| Publication | Date of Publication | Type |
|---|
Optimal accuracy-privacy trade-off of inference as service IEEE Transactions on Signal Processing | 2024-09-12 | Paper |
Fairness-aware regression robust to adversarial attacks IEEE Transactions on Signal Processing | 2024-09-12 | Paper |
Two-stage Bayesian sequential change diagnosis IEEE Transactions on Signal Processing | 2024-09-09 | Paper |
On the adversarial robustness of LASSO based feature selection IEEE Transactions on Signal Processing | 2024-09-09 | Paper |
Optimal feature manipulation attacks against linear regression IEEE Transactions on Signal Processing | 2024-09-09 | Paper |
Bayesian two-stage sequential change diagnosis via sensor arrays IEEE Transactions on Information Theory | 2024-07-21 | Paper |
Analysis of KNN Density Estimation IEEE Transactions on Information Theory | 2024-03-14 | Paper |
Machine learning algorithms. Adversarial robustness in signal processing Wireless Networks | 2022-11-08 | Paper |
On the Adversarial Robustness of Hypothesis Testing IEEE Transactions on Signal Processing | 2022-09-23 | Paper |
Robust Low-Rank Matrix Completion via an Alternating Manifold Proximal Gradient Continuation Method IEEE Transactions on Signal Processing | 2022-09-23 | Paper |
Action-Manipulation Attacks Against Stochastic Bandits: Attacks and Defense IEEE Transactions on Signal Processing | 2022-09-23 | Paper |
On the Adversarial Robustness of Subspace Learning IEEE Transactions on Signal Processing | 2022-09-23 | Paper |
Distributed Approximate Newton's Method Robust to Byzantine Attackers IEEE Transactions on Signal Processing | 2022-09-23 | Paper |
Minimax Rate Optimal Adaptive Nearest Neighbor Classification and Regression IEEE Transactions on Information Theory | 2021-07-22 | Paper |
Minimax Optimal Estimation of KL Divergence for Continuous Distributions IEEE Transactions on Information Theory | 2020-12-04 | Paper |
On the Adversarial Robustness of Robust Estimators IEEE Transactions on Information Theory | 2020-09-29 | Paper |
Analysis of KNN Information Estimators for Smooth Distributions IEEE Transactions on Information Theory | 2020-09-29 | Paper |
Robust Low-rank Matrix Completion via an Alternating Manifold Proximal Gradient Continuation Method | 2020-08-18 | Paper |
On Function Computation With Privacy and Secrecy Constraints IEEE Transactions on Information Theory | 2020-01-28 | Paper |
Online Change-Point Detection of Linear Regression Models IEEE Transactions on Signal Processing | 2019-10-28 | Paper |
On Rate Requirements for Achieving the Centralized Performance in Distributed Estimation IEEE Transactions on Signal Processing | 2019-02-08 | Paper |
Quickest Sequential Multiband Spectrum Sensing With Mixed Observations IEEE Transactions on Signal Processing | 2019-02-08 | Paper |
Distributed Testing With Cascaded Encoders IEEE Transactions on Information Theory | 2018-12-19 | Paper |
Multi-Key Generation Over a Cellular Model With a Helper IEEE Transactions on Information Theory | 2018-09-19 | Paper |
Keyless Authentication and Authenticated Capacity IEEE Transactions on Information Theory | 2018-09-14 | Paper |
Efficient Byzantine Sequential Change Detection IEEE Transactions on Information Theory | 2018-09-14 | Paper |
Multiple Change-Points Estimation in Linear Regression Models via Sparse Group Lasso IEEE Transactions on Signal Processing | 2018-08-22 | Paper |
Non-Bayesian Quickest Change Detection With Stochastic Sample Right Constraints IEEE Transactions on Signal Processing | 2018-08-22 | Paper |
On the Sum-Rate Capacity of Poisson MISO Multiple Access Channels IEEE Transactions on Information Theory | 2018-06-27 | Paper |
Degraded Broadcast Channel With Secrecy Outside a Bounded Range IEEE Transactions on Information Theory | 2018-06-27 | Paper |
Authentication Over Noisy Channels IEEE Transactions on Information Theory | 2017-08-08 | Paper |
Quickest Search Over Multiple Sequences IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Interference Alignment for Secrecy IEEE Transactions on Information Theory | 2017-07-12 | Paper |
A Broadcast Approach for Fading Wiretap Channels IEEE Transactions on Information Theory | 2017-06-08 | Paper |
Bayesian Quickest Change-Point Detection With Sampling Right Constraints IEEE Transactions on Information Theory | 2017-05-16 | Paper |
The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation IEEE Transactions on Information Theory | 2017-05-16 | Paper |
An Information Theoretic Approach to Secret Sharing IEEE Transactions on Information Theory | 2017-04-28 | Paper |
On the Capacity Bounds for Poisson Interference Channels IEEE Transactions on Information Theory | 2017-04-28 | Paper |
Key Generation Algorithms for Pairwise Independent Networks Based on Graphical Models IEEE Transactions on Information Theory | 2017-04-28 | Paper |
Byzantine Fault Tolerant Distributed Quickest Change Detection SIAM Journal on Control and Optimization | 2015-06-02 | Paper |
The Water-Filling Game in Fading Multiple-Access Channels IEEE Transactions on Information Theory | 2009-02-24 | Paper |
The Wiretap Channel With Feedback: Encryption Over the Channel IEEE Transactions on Information Theory | 2009-02-24 | Paper |
On the Secrecy Capacity of Fading Channels IEEE Transactions on Information Theory | 2009-02-24 | Paper |
The Relay–Eavesdropper Channel: Cooperation for Secrecy IEEE Transactions on Information Theory | 2009-02-24 | Paper |
The three-node wireless network: achievable rates and Cooperation strategies IEEE Transactions on Information Theory | 2008-12-21 | Paper |