default search action
Oliver Kosut
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Rajasekhar Anguluri, Oliver Kosut, Lalitha Sankar:
Identifying Edge Changes in Networks From Input and Output Covariance Data. IEEE Control. Syst. Lett. 8: 364-369 (2024) - [j22]Gowtham R. Kurri, Lalitha Sankar, Oliver Kosut:
An Operational Approach to Information Leakage via Generalized Gain Functions. IEEE Trans. Inf. Theory 70(2): 1349-1375 (2024) - [j21]Atefeh Gilani, Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:
Unifying Privacy Measures via Maximal (α, β)-Leakage (MαbeL). IEEE Trans. Inf. Theory 70(6): 4368-4395 (2024) - [c66]Mayank Bakshi, Sara Ghasvarianjahromi, Yauhen Yakimenka, Allison Beemer, Oliver Kosut, Jörg Kliewer:
Valid: a Validated Algorithm for Learning in Decentralized Networks with Possible Adversarial Presence. ISIT 2024: 2502-2507 - [c65]Wael Alghamdi, Shahab Asoodeh, Flávio P. Calmon, Oliver Kosut, Lalitha Sankar:
Differential-Privacy Capacity. ISIT 2024: 3053-3058 - [c64]Oliver Kosut, Michelle Effros, Michael Langberg:
Nobody Expects a Differential Equation: Minimum Energy-Per-Bit for the Gaussian Relay Channel with Rank-1 Linear Relaying. ISIT 2024: 3332-3337 - [c63]Obai Bahwal, Oliver Kosut, Lalitha Sankar:
An Adversarial Approach to Evaluating the Robustness of Event Identification Models. SmartGridComm 2024: 327-332 - [i58]Oliver Kosut, Michelle Effros, Michael Langberg:
Nobody Expects a Differential Equation: Minimum Energy-Per-Bit for the Gaussian Relay Channel with Rank-1 Linear Relaying. CoRR abs/2401.15495 (2024) - [i57]Obai Bahwal, Oliver Kosut, Lalitha Sankar:
An Adversarial Approach to Evaluating the Robustness of Event Identification Models. CoRR abs/2402.12338 (2024) - [i56]Joel Mathias, Rajasekhar Anguluri, Oliver Kosut, Lalitha Sankar:
Model Predictive Control for Joint Ramping and Regulation-Type Service from Distributed Energy Resource Aggregations. CoRR abs/2405.02813 (2024) - [i55]Mayank Bakshi, Sara Ghasvarianjahromi, Yauhen Yakimenka, Allison Beemer, Oliver Kosut, Jörg Kliewer:
VALID: a Validated Algorithm for Learning in Decentralized Networks with Possible Adversarial Presence. CoRR abs/2405.07316 (2024) - 2023
- [j20]Caspar von Lengerke, Alexander Hefele, Juan A. Cabrera, Oliver Kosut, Martin Reisslein, Frank H. P. Fitzek:
Identification Codes: A Topical Review With Design Guidelines for Practical Systems. IEEE Access 11: 14961-14982 (2023) - [j19]Rajasekhar Anguluri, Oliver Kosut, Lalitha Sankar:
Localization and Estimation of Unknown Forced Inputs: A Group LASSO Approach. IEEE Trans. Control. Netw. Syst. 10(4): 1997-2009 (2023) - [j18]Eric Graves, Allison Beemer, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Keyless Authentication for AWGN Channels. IEEE Trans. Inf. Theory 69(1): 496-519 (2023) - [c62]Rajasekhar Anguluri, Nima Taghipourbazargani, Oliver Kosut, Lalitha Sankar:
Source Localization in Linear Dynamical Systems using Subspace Model Identification. CCTA 2023: 1016-1021 - [c61]Wael Alghamdi, Juan Felipe Gómez, Shahab Asoodeh, Flávio P. Calmon, Oliver Kosut, Lalitha Sankar:
The Saddle-Point Method in Differential Privacy. ICML 2023: 508-528 - [c60]Oliver Kosut, Michelle Effros, Michael Langberg:
Perfect vs. Independent Feedback in the Multiple-Access Channel. ISIT 2023: 1502-1507 - [c59]Wael Alghamdi, Shahab Asoodeh, Flávio P. Calmon, Juan Felipe Gómez, Oliver Kosut, Lalitha Sankar:
