Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hypothesis Testing Under Mutual Information Privacy Constraints in the High Privacy Regime., , , and . IEEE Trans. Inf. Forensics Secur., 13 (4): 1058-1071 (2018)Incentive Schemes for Privacy-Sensitive Consumers., , and . GameSec, volume 9406 of Lecture Notes in Computer Science, page 358-369. Springer, (2015)PMU Tracker: A Visualization Platform for Epicentric Event Propagation Analysis in the Power Grid., , , and . CoRR, (2022)An Operational Approach to Information Leakage via Generalized Gain Functions., , and . CoRR, (2022)The Saddle-Point Accountant for Differential Privacy., , , , , , and . CoRR, (2022)Schrödinger Mechanisms: Optimal Differential Privacy Mechanisms for Small Sensitivity., , , , , and . ISIT, page 2201-2206. IEEE, (2023)Optimal Multidimensional Differentially Private Mechanisms in the Large-Composition Regime., , , , , and . ISIT, page 2195-2200. IEEE, (2023)Cactus Mechanisms: Optimal Differential Privacy Mechanisms in the Large-Composition Regime., , , , , and . ISIT, page 1838-1843. IEEE, (2022)Detection and Localization of Load Redistribution Attacks on Large Scale Systems., , and . CoRR, (2019)Repeated games for privacy-aware distributed state estimation in interconnected networks., , and . NetGCooP, page 64-68. IEEE, (2012)