| Publication | Date of Publication | Type |
|---|
| Optimal accuracy-privacy trade-off of inference as service | 2024-09-12 | Paper |
| Fairness-aware regression robust to adversarial attacks | 2024-09-12 | Paper |
| Two-stage Bayesian sequential change diagnosis | 2024-09-09 | Paper |
| On the adversarial robustness of LASSO based feature selection | 2024-09-09 | Paper |
| Optimal feature manipulation attacks against linear regression | 2024-09-09 | Paper |
| Bayesian two-stage sequential change diagnosis via sensor arrays | 2024-07-21 | Paper |
| Analysis of KNN Density Estimation | 2024-03-14 | Paper |
| Machine learning algorithms. Adversarial robustness in signal processing | 2022-11-08 | Paper |
| On the Adversarial Robustness of Hypothesis Testing | 2022-09-23 | Paper |
| Robust Low-Rank Matrix Completion via an Alternating Manifold Proximal Gradient Continuation Method | 2022-09-23 | Paper |
| Action-Manipulation Attacks Against Stochastic Bandits: Attacks and Defense | 2022-09-23 | Paper |
| On the Adversarial Robustness of Subspace Learning | 2022-09-23 | Paper |
| Distributed Approximate Newton's Method Robust to Byzantine Attackers | 2022-09-23 | Paper |
| Minimax Rate Optimal Adaptive Nearest Neighbor Classification and Regression | 2021-07-22 | Paper |
| Minimax Optimal Estimation of KL Divergence for Continuous Distributions | 2020-12-04 | Paper |
| On the Adversarial Robustness of Robust Estimators | 2020-09-29 | Paper |
| Analysis of KNN Information Estimators for Smooth Distributions | 2020-09-29 | Paper |
| Robust Low-rank Matrix Completion via an Alternating Manifold Proximal Gradient Continuation Method | 2020-08-18 | Paper |
| On Function Computation With Privacy and Secrecy Constraints | 2020-01-28 | Paper |
| Online Change-Point Detection of Linear Regression Models | 2019-10-28 | Paper |
| On Rate Requirements for Achieving the Centralized Performance in Distributed Estimation | 2019-02-08 | Paper |
| Quickest Sequential Multiband Spectrum Sensing With Mixed Observations | 2019-02-08 | Paper |
| Distributed Testing With Cascaded Encoders | 2018-12-19 | Paper |
| Multi-Key Generation Over a Cellular Model With a Helper | 2018-09-19 | Paper |
| Keyless Authentication and Authenticated Capacity | 2018-09-14 | Paper |
| Efficient Byzantine Sequential Change Detection | 2018-09-14 | Paper |
| Multiple Change-Points Estimation in Linear Regression Models via Sparse Group Lasso | 2018-08-22 | Paper |
| Non-Bayesian Quickest Change Detection With Stochastic Sample Right Constraints | 2018-08-22 | Paper |
| On the Sum-Rate Capacity of Poisson MISO Multiple Access Channels | 2018-06-27 | Paper |
| Degraded Broadcast Channel With Secrecy Outside a Bounded Range | 2018-06-27 | Paper |
| Authentication Over Noisy Channels | 2017-08-08 | Paper |
| Quickest Search Over Multiple Sequences | 2017-07-12 | Paper |
| Interference Alignment for Secrecy | 2017-07-12 | Paper |
| A Broadcast Approach for Fading Wiretap Channels | 2017-06-08 | Paper |
| Bayesian Quickest Change-Point Detection With Sampling Right Constraints | 2017-05-16 | Paper |
| The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation | 2017-05-16 | Paper |
| An Information Theoretic Approach to Secret Sharing | 2017-04-28 | Paper |
| On the Capacity Bounds for Poisson Interference Channels | 2017-04-28 | Paper |
| Key Generation Algorithms for Pairwise Independent Networks Based on Graphical Models | 2017-04-28 | Paper |
| Byzantine Fault Tolerant Distributed Quickest Change Detection | 2015-06-02 | Paper |
| The Water-Filling Game in Fading Multiple-Access Channels | 2009-02-24 | Paper |
| The Wiretap Channel With Feedback: Encryption Over the Channel | 2009-02-24 | Paper |
| On the Secrecy Capacity of Fading Channels | 2009-02-24 | Paper |
| The Relay–Eavesdropper Channel: Cooperation for Secrecy | 2009-02-24 | Paper |
| The three-node wireless network: achievable rates and Cooperation strategies | 2008-12-21 | Paper |