Optimal Multidimensional Differentially Private Mechanisms in the Large-Composition Regime. ISIT 2023: 2195-2200 - [c58]Wael Alghamdi, Shahab Asoodeh, Flávio P. Calmon, Juan Felipe Gómez, Oliver Kosut, Lalitha Sankar:
Schrödinger Mechanisms: Optimal Differential Privacy Mechanisms for Small Sensitivity. ISIT 2023: 2201-2206 - [c57]Mayank Bakshi, Oliver Kosut:
On Authentication against a Myopic Adversary using Stochastic Codes. ISIT 2023: 2422-2427 - [i54]Atefeh Gilani, Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:
(α, β)-Leakage: A Unified Privacy Leakage Measure. CoRR abs/2304.07456 (2023) - [i53]Oliver Kosut, Michelle Effros, Michael Langberg:
Perfect vs. Independent Feedback in the Multiple-Access Channel. CoRR abs/2305.06340 (2023) - [i52]Mayank Bakshi, Oliver Kosut:
On Authentication against a Myopic Adversary using Stochastic Codes. CoRR abs/2305.07292 (2023) - [i51]Nima Taghipourbazargani, Lalitha Sankar, Oliver Kosut:
A Semi-Supervised Approach for Power System Event Identification. CoRR abs/2309.10095 (2023) - 2022
- [j17]Anguluri Rajasekhar, Gautam Dasarathy, Oliver Kosut, Lalitha Sankar:
Grid Topology Identification With Hidden Nodes via Structured Norm Minimization. IEEE Control. Syst. Lett. 6: 1244-1249 (2022) - [j16]Oliver Kosut:
A Second-Order Converse Bound for the Multiple-Access Channel via Wringing Dependence. IEEE Trans. Inf. Theory 68(6): 3552-3584 (2022) - [c56]Wael Alghamdi, Shahab Asoodeh, Flávio P. Calmon, Oliver Kosut, Lalitha Sankar, Fei Wei:
Cactus Mechanisms: Optimal Differential Privacy Mechanisms in the Large-Composition Regime. ISIT 2022: 1838-1843 - [c55]Oliver Kosut, Michelle Effros, Michael Langberg:
On the Benefit of Cooperation in Relay Networks. ISIT 2022: 1945-1950 - [c54]Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:
A Variational Formula for Infinity-Rényi Divergence with Applications to Information Leakage. ISIT 2022: 2493-2498 - [c53]Atefeh Gilani, Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:
An Alphabet of Leakage Measures. ITW 2022: 458-463 - [i50]Oliver Kosut, Michelle Effros, Michael Langberg:
On the Benefit of Cooperation in Relay Networks. CoRR abs/2202.01878 (2022) - [i49]Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:
A Variational Formula for Infinity-Rényi Divergence with Applications to Information Leakage. CoRR abs/2202.06040 (2022) - [i48]Nima T. Bazargani, Gautam Dasarathy, Lalitha Sankar, Oliver Kosut:
A Machine Learning Framework for Event Identification via Modal Analysis of PMU Data. CoRR abs/2202.06836 (2022) - [i47]Wael Alghamdi, Shahab Asoodeh, Flávio P. Calmon, Oliver Kosut, Lalitha Sankar, Fei Wei:
Cactus Mechanisms: Optimal Differential Privacy Mechanisms in the Large-Composition Regime. CoRR abs/2207.00420 (2022) - [i46]Anguluri Rajasekhar, Lalitha Sankar, Oliver Kosut:
Parameter Estimation in Ill-conditioned Low-inertia Power Systems. CoRR abs/2208.04471 (2022) - [i45]Wael Alghamdi, Shahab Asoodeh, Flávio P. Calmon, Juan Felipe Gómez, Oliver Kosut, Lalitha Sankar, Fei Wei:
The Saddle-Point Accountant for Differential Privacy. CoRR abs/2208.09595 (2022) - [i44]Gowtham R. Kurri, Lalitha Sankar, Oliver Kosut:
An Operational Approach to Information Leakage via Generalized Gain Functions. CoRR abs/2209.13862 (2022) - [i43]Abrar Zahin, Rajasekhar Anguluri, Oliver Kosut, Lalitha Sankar, Gautam Dasarathy:
Robust Model Selection of Non Tree-Structured Gaussian Graphical Models. CoRR abs/2211.05690 (2022) - [i42]Atefeh Gilani, Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:
An Alphabet of Leakage Measures. CoRR abs/2211.15453 (2022) - 2021
- [j15]Shahab Asoodeh, Jiachun Liao, Flávio P. Calmon, Oliver Kosut, Lalitha Sankar:
Three Variants of Differential Privacy: Lossless Conversion and Applications. IEEE J. Sel. Areas Inf. Theory 2(1): 208-222 (2021) - [c52]Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:
Evaluating Multiple Guesses by an Adversary via a Tunable Loss Function. ISIT 2021: 2002-2007 - [c51]Oliver Kosut, Michelle Effros, Michael Langberg:
Every Bit Counts: Second-Order Analysis of Cooperation in the Multiple-Access Channel. ISIT 2021: 2214-2219 - [c50]Fei Wei, Oliver Kosut:
A Wringing-Based Proof of a Second-Order Converse for the Multiple-Access Channel under Maximal Error Probability. ISIT 2021: 2220-2225 - [i41]Oliver Kosut, Michelle Effros, Michael Langberg:
Every Bit Counts: Second-Order Analysis of Cooperation in the Multiple-Access Channel. CoRR abs/2102.01247 (2021) - [i40]Zhigang Chu, Andrea Pinceti, Ramin Kaviani, Roozbeh Khodadadeh, Xingpeng Li, Jiazi Zhang, Karthik Saikumar, Mostafa Sahraei-Ardakani, Christopher Mosier, Robin Podmore, Kory W. Hedman, Oliver Kosut, Lalitha Sankar:
A Verifiable Framework for Cyber-Physical Attacks and Countermeasures in a Resilient Electric Power Grid. CoRR abs/2104.13908 (2021) - [i39]Fatemeh Hosseinigoki, Oliver Kosut:
Capacity of Gaussian Arbitrarily-Varying Fading Channels. CoRR abs/2106.07189 (2021) - [i38]Andrea Pinceti, Lalitha Sankar, Oliver Kosut:
Synthetic Time-Series Load Data via Conditional Generative Adversarial Networks. CoRR abs/2107.03545 (2021) - [i37]Andrea Pinceti, Lalitha Sankar, Oliver Kosut:
Generation of Synthetic Multi-Resolution Time Series Load Data. CoRR abs/2107.03547 (2021) - [i36]Gowtham R. Kurri, Oliver Kosut, Lalitha Sankar:
Evaluating Multiple Guesses by an Adversary via a Tunable Loss Function. CoRR abs/2108.08774 (2021) - [i35]Eric Graves, Allison Beemer, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Keyless Authentication for AWGN Channels. CoRR abs/2111.06386 (2021) - 2020
- [c49]Allison Beemer, Eric Graves, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Authentication and Partial Message Correction over Adversarial Multiple-Access Channels. CNS 2020: 1-6 - [c48]Jiachun Liao, Lalitha Sankar, Oliver Kosut, Flávio P. Calmon:
Maximal α-Leakage and its Properties. CNS 2020: 1-6 - [c47]Shahab Asoodeh, Jiachun Liao, Flávio P. Calmon, Oliver Kosut, Lalitha Sankar:
A Better Bound Gives a Hundred Rounds: Enhanced Privacy Guarantees via f-Divergences. ISIT 2020: 920-925 - [c46]Allison Beemer, Eric Graves, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Authentication with Mildly Myopic Adversaries. ISIT 2020: 984-989 - [c45]Fatemeh Hosseinigoki, Oliver Kosut:
Capacity Region of the Gaussian Arbitrarily-Varying Broadcast Channel. ISIT 2020: 1007-1011 - [c44]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
Vulnerability Assessment of Large-scale Power Systems to False Data Injection Attacks. SmartGridComm 2020: 1-6 - [i34]Allison Beemer, Eric Graves, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Authentication Against a Myopic Adversary. CoRR abs/2001.03593 (2020) - [i33]Shahab Asoodeh, Jiachun Liao, Flávio P. Calmon, Oliver Kosut, Lalitha Sankar:
