optimal Multidimensional Differentially Private Mechanisms in the Large-Composition Regime., , , , , и . ISIT, стр. 2195-2200. IEEE, (2023)Cactus Mechanisms: Optimal Differential Privacy Mechanisms in the Large-Composition Regime., , , , , и . ISIT, стр. 1838-1843. IEEE, (2022)Schrödinger Mechanisms: Optimal Differential Privacy Mechanisms for Small Sensitivity., , , , , и . ISIT, стр. 2201-2206. IEEE, (2023)The Utility Cost of Robust Privacy Guarantees., , , и . ISIT, стр. 706-710. IEEE, (2018)