If you made any changes in Pure, your changes will be visible here soon.

Research Output 2007 2019

  • 1009 Citations
  • 15 h-Index
  • 46 Conference contribution
  • 21 Article
  • 1 Chapter
  • 1 Editorial
Filter
Conference contribution
2019

Generative Adversarial Privacy: A Data-Driven Approach to Information-Theoretic Privacy

Huang, C., Kairouz, P. & Sankar, L., Feb 19 2019, Conference Record of the 52nd Asilomar Conference on Signals, Systems and Computers, ACSSC 2018. Matthews, M. B. (ed.). IEEE Computer Society, p. 2162-2166 5 p. 8645532. (Conference Record - Asilomar Conference on Signals, Systems and Computers; vol. 2018-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privatization

Privacy under hard distortion constraints

Liao, J., Kosut, O., Sankar, L. & Calmon, F. P., Jan 15 2019, 2018 IEEE Information Theory Workshop, ITW 2018. Institute of Electrical and Electronics Engineers Inc., 8613385. (2018 IEEE Information Theory Workshop, ITW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

A Tunable Measure for Information Leakage

Liao, J., Kosut, O., Sankar, L. & Calmon, F. P., Aug 15 2018, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-June. p. 701-705 5 p. 8437307

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Leakage
Refining
Channel capacity
Quasiconvexity
Chemical analysis
2 Citations (Scopus)

False data injection attacks on phasor measurements that bypass low-rank decomposition

Zhang, J., Chu, Z., Sankar, L. & Kosut, O., Apr 17 2018, 2017 IEEE International Conference on Smart Grid Communications, SmartGridComm 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 96-101 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Phasor measurement units
Detectors
Decomposition
Convex optimization

Impact of privacy on free online service markets

Huang, C. & Sankar, L., Jan 1 2018, Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Proceedings. Bushnell, L., Poovendran, R. & Basar, T. (eds.). Springer Verlag, p. 1-21 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11199 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy
Quality of service
Gaussian distribution
Profitability
Market

Load Redistribution Attack Detection using Machine Learning: A Data-Driven Approach

Pinceti, A., Sankar, L. & Kosut, O., Dec 21 2018, 2018 IEEE Power and Energy Society General Meeting, PESGM 2018. IEEE Computer Society, Vol. 2018-August. 8586644

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems
Detectors
Support vector machines
Neural networks

The Utility Cost of Robust Privacy Guarantees

Wang, H., Diaz, M., Calmon, F. P. & Sankar, L., Aug 15 2018, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-June. p. 706-710 5 p. 8437735

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy
Costs
Scenarios
Upper bound
Maximise

Unobservable False Data Injection Attacks against PMUs: Feasible Conditions and Multiplicative Attacks

Chu, Z., Zhang, J., Kosut, O. & Sankar, L., Dec 24 2018, 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2018. Institute of Electrical and Electronics Engineers Inc., 8587555

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Phasor measurement units
Detectors
Decomposition
2017
9 Citations (Scopus)

Hypothesis testing in the high privacy limit

Liao, J., Sankar, L., Tan, V. Y. F. & Calmon, F. P., Feb 10 2017, 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016. Institute of Electrical and Electronics Engineers Inc., p. 649-656 8 p. 7852293

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hypothesis Testing
Privacy
Entropy
Testing
Mutual Information
9 Citations (Scopus)

Hypothesis testing under maximal leakage privacy constraints

Liao, J., Sankar, L., Calmon, F. P. & Tan, V. Y. F., Aug 9 2017, 2017 IEEE International Symposium on Information Theory, ISIT 2017. Institute of Electrical and Electronics Engineers Inc., p. 779-783 5 p. 8006634

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Hypothesis Testing
Leakage
Privacy
Testing
6 Citations (Scopus)

On information-theoretic privacy with general distortion cost functions

Kalantari, K., Sankar, L. & Kosut, O., Aug 9 2017, 2017 IEEE International Symposium on Information Theory, ISIT 2017. Institute of Electrical and Electronics Engineers Inc., p. 2865-2869 5 p. 8007053

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cost functions
Privacy
Cost Function
Leakage
Random Mapping
3 Citations (Scopus)

On the fine asymptotics of information theoretic privacy

Kalantari, K., Kosut, O. & Sankar, L., Feb 10 2017, 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016. Institute of Electrical and Electronics Engineers Inc., p. 532-539 8 p. 7852277

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy
Information theory
Leakage
Excess
Probability Bounds
2016
8 Citations (Scopus)

Cluster-and-Connect: An algorithmic approach to generating synthetic electric power network graphs

Hu, J., Sankar, L. & Mir, D. J., Apr 4 2016, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing, Allerton 2015. Institute of Electrical and Electronics Engineers Inc., p. 223-230 8 p. 7447008

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Circuit theory
Small-world networks
Electric power systems
Topology
Statistical Models
2 Citations (Scopus)

Cluster-And-connect: A more realistic model for the electric power network topology

Hu, J., Sankar, L. & Mir, D. J., Mar 17 2016, 2015 IEEE International Conference on Smart Grid Communications, SmartGridComm 2015. Institute of Electrical and Electronics Engineers Inc., p. 85-90 6 p. 7436281