A Better Bound Gives a Hundred Rounds: Enhanced Privacy Guarantees via $f$-Divergences. CoRR abs/2001.05990 (2020) - [i32]Zhigang Chu, Oliver Kosut, Lalitha Sankar:
Detecting Load Redistribution Attacks via Support Vector Models. CoRR abs/2003.06543 (2020) - [i31]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
N-1 Reliability Makes It Difficult for False Data Injection Attacks to Cause Physical Consequences. CoRR abs/2003.07699 (2020) - [i30]Oliver Kosut:
A Second-Order Converse Bound for the Multiple-Access Channel via Wringing Dependence. CoRR abs/2007.15664 (2020) - [i29]Shahab Asoodeh, Jiachun Liao, Flávio P. Calmon, Oliver Kosut, Lalitha Sankar:
Three Variants of Differential Privacy: Lossless Conversion and Applications. CoRR abs/2008.06529 (2020)
2010 – 2019
- 2019
- [j14]Fatemeh Hosseinigoki, Oliver Kosut:
List-Decoding Capacity of the Gaussian Arbitrarily-Varying Channel. Entropy 21(6): 575 (2019) - [j13]Nematollah Iri, Oliver Kosut:
Fine Asymptotics for Universal One-to-One Compression of Parametric Sources. IEEE Trans. Inf. Theory 65(4): 2442-2458 (2019) - [j12]Oliver Kosut, Jörg Kliewer:
Strong Converses are Just Edge Removal Properties. IEEE Trans. Inf. Theory 65(6): 3315-3339 (2019) - [j11]Nematollah Iri, Oliver Kosut:
Corrections to "Fine Asymptotics for Universal One-to-One Compression of Parametric Sources". IEEE Trans. Inf. Theory 65(7): 4640 (2019) - [j10]Jiachun Liao, Oliver Kosut, Lalitha Sankar, Flávio du Pin Calmon:
Tunable Measures for Information Leakage and Applications to Privacy-Utility Tradeoffs. IEEE Trans. Inf. Theory 65(12): 8043-8066 (2019) - [c43]Fatemeh Hosseinigoki, Oliver Kosut:
Capacity of Gaussian Arbitrarily-Varying Fading Channels. CISS 2019: 1-6 - [c42]Allison Beemer, Oliver Kosut, Jörg Kliewer, Eric Graves, Paul L. Yu:
Authentication Against a Myopic Adversary. CNS 2019: 1-5 - [c41]Allison Beemer, Oliver Kosut, Jörg Kliewer, Eric Graves, Paul L. Yu:
Structured Coding for Authentication in the Presence of a Malicious Adversary. ISIT 2019: 617-621 - [c40]Jiachun Liao, Lalitha Sankar, Oliver Kosut, Flávio P. Calmon:
Robustness of Maximal α-Leakage to Side Information. ISIT 2019: 642-646 - [c39]Zhigang Chu, Andrea Pinceti, Reetam Sen Biswas, Oliver Kosut, Anamitra Pal, Lalitha Sankar:
Can Predictive Filters Detect Gradually Ramping False Data Injection Attacks Against PMUs? SmartGridComm 2019: 1-6 - [i28]Jiachun Liao, Lalitha Sankar, Oliver Kosut, Flávio P. Calmon:
Robustness of Maximal α-Leakage to Side Information. CoRR abs/1901.07105 (2019) - [i27]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
Vulnerability Assessment of N-1 Reliable Power Systems to False Data Injection Attacks. CoRR abs/1903.07781 (2019) - [i26]Zhigang Chu, Andrea Pinceti, Reetam Sen Biswas, Oliver Kosut, Anamitra Pal, Lalitha Sankar:
Can Predictive Filters Detect Gradually Ramping False Data Injection Attacks Against PMUs? CoRR abs/1905.02271 (2019) - [i25]Andrea Pinceti, Lalitha Sankar, Oliver Kosut:
Detection and Localization of Load Redistribution Attacks on Large Scale Systems. CoRR abs/1912.09453 (2019) - 2018
- [j9]Xiaoqing Fan, Oliver Kosut, Aaron B. Wagner:
