Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing Incentive Schemes for Privacy-Sensitive Users., , and . J. Priv. Confidentiality, (2015)Editorial., , , , , , and . IEEE J. Sel. Areas Inf. Theory, 2 (1): 3-4 (2021)Detection and Localization of Load Redistribution Attacks on Large Scale Systems., , and . CoRR, (2019)Tunable Measures for Information Leakage and Applications to Privacy-Utility Tradeoffs., , , and . IEEE Trans. Inf. Theory, 65 (12): 8043-8066 (2019)Cactus Mechanisms: Optimal Differential Privacy Mechanisms in the Large-Composition Regime., , , , , and . ISIT, page 1838-1843. IEEE, (2022)Schrödinger Mechanisms: Optimal Differential Privacy Mechanisms for Small Sensitivity., , , , , and . ISIT, page 2201-2206. IEEE, (2023)Optimal Multidimensional Differentially Private Mechanisms in the Large-Composition Regime., , , , , and . ISIT, page 2195-2200. IEEE, (2023)Incentive Schemes for Privacy-Sensitive Consumers., , and . GameSec, volume 9406 of Lecture Notes in Computer Science, page 358-369. Springer, (2015)Hypothesis Testing Under Mutual Information Privacy Constraints in the High Privacy Regime., , , and . IEEE Trans. Inf. Forensics Secur., 13 (4): 1058-1071 (2018)Privacy-Guaranteed Two-Agent Interactions Using Information-Theoretic Mechanisms., and . IEEE Trans. Inf. Forensics Secur., 12 (9): 2168-2183 (2017)