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Topology
Small-world networks
Electric power systems
Statistical Models
6 Citations (Scopus)

Evaluating power system vulnerability to false data injection attacks via scalable optimization

Chu, Z., Zhang, J., Kosut, O. & Sankar, L., Dec 8 2016, 2016 IEEE International Conference on Smart Grid Communications, SmartGridComm 2016. Institute of Electrical and Electronics Engineers Inc., p. 260-265 6 p. 7778771

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Vulnerability
Power System
Injection
Attack
Power Flow
10 Citations (Scopus)

False data injection attacks on power system state estimation with limited information

Zhang, J., Chu, Z., Sankar, L. & Kosut, O., Nov 10 2016, 2016 IEEE Power and Energy Society General Meeting, PESGM 2016. IEEE Computer Society, Vol. 2016-November. 7741928

Research output: Chapter in Book/Report/Conference proceedingConference contribution

State estimation
Electric power systems
Information systems

Incentive mechanisms for privacy-sensitive electricity consumers with alternative energy sources

Huang, C. & Sankar, L., Apr 26 2016, 2016 50th Annual Conference on Information Systems and Sciences, CISS 2016. Institute of Electrical and Electronics Engineers Inc., p. 175-180 6 p. 7460497

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electricity
Smart meters
Cost reduction
5 Citations (Scopus)

Information-theoretic private interactive mechanism

Moraffah, B. & Sankar, L., Apr 4 2016, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing, Allerton 2015. Institute of Electrical and Electronics Engineers Inc., p. 911-918 8 p. 7447104

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Drawing (graphics)
6 Citations (Scopus)

Optimal differential privacy mechanisms under Hamming distortion for structured source classes

Kalantari, K., Sankar, L. & Sarwate, A. D., Aug 10 2016, Proceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-August. p. 2069-2073 5 p. 7541663

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy
Statistics
Permutation
Invariant
Monotonic
2015
5 Citations (Scopus)

Implementation of unobservable state-preserving topology attacks

Zhang, J. & Sankar, L., Nov 20 2015, 2015 North American Power Symposium, NAPS 2015. Institute of Electrical and Electronics Engineers Inc., 7335175

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Topology
State estimation
Set theory
Detectors
2 Citations (Scopus)

Incentive schemes for privacy-sensitive consumers

Huang, C., Sankar, L. & Sarwate, A. D., 2015, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9406. p. 358-369 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9406).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Incentives
Privacy
Consumer behavior
Consumer Behaviour
Model
2014
13 Citations (Scopus)

A rate-disortion perspective on local differential privacy

Sarwate, A. D. & Sankar, L., Jan 30 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing, Allerton 2014. Institute of Electrical and Electronics Engineers Inc., p. 903-908 6 p. 7028550

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Masks
25 Citations (Scopus)

Cyber attacks on AC state estimation: Unobservability and physical consequences

Liang, J., Kosut, O. & Sankar, L., Oct 29 2014, IEEE Power and Energy Society General Meeting. October ed. IEEE Computer Society, Vol. 2014-October. 6939486

Research output: Chapter in Book/Report/Conference proceedingConference contribution

State estimation
13 Citations (Scopus)

New results on third-order coding rate for universal fixed-to-variable source coding

Kosut, O. & Sankar, L., 2014, IEEE International Symposium on Information Theory - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2689-2693 5 p. 6875322

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Source Coding
Coding
Converse
Optimality
Strictly
2013

Competitive privacy: Distributed computation with privacy guarantees

Sankar, L., 2013, 2013 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2013 - Proceedings. p. 325-328 4 p. 6736881

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Critical infrastructures
Electronic data interchange
State estimation
Profitability
16 Citations (Scopus)

Universal fixed-to-variable source coding in the finite blocklength regime

Kosut, O. & Sankar, L., 2013, IEEE International Symposium on Information Theory - Proceedings. p. 649-653 5 p. 6620306

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Source Coding
Coding
Numerical Results
2012

Competitive privacy in the smart grid

Sankar, L., Kar, S. & Poor, H. V., 2012, Conference Record - Asilomar Conference on Signals, Systems and Computers. p. 1554-1558 5 p. 6489289

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
State estimation
Monitoring
1 Citation (Scopus)

Distributed estimation in multi-agent networks

Sankar, L. & Poor, H. V., 2012, IEEE International Symposium on Information Theory - Proceedings. p. 329-333 5 p. 6284202

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Distributed Estimation
Broadcast
Distributed Source Coding
Distributed Protocol
State estimation
4 Citations (Scopus)

Pricing mechanisms for cooperative state estimation

Belmega, E. V., Sankar, L., Poor, H. V. & Debbah, M., 2012, 5th International Symposium on Communications Control and Signal Processing, ISCCSP 2012. 6217856

Research output: Chapter in Book/Report/Conference proceedingConference contribution

State estimation
Costs
6 Citations (Scopus)

Repeated games for privacy-aware distributed state estimation in interconnected networks

Belmega, E. V., Sankar, L. & Poor, H. V., 2012, NetGCoop 2012 - 6th International Conference on Network Games, Control and Optimization. p. 64-68 5 p. 6486115