Variable Packet-Error Coding. IEEE Trans. Inf. Theory 64(3): 1530-1547 (2018) - [c38]Fatemeh Hosseinigoki, Oliver Kosut:
Capacity of the Gaussian Arbitrarily-Varying Channel with List Decoding. ISIT 2018: 471-475 - [c37]Jiachun Liao, Oliver Kosut, Lalitha Sankar, Flávio P. Calmon:
A Tunable Measure for Information Leakage. ISIT 2018: 701-705 - [c36]Oliver Kosut, Jörg Kliewer:
Finite Blocklength and Dispersion Bounds for the Arbitrarily- Varying Channel. ISIT 2018: 2007-2011 - [c35]Oliver Kosut, Jörg Kliewer:
Authentication Capacity of Adversarial Channels. ITW 2018: 1-5 - [c34]Jiachun Liao, Oliver Kosut, Lalitha Sankar, Flávio P. Calmon:
Privacy Under Hard Distortion Constraints. ITW 2018: 1-5 - [c33]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
Unobservable False Data Injection Attacks against PMUs: Feasible Conditions and Multiplicative Attacks. SmartGridComm 2018: 1-6 - [i24]Oliver Kosut, Jörg Kliewer:
Finite Blocklength and Dispersion Bounds for the Arbitrarily-Varying Channel. CoRR abs/1801.03594 (2018) - [i23]Jiachun Liao, Oliver Kosut, Lalitha Sankar, Flávio P. Calmon:
Privacy Under Hard Distortion Constraints. CoRR abs/1806.00063 (2018) - [i22]Jiachun Liao, Oliver Kosut, Lalitha Sankar, Flávio P. Calmon:
A Tunable Measure for Information Leakage. CoRR abs/1806.03332 (2018) - [i21]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
Unobservable False Data Injection Attacks against PMUs: Feasible Conditions and Multiplicative Attacks. CoRR abs/1806.05057 (2018) - [i20]Jiachun Liao, Oliver Kosut, Lalitha Sankar, Flávio du Pin Calmon:
Tunable Measures for Information Leakage and Applications to Privacy-Utility Tradeoffs. CoRR abs/1809.09231 (2018) - 2017
- [j8]Oliver Kosut, Lalitha Sankar:
Asymptotics and Non-Asymptotics for Universal Fixed-to-Variable Source Coding. IEEE Trans. Inf. Theory 63(6): 3757-3772 (2017) - [j7]Oliver Kosut, Jörg Kliewer:
Equivalence for Networks With Adversarial State. IEEE Trans. Inf. Theory 63(7): 4137-4154 (2017) - [c32]Nematollah Iri, Oliver Kosut:
Fundamental limits of universal variable-to-fixed length coding of parametric sources. Allerton 2017: 31-37 - [c31]Nematollah Iri, Oliver Kosut:
Universal coding with point type classes. CISS 2017: 1-6 - [c30]Oliver Kosut, Jörg Kliewer:
Dispersion of the discrete arbitrarily-varying channel with limited shared randomness. ISIT 2017: 1242-1246 - [c29]Kousha Kalantari, Lalitha Sankar, Oliver Kosut:
On information-theoretic privacy with general distortion cost functions. ISIT 2017: 2865-2869 - [c28]Jiazi Zhang, Zhigang Chu, Lalitha Sankar, Oliver Kosut:
False data injection attacks on phasor measurements that bypass low-rank decomposition. SmartGridComm 2017: 96-101 - [i19]Jiazi Zhang, Zhigang Chu, Lalitha Sankar, Oliver Kosut:
Can Attackers with Limited Information Exploit Historical Data to Mount Successful False Data Injection Attacks on Power Systems? CoRR abs/1703.07500 (2017) - [i18]Jiazi Zhang, Zhigang Chu, Lalitha Sankar, Oliver Kosut:
False Data Injection Attacks on Phasor Measurements That Bypass Low-rank Decomposition. CoRR abs/1705.02038 (2017) - [i17]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
Vulnerability Assessment of Large-scale Power Systems to False Data Injection Attacks. CoRR abs/1705.04218 (2017) - [i16]Nematollah Iri, Oliver Kosut:
Fundamental Limits of Universal Variable-to-Fixed Length Coding of Parametric Sources. CoRR abs/1706.07582 (2017) - [i15]Oliver Kosut, Jörg Kliewer:
Strong Converses Are Just Edge Removal Properties. CoRR abs/1706.08172 (2017) - [i14]Kousha Kalantari, Oliver Kosut, Lalitha Sankar:
Information-Theoretic Privacy with General Distortion Constraints. CoRR abs/1708.05468 (2017) - [i13]Fatemeh Hosseinigoki, Oliver Kosut:
The Gaussian Interference Channel in the Presence of Malicious Jammers. CoRR abs/1712.04133 (2017) - 2016
- [j6]Inaki Esnaola, Samir Medina Perlaza, H. Vincent Poor, Oliver Kosut:
Maximum Distortion Attacks in Electricity Grids. IEEE Trans. Smart Grid 7(4): 2007-2015 (2016) - [c27]Kousha Kalantari, Oliver Kosut, Lalitha Sankar:
On the fine asymptotics of information theoretic privacy. Allerton 2016: 532-539 - [c26]Fatemeh Hosseinigoki, Oliver Kosut:
The Gaussian interference channel in the presence of a malicious jammer. Allerton 2016: 679-686 - [c25]Nematollah Iri, Oliver Kosut:
A new Type Size code for universal one-to-one compression of parametric sources. ISIT 2016: 1227-1231 - [c24]Oliver Kosut, Jörg Kliewer:
On the relationship between edge removal and strong converses. ISIT 2016: 1779-1783 - [c23]Peida Tian, Sidharth Jaggi, Mayank Bakshi, Oliver Kosut:
Arbitrarily varying networks: Capacity-achieving computationally efficient codes. ISIT 2016: 2139-2143 - [c22]Oliver Kosut, Jörg Kliewer:
Network equivalence for a joint compound-arbitrarily-varying network model. ITW 2016: 141-145 - [c21]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
Evaluating power system vulnerability to false data injection attacks via scalable optimization. SmartGridComm 2016: 260-265 - [c20]Inaki Esnaola, Samir Medina Perlaza, H. Vincent Poor, Oliver Kosut:
Decentralized MMSE attacks in electricity grids. SSP 2016: 1-5 - [i12]Peida Tian, Sidharth Jaggi, Mayank Bakshi, Oliver Kosut:
Arbitrarily Varying Networks: Capacity-achieving Computationally Efficient Codes. CoRR abs/1605.01834 (2016) - [i11]Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar:
Evaluating Power System Vulnerability to False Data Injection Attacks via Scalable Optimization. CoRR abs/1605.06557 (2016) - [i10]Xiaoqing Fan, Oliver Kosut, Aaron B. Wagner:
Variable Packet-Error Coding. CoRR abs/1608.01408 (2016) - [i9]Nematollah Iri, Oliver Kosut:
Fine Asymptotics for Universal One-to-One Compression of Parametric Sources. CoRR abs/1612.06448 (2016) - 2015
- [j5]Ying Liu, Oliver Kosut, Alan S. Willsky:
Sampling From Gaussian Markov Random Fields Using Stationary and Non-Stationary Subgraph Perturbations. IEEE Trans. Signal Process. 63(3): 576-589 (2015) - [c19]Nematollah Iri, Oliver Kosut:
Third-order coding rate for universal compression of Markov sources. ISIT 2015: 1996-2000 - [c18]Oliver Kosut:
Boosting output distributions in finite blocklength channel coding converse bounds. ITW 2015: 1-5 - [i8]Jingwen Liang, Lalitha Sankar, Oliver Kosut:
Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation. CoRR abs/1506.03774 (2015) - 2014
- [j4]Vincent Y. F. Tan, Oliver Kosut:
On the Dispersions of Three Network Information Theory Problems. IEEE Trans. Inf. Theory 60(2): 881-903 (2014) - [j3]Oliver Kosut, Lang Tong, David N. C. Tse:
Polytope Codes Against Adversaries in Networks. IEEE Trans. Inf. Theory 60(6): 3308-3344 (2014) - [c17]Oliver Kosut:
Max-flow min-cut for power system security index computation. SAM 2014: 61-64 - [c16]Oliver Kosut, Jörg Kliewer:
