Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PMU Tracker: A Visualization Platform for Epicentric Event Propagation Analysis in the Power Grid., , , and . CoRR, (2022)The Saddle-Point Accountant for Differential Privacy., , , , , , and . CoRR, (2022)Schrödinger Mechanisms: Optimal Differential Privacy Mechanisms for Small Sensitivity., , , , , and . ISIT, page 2201-2206. IEEE, (2023)Optimal Multidimensional Differentially Private Mechanisms in the Large-Composition Regime., , , , , and . ISIT, page 2195-2200. IEEE, (2023)Cactus Mechanisms: Optimal Differential Privacy Mechanisms in the Large-Composition Regime., , , , , and . ISIT, page 1838-1843. IEEE, (2022)An Operational Approach to Information Leakage via Generalized Gain Functions., , and . CoRR, (2022)Detection and Localization of Load Redistribution Attacks on Large Scale Systems., , and . CoRR, (2019)Incentive Schemes for Privacy-Sensitive Consumers., , and . GameSec, volume 9406 of Lecture Notes in Computer Science, page 358-369. Springer, (2015)Hypothesis Testing Under Mutual Information Privacy Constraints in the High Privacy Regime., , , and . IEEE Trans. Inf. Forensics Secur., 13 (4): 1058-1071 (2018)Competitive privacy in the smart grid., , and . ACSCC, page 1554-1558. IEEE, (2012)