Research output: Chapter in Book/Report/Conference proceedingConference contribution

State estimation

Twitter vs. printed English: An information-theoretic comparison

Glennon, E., Sankar, L. & Poor, H. V., 2012, ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings. p. 3069-3072 4 p. 6288563

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Entropy
Linguistics
Communication
2011
48 Citations (Scopus)

Competitive privacy in the smart grid: An information-theoretic approach

Sankar, L., Kar, S., Tandon, R. & Poor, H. V., 2011, 2011 IEEE International Conference on Smart Grid Communications, SmartGridComm 2011. p. 220-225 6 p. 6102322

Research output: Chapter in Book/Report/Conference proceedingConference contribution

privacy
coding
Deregulation
communication
Communication
2 Citations (Scopus)

Discriminatory lossy source coding: Side information privacy

Tandon, R., Sankar, L. & Poor, H. V., 2011, GLOBECOM - IEEE Global Telecommunications Conference. 6134031

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Multi-user privacy: The Gray-Wyner system and generalized common information

Tandon, R., Sankar, L. & Vincent Poor, H., 2011, IEEE International Symposium on Information Theory - Proceedings. p. 563-567 5 p. 6034191

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Grey System
Privacy
Source Coding
Privacy Preserving
Encoder
98 Citations (Scopus)

Smart meter privacy: A utility-privacy framework

Rajagopalan, S. R., Sankar, L., Mohajer, S. & Poor, H. V., 2011, 2011 IEEE International Conference on Smart Grid Communications, SmartGridComm 2011. p. 190-195 6 p. 6102315

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smart meters
privacy
Information theory
Electricity
information theory
2010
10 Citations (Scopus)

An information-theoretic approach to privacy

Sankar, L., Rajagopalan, S. R. & Poor, H. V., 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010. p. 1220-1227 8 p. 5707053

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Analytical models
21 Citations (Scopus)

A theory of utility and privacy of data sources

Sankar, L., Rajagopalan, S. R. & Poor, H. V., 2010, IEEE International Symposium on Information Theory - Proceedings. p. 2642-2646 5 p. 5513684

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy
Private Information
Side Information
Rate-distortion
Leakage
5 Citations (Scopus)

Utility and privacy of data sources: Can Shannon help conceal and reveal information?

Sankar, L., Rajagopalan, S. R. & Poor, H. V., 2010, 2010 Information Theory and Applications Workshop, ITA 2010 - Conference Proceedings. p. 401-407 7 p. 5454092

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2009
7 Citations (Scopus)

Ergodic layered erasure one-sided interference channels

Aggarwal, V., Sankar, L., Calderbank, A. R. & Poor, H. V., Dec 7 2009, 2009 IEEE Information Theory Workshop, ITW 2009. p. 574-578 5 p. 5351176

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Channel state information
Transmitters
Statistics
5 Citations (Scopus)

Information secrecy from multiple eavesdroppers in orthogonal relay channels

Aggarwal, V., Sankar, L., Calderbank, A. R. & Poor, H. V., 2009, IEEE International Symposium on Information Theory - Proceedings. p. 2607-2611 5 p. 5205963

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Relay Channel
Relay
Vertex of a graph
Partial

K-user fading interference channels: The ergodic very strong case

Sankar, L., Vondrak, J. & Poor, H. V., 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009. p. 82-87 6 p. 5394846

Research output: Chapter in Book/Report/Conference proceedingConference contribution

interference
Statistics
recipient
statistics
14 Citations (Scopus)

Secrecy capacity of a class of orthogonal relay eavesdropper channels

Aggarwal, V., Sankar, L., Calderbank, A. R. & Poor, H. V., 2009, Information Theory and Applications Workshop, ITA 2009. p. 295-300 6 p. 5044960

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Antennas
2008
17 Citations (Scopus)

Ergodic two-user interference channels: Is separability optimal?

Sankar, L., Shang, X., Erkip, E. & Poor, H. V., 2008, 46th Annual Allerton Conference on Communication, Control, and Computing. p. 723-729 7 p. 4797629

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decoding
interference
Fading (radio)
Fading channels
6 Citations (Scopus)

Sum-capacity of ergodic fading interference and compound multiaccess channels

Sankar, L., Erkip, E. & Poor, H. V., 2008, IEEE International Symposium on Information Theory - Proceedings. p. 2712-2716 5 p. 4595485

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fading
Resource allocation
Interference Channel
Transmitters
Receiver
2007
12 Citations (Scopus)

Opportunistic communications in an orthogonal multiaccess relay channel

Sankar, L., Liang, Y., Poor, H. V. & Mandayam, N., 2007, IEEE International Symposium on Information Theory - Proceedings. p. 1261-1265 5 p. 4557396

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Resource allocation
Transmitters
Communication

Relay vs. user cooperation in multiaccess networks

Sankar, L., Kramer, G. & Mandayam, N. B., 2007, 45th Annual Allerton Conference on Communication, Control, and Computing 2007. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, Vol. 1. p. 381-388 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Outages
Costs
Computer simulation
Processing