Equivalence for networks with adversarial state. ISIT 2014: 2401-2405 - [c15]Oliver Kosut, Lalitha Sankar:
New results on third-order coding rate for universal fixed-to-variable source coding. ISIT 2014: 2689-2693 - [c14]Oliver Kosut, Li-Wei Kao:
On generalized active attacks by causal adversaries in networks. ITW 2014: 247-251 - [i7]Oliver Kosut, Jörg Kliewer:
Equivalence for Networks with Adversarial State. CoRR abs/1404.6701 (2014) - [i6]Oliver Kosut, Lalitha Sankar:
Asymptotics and Non-asymptotics for Universal Fixed-to-Variable Source Coding. CoRR abs/1412.4444 (2014) - 2013
- [c13]Oliver Kosut:
Malicious data attacks against dynamic state estimation in the presence of random noise. GlobalSIP 2013: 261-264 - [c12]Oliver Kosut, Lalitha Sankar:
Universal fixed-to-variable source coding in the finite blocklength regime. ISIT 2013: 649-653 - [c11]Oliver Kosut:
Polytope codes for distributed storage in the presence of an active omniscient adversary. ISIT 2013: 897-901 - [c10]Ying Liu, Oliver Kosut, Alan S. Willsky:
Sampling from Gaussian graphical models using subgraph perturbations. ISIT 2013: 2498-2502 - 2012
- [c9]Vincent Y. F. Tan, Oliver Kosut:
On the dispersions of three network information theory problems. CISS 2012: 1-6 - [c8]Vincent Y. F. Tan, Oliver Kosut:
The dispersion of Slepian-Wolf coding. ISIT 2012: 915-919 - [i5]Vincent Y. F. Tan, Oliver Kosut:
On the Dispersions of Three Network Information Theory Problems. CoRR abs/1201.3901 (2012) - 2011
- [j2]Oliver Kosut, Liyan Jia, Robert J. Thomas, Lang Tong:
Malicious Data Attacks on the Smart Grid. IEEE Trans. Smart Grid 2(4): 645-658 (2011) - [i4]Oliver Kosut, Lang Tong, David Tse:
Polytope Codes Against Adversaries in Networks. CoRR abs/1112.3307 (2011) - 2010
- [c7]Oliver Kosut, Liyan Jia, Robert J. Thomas, Lang Tong:
Limiting false data attacks on power system state estimation. CISS 2010: 1-6 - [c6]Oliver Kosut, Lang Tong, David N. C. Tse:
Polytope codes against adversaries in networks. ISIT 2010: 2423-2427
2000 – 2009
- 2009
- [c5]Oliver Kosut, Lang Tong, David Tse:
Nonlinear network coding is necessary to combat general Byzantine attacks. Allerton 2009: 593-599 - [c4]Oliver Kosut, Lang Tong:
The quadratic Gaussian CEO problem with byzantine agents. ISIT 2009: 1145-1149 - 2008
- [j1]Oliver Kosut, Lang Tong:
Distributed Source Coding in the Presence of Byzantine Sensors. IEEE Trans. Inf. Theory 54(6): 2550-2565 (2008) - [c3]Oliver Kosut, Lang Tong:
A characterization of the error exponent for the Byzantine CEO problem. Allerton 2008: 1207-1214 - [c2]Oliver Kosut, Lang Tong:
The Byzantine CEO Problem. ISIT 2008: 46-50 - 2007
- [c1]Oliver Kosut, Lang Tong:
Variable-Rate Distributed Source Coding in the Presence of Byzantine Sensors. ISIT 2007: 2121-2125 - [i3]Oliver Kosut, Lang Tong:
Variable-Rate Distributed Source Coding in the Presence of Byzantine Sensors. CoRR abs/0705.0932 (2007) - [i2]Oliver Kosut, Lang Tong:
Distributed Source Coding in the Presence of Byzantine Sensors. CoRR abs/0710.4905 (2007) - 2006
- [i1]Oliver Kosut, Lang Tong:
Capacity of Cooperative Fusion in the Presence of Byzantine Sensors. CoRR abs/cs/0607076 (2006)
Coauthor Index
aka: Flávio du Pin Calmon
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-21 21:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint