If you made any changes in Pure, your changes will be visible here soon.

Research Output 2007 2019

  • 1009 Citations
  • 15 h-Index
  • 46 Conference contribution
  • 21 Article
  • 1 Chapter
  • 1 Editorial
2019

Generative Adversarial Privacy: A Data-Driven Approach to Information-Theoretic Privacy

Huang, C., Kairouz, P. & Sankar, L., Feb 19 2019, Conference Record of the 52nd Asilomar Conference on Signals, Systems and Computers, ACSSC 2018. Matthews, M. B. (ed.). IEEE Computer Society, p. 2162-2166 5 p. 8645532. (Conference Record - Asilomar Conference on Signals, Systems and Computers; vol. 2018-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privatization

Privacy under hard distortion constraints

Liao, J., Kosut, O., Sankar, L. & Calmon, F. P., Jan 15 2019, 2018 IEEE Information Theory Workshop, ITW 2018. Institute of Electrical and Electronics Engineers Inc., 8613385. (2018 IEEE Information Theory Workshop, ITW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

A Tunable Measure for Information Leakage

Liao, J., Kosut, O., Sankar, L. & Calmon, F. P., Aug 15 2018, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-June. p. 701-705 5 p. 8437307

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Leakage
Refining
Channel capacity
Quasiconvexity
Chemical analysis
3 Citations (Scopus)
Linear regression
Information systems
2 Citations (Scopus)

False data injection attacks on phasor measurements that bypass low-rank decomposition

Zhang, J., Chu, Z., Sankar, L. & Kosut, O., Apr 17 2018, 2017 IEEE International Conference on Smart Grid Communications, SmartGridComm 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 96-101 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Phasor measurement units
Detectors
Decomposition
Convex optimization

Impact of privacy on free online service markets

Huang, C. & Sankar, L., Jan 1 2018, Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Proceedings. Bushnell, L., Poovendran, R. & Basar, T. (eds.). Springer Verlag, p. 1-21 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11199 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy
Quality of service
Gaussian distribution
Profitability
Market

Load Redistribution Attack Detection using Machine Learning: A Data-Driven Approach

Pinceti, A., Sankar, L. & Kosut, O., Dec 21 2018, 2018 IEEE Power and Energy Society General Meeting, PESGM 2018. IEEE Computer Society, Vol. 2018-August. 8586644

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems
Detectors
Support vector machines
Neural networks
2 Citations (Scopus)

Robust Privacy-Utility Tradeoffs under Differential Privacy and Hamming Distortion

Kalantari, K., Sankar, L. & Sarwate, A. D., Apr 27 2018, (Accepted/In press) In : IEEE Transactions on Information Forensics and Security.

Research output: Contribution to journalArticle

The Utility Cost of Robust Privacy Guarantees

Wang, H., Diaz, M., Calmon, F. P. & Sankar, L., Aug 15 2018, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-June. p. 706-710 5 p. 8437735

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy
Costs
Scenarios
Upper bound
Maximise

Unobservable False Data Injection Attacks against PMUs: Feasible Conditions and Multiplicative Attacks

Chu, Z., Zhang, J., Kosut, O. & Sankar, L., Dec 24 2018, 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2018. Institute of Electrical and Electronics Engineers Inc., 8587555

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Phasor measurement units
Detectors
Decomposition
2017
3 Citations (Scopus)

Asymptotics and Non-Asymptotics for Universal Fixed-to-Variable Source Coding

Kosut, O. & Sankar, L., Jun 1 2017, In : IEEE Transactions on Information Theory. 63, 6, p. 3757-3772 16 p., 7885514.

Research output: Contribution to journalArticle

coding
Entropy
entropy
regime
11 Citations (Scopus)

Context-aware generative adversarial privacy

Huang, C., Kairouz, P., Chen, X., Sankar, L. & Rajagopal, R., Dec 1 2017, In : Entropy. 19, 12, 656.

Research output: Contribution to journalArticle

privacy
games
holders
statistics
binary data
9 Citations (Scopus)

Hypothesis testing in the high privacy limit

Liao, J., Sankar, L., Tan, V. Y. F. & Calmon, F. P., Feb 10 2017, 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016. Institute of Electrical and Electronics Engineers Inc., p. 649-656 8 p. 7852293

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hypothesis Testing
Privacy
Entropy
Testing
Mutual Information
9 Citations (Scopus)

Hypothesis testing under maximal leakage privacy constraints

Liao, J., Sankar, L., Calmon, F. P. & Tan, V. Y. F., Aug 9 2017, 2017 IEEE International Symposium on Information Theory, ISIT 2017. Institute of Electrical and Electronics Engineers Inc., p. 779-783 5 p. 8006634

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Hypothesis Testing
Leakage
Privacy
Testing
9 Citations (Scopus)

Hypothesis Testing under Mutual Information Privacy Constraints in the High Privacy Regime

Liao, J., Sankar, L., Tan, V. Y. F. & Calmon, F. D. P., Nov 29 2017, (Accepted/In press) In : IEEE Transactions on Information Forensics and Security.

Research output: Contribution to journalArticle

Testing
Entropy
6 Citations (Scopus)

On information-theoretic privacy with general distortion cost functions

Kalantari, K., Sankar, L. & Kosut, O., Aug 9 2017, 2017 IEEE International Symposium on Information Theory, ISIT 2017. Institute of Electrical and Electronics Engineers Inc., p. 2865-2869 5 p. 8007053

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cost functions
Privacy
Cost Function
Leakage
Random Mapping
3 Citations (Scopus)

On the fine asymptotics of information theoretic privacy

Kalantari, K., Kosut, O. & Sankar, L., Feb 10 2017, 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016. Institute of Electrical and Electronics Engineers Inc., p. 532-539 8 p. 7852277

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy
Information theory
Leakage
Excess
Probability Bounds
2 Citations (Scopus)

Privacy-Guaranteed Two-Agent Interactions Using Information-Theoretic Mechanisms

Moraffah, B. & Sankar, L., Sep 1 2017, In : IEEE Transactions on Information Forensics and Security. 12, 9, p. 2168-2183 16 p., 7919236.

Research output: Contribution to journalArticle

2016
8 Citations (Scopus)

Cluster-and-Connect: An algorithmic approach to generating synthetic electric power network graphs

Hu, J., Sankar, L. & Mir, D. J., Apr 4 2016, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing, Allerton 2015. Institute of Electrical and Electronics Engineers Inc., p. 223-230 8 p. 7447008

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Circuit theory
Small-world networks
Electric power systems
Topology
Statistical Models
2 Citations (Scopus)

Cluster-And-connect: A more realistic model for the electric power network topology

Hu, J., Sankar, L. & Mir, D. J., Mar 17 2016, 2015 IEEE International Conference on Smart Grid Communications, SmartGridComm 2015. Institute of Electrical and Electronics Engineers Inc., p. 85-90 6 p. 7436281

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Topology
Small-world networks
Electric power systems
Statistical Models
6 Citations (Scopus)

Evaluating power system vulnerability to false data injection attacks via scalable optimization

Chu, Z., Zhang, J., Kosut, O. & Sankar, L., Dec 8 2016, 2016 IEEE International Conference on Smart Grid Communications, SmartGridComm 2016. Institute of Electrical and Electronics Engineers Inc., p. 260-265 6 p. 7778771

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Vulnerability
Power System
Injection
Attack
Power Flow
10 Citations (Scopus)

False data injection attacks on power system state estimation with limited information

Zhang, J., Chu, Z., Sankar, L. & Kosut, O., Nov 10 2016, 2016 IEEE Power and Energy Society General Meeting, PESGM 2016. IEEE Computer Society, Vol. 2016-November. 7741928

Research output: Chapter in Book/Report/Conference proceedingConference contribution

State estimation
Electric power systems
Information systems

Incentive mechanisms for privacy-sensitive electricity consumers with alternative energy sources

Huang, C. & Sankar, L., Apr 26 2016, 2016 50th Annual Conference on Information Systems and Sciences, CISS 2016. Institute of Electrical and Electronics Engineers Inc., p. 175-180 6 p. 7460497

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electricity
Smart meters
Cost reduction
5 Citations (Scopus)

Information-theoretic private interactive mechanism

Moraffah, B. & Sankar, L., Apr 4 2016, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing, Allerton 2015. Institute of Electrical and Electronics Engineers Inc., p. 911-918 8 p. 7447104

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Drawing (graphics)
6 Citations (Scopus)

Optimal differential privacy mechanisms under Hamming distortion for structured source classes

Kalantari, K., Sankar, L. & Sarwate, A. D., Aug 10 2016, Proceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-August. p. 2069-2073 5 p. 7541663

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy
Statistics
Permutation
Invariant
Monotonic
28 Citations (Scopus)

Physical System Consequences of Unobservable State-and-Topology Cyber-Physical Attacks

Zhang, J. & Sankar, L., Jul 1 2016, In : IEEE Transactions on Smart Grid. 7, 4, p. 2016-2025 10 p., 7450168.

Research output: Contribution to journalArticle

Topology
Outages
Masks
2015
1 Citation (Scopus)

Enabling data exchange in two-agent interactive systems under privacy constraints

Belmega, E. V., Sankar, L. & Poor, H. V., Oct 1 2015, In : IEEE Journal on Selected Topics in Signal Processing. 9, 7, p. 1285-1297 13 p., 7097637.

Research output: Contribution to journalArticle

Electronic data interchange
State estimation
Error analysis
Large scale systems
Network protocols
5 Citations (Scopus)

Implementation of unobservable state-preserving topology attacks

Zhang, J. & Sankar, L., Nov 20 2015, 2015 North American Power Symposium, NAPS 2015. Institute of Electrical and Electronics Engineers Inc., 7335175

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Topology
State estimation
Set theory
Detectors
2 Citations (Scopus)

Incentive schemes for privacy-sensitive consumers

Huang, C., Sankar, L. & Sarwate, A. D., 2015, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9406. p. 358-369 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9406).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Incentives
Privacy
Consumer behavior
Consumer Behaviour
Model

Introduction to the Issue on Signal and Information Processing for Privacy

Trappe, W., Sankar, L., Poovendran, R., Lee, H. & Capkun, S., Oct 1 2015, In : IEEE Journal on Selected Topics in Signal Processing. 9, 7, p. 1173-1175 3 p., 7265126.

Research output: Contribution to journalArticle

Signal processing
50 Citations (Scopus)

Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation

Liang, J., Sankar, L. & Kosut, O., Dec 25 2015, (Accepted/In press) In : IEEE Transactions on Power Systems.

Research output: Contribution to journalArticle

State estimation
Nonlinear systems
Electric lines
2014
13 Citations (Scopus)

A rate-disortion perspective on local differential privacy

Sarwate, A. D. & Sankar, L., Jan 30 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing, Allerton 2014. Institute of Electrical and Electronics Engineers Inc., p. 903-908 6 p. 7028550

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Masks
25 Citations (Scopus)

Cyber attacks on AC state estimation: Unobservability and physical consequences

Liang, J., Kosut, O. & Sankar, L., Oct 29 2014, IEEE Power and Energy Society General Meeting. October ed. IEEE Computer Society, Vol. 2014-October. 6939486

Research output: Chapter in Book/Report/Conference proceedingConference contribution

State estimation
13 Citations (Scopus)

New results on third-order coding rate for universal fixed-to-variable source coding

Kosut, O. & Sankar, L., 2014, IEEE International Symposium on Information Theory - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2689-2693 5 p. 6875322

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Source Coding
Coding
Converse
Optimality
Strictly
2013

Competitive privacy: Distributed computation with privacy guarantees

Sankar, L., 2013, 2013 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2013 - Proceedings. p. 325-328 4 p. 6736881

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Critical infrastructures
Electronic data interchange
State estimation
Profitability
9 Citations (Scopus)

Discriminatory lossy source coding: Side information privacy

Tandon, R., Sankar, L. & Poor, H. V., 2013, In : IEEE Transactions on Information Theory. 59, 9, p. 5665-5677 13 p., 6507243.

Research output: Contribution to journalArticle

privacy
coding
Availability
2 Citations (Scopus)

Signal processing for cybersecurity and privacy [from the guest editors]

Sankar, L., Trappe, W., Poor, H. V. & Debbah, M., 2013, In : IEEE Signal Processing Magazine. 30, 5, p. 14-15 2 p., 6582711.

Research output: Contribution to journalEditorial

Privacy
Signal Processing
Signal processing
111 Citations (Scopus)

Smart meter privacy: A theoretical framework

Sankar, L., Raj Rajagopalan, S., Mohajer, S. & Vincent Poor, H., 2013, In : IEEE Transactions on Smart Grid. 4, 2, p. 837-846 10 p., 6308749.

Research output: Contribution to journalArticle

Smart meters
Information theory
Hidden Markov models
Electricity
9 Citations (Scopus)

The role of signal processing in meeting privacy challenges: An overview

Sankar, L., Trappe, W., Ramchandran, K., Poor, H. V. & Debbah, M., 2013, In : IEEE Signal Processing Magazine. 30, 5, p. 95-106 12 p., 6582707.

Research output: Contribution to journalArticle

Data privacy
Privacy
Signal Processing
Signal processing
Information technology
16 Citations (Scopus)

Universal fixed-to-variable source coding in the finite blocklength regime

Kosut, O. & Sankar, L., 2013, IEEE International Symposium on Information Theory - Proceedings. p. 649-653 5 p. 6620306

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Source Coding
Coding
Numerical Results
126 Citations (Scopus)

Utility-privacy tradeoffs in databases: An information-theoretic approach

Sankar, L., Rajagopalan, S. R. & Poor, H. V., 2013, In : IEEE Transactions on Information Forensics and Security. 8, 6, p. 838-852 15 p., 6482222.

Research output: Contribution to journalArticle

Data structures
Analytical models
2012

Competitive privacy in the smart grid

Sankar, L., Kar, S. & Poor, H. V., 2012, Conference Record - Asilomar Conference on Signals, Systems and Computers. p. 1554-1558 5 p. 6489289

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
State estimation
Monitoring
1 Citation (Scopus)

Distributed estimation in multi-agent networks

Sankar, L. & Poor, H. V., 2012, IEEE International Symposium on Information Theory - Proceedings. p. 329-333 5 p. 6284202

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Distributed Estimation
Broadcast
Distributed Source Coding
Distributed Protocol
State estimation
4 Citations (Scopus)

Pricing mechanisms for cooperative state estimation

Belmega, E. V., Sankar, L., Poor, H. V. & Debbah, M., 2012, 5th International Symposium on Communications Control and Signal Processing, ISCCSP 2012. 6217856

Research output: Chapter in Book/Report/Conference proceedingConference contribution

State estimation
Costs
6 Citations (Scopus)

Repeated games for privacy-aware distributed state estimation in interconnected networks

Belmega, E. V., Sankar, L. & Poor, H. V., 2012, NetGCoop 2012 - 6th International Conference on Network Games, Control and Optimization. p. 64-68 5 p. 6486115

Research output: Chapter in Book/Report/Conference proceedingConference contribution

State estimation

Twitter vs. printed English: An information-theoretic comparison

Glennon, E., Sankar, L. & Poor, H. V., 2012, ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings. p. 3069-3072 4 p. 6288563

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Entropy
Linguistics
Communication
2011
48 Citations (Scopus)

Competitive privacy in the smart grid: An information-theoretic approach

Sankar, L., Kar, S., Tandon, R. & Poor, H. V., 2011, 2011 IEEE International Conference on Smart Grid Communications, SmartGridComm 2011. p. 220-225 6 p. 6102322

Research output: Chapter in Book/Report/Conference proceedingConference contribution

privacy
coding
Deregulation
communication
Communication
1 Citation (Scopus)

Dedicated-relay vs. user cooperation in time-duplexed multiaccess networks

Sankar, L., Kramer, G. & Mandayam, N. B., 2011, In : Journal of Communications. 6, 4, p. 330-339 10 p.

Research output: Contribution to journalArticle

Signal to noise ratio
Outages
Processing
Costs
Geometry
2 Citations (Scopus)

Discriminatory lossy source coding: Side information privacy

Tandon, R., Sankar, L. & Poor, H. V., 2011, GLOBECOM - IEEE Global Telecommunications Conference. 6134031

Research output: Chapter in Book/Report/Conference proceedingConference contribution

34 Citations (Scopus)

Ergodic fading interference channels: Sum-capacity and separability

Sankar, L., Shang, X., Erkip, E. & Poor, H. V., May 2011, In : IEEE Transactions on Information Theory. 57, 5, p. 2605-2626 22 p., 5752443.

Research output: Contribution to journalArticle

Channel capacity
Decoding
interference
Channel state information
Fading channels