If you made any changes in Pure, your changes will be visible here soon.

Research Output 2006 2019

  • 875 Citations
  • 13 h-Index
  • 46 Conference contribution
  • 15 Article
  • 1 Comment/debate
Filter
Conference contribution
2019

Authentication capacity of adversarial channels

Kosut, O. & Kliewer, J., Jan 15 2019, 2018 IEEE Information Theory Workshop, ITW 2018. Institute of Electrical and Electronics Engineers Inc., 8613353. (2018 IEEE Information Theory Workshop, ITW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Transmitters

Capacity of Gaussian Arbitrarily-Varying Fading Channels

Hosseinigoki, F. & Kosut, O., Apr 16 2019, 2019 53rd Annual Conference on Information Sciences and Systems, CISS 2019. Institute of Electrical and Electronics Engineers Inc., 8693030. (2019 53rd Annual Conference on Information Sciences and Systems, CISS 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fading channels

Privacy under hard distortion constraints

Liao, J., Kosut, O., Sankar, L. & Calmon, F. P., Jan 15 2019, 2018 IEEE Information Theory Workshop, ITW 2018. Institute of Electrical and Electronics Engineers Inc., 8613385. (2018 IEEE Information Theory Workshop, ITW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

A Tunable Measure for Information Leakage

Liao, J., Kosut, O., Sankar, L. & Calmon, F. P., Aug 15 2018, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-June. p. 701-705 5 p. 8437307

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Leakage
Refining
Channel capacity
Quasiconvexity
Chemical analysis
2 Citations (Scopus)

Capacity of the Gaussian Arbitrarily-Varying Channel with List Decoding

Hosseinigoki, F. & Kosut, O., Aug 15 2018, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-June. p. 471-475 5 p. 8437866

Research output: Chapter in Book/Report/Conference proceedingConference contribution

List Decoding
Decoding
Transmitters
Converse
Transmitter
2 Citations (Scopus)

False data injection attacks on phasor measurements that bypass low-rank decomposition

Zhang, J., Chu, Z., Sankar, L. & Kosut, O., Apr 17 2018, 2017 IEEE International Conference on Smart Grid Communications, SmartGridComm 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 96-101 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Phasor measurement units
Detectors
Decomposition
Convex optimization

Finite Blocklength and Dispersion Bounds for the Arbitrarily- Varying Channel

Kosut, O. & Kliewer, J., Aug 15 2018, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-June. p. 2007-2011 5 p. 8437724

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
Converse
Randomness
Union
Coding

Fundamental limits of universal variable-to-fixed length coding of parametric sources

Iri, N. & Kosut, O., Jan 17 2018, 55th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 31-37 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Glossaries
Coding
Cuboid
Sufficient Statistics
Exponential Family

Load Redistribution Attack Detection using Machine Learning: A Data-Driven Approach

Pinceti, A., Sankar, L. & Kosut, O., Dec 21 2018, 2018 IEEE Power and Energy Society General Meeting, PESGM 2018. IEEE Computer Society, Vol. 2018-August. 8586644

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems
Detectors
Support vector machines
Neural networks

Unobservable False Data Injection Attacks against PMUs: Feasible Conditions and Multiplicative Attacks

Chu, Z., Zhang, J., Kosut, O. & Sankar, L., Dec 24 2018, 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2018. Institute of Electrical and Electronics Engineers Inc., 8587555

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Phasor measurement units
Detectors
Decomposition
2017
1 Citation (Scopus)

Dispersion of the discrete arbitrarily-varying channel with limited shared randomness

Kosut, O. & Kliewer, J., Aug 9 2017, 2017 IEEE International Symposium on Information Theory, ISIT 2017. Institute of Electrical and Electronics Engineers Inc., p. 1242-1246 5 p. 8006727

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Randomness
Encoder
Costs
Coefficient
Term
6 Citations (Scopus)

On information-theoretic privacy with general distortion cost functions

Kalantari, K., Sankar, L. & Kosut, O., Aug 9 2017, 2017 IEEE International Symposium on Information Theory, ISIT 2017. Institute of Electrical and Electronics Engineers Inc., p. 2865-2869 5 p. 8007053

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cost functions
Privacy
Cost Function
Leakage
Random Mapping
3 Citations (Scopus)

On the fine asymptotics of information theoretic privacy

Kalantari, K., Kosut, O. & Sankar, L., Feb 10 2017, 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016. Institute of Electrical and Electronics Engineers Inc., p. 532-539 8 p. 7852277

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy
Information theory
Leakage
Excess
Probability Bounds
1 Citation (Scopus)

The Gaussian interference channel in the presence of a malicious jammer

Hosseinigoki, F. & Kosut, O., Feb 10 2017, 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016. Institute of Electrical and Electronics Engineers Inc., p. 679-686 8 p. 7852297

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Interference Channel
Gaussian Noise
Randomness
Packing
Lemma
1 Citation (Scopus)

Universal coding with point type classes

Iri, N. & Kosut, O., May 10 2017, 2017 51st Annual Conference on Information Sciences and Systems, CISS 2017. Institute of Electrical and Electronics Engineers Inc., 7926131

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Compression
Class size
Exponential family
2016
3 Citations (Scopus)

A new Type Size code for universal one-to-one compression of parametric sources

Iri, N. & Kosut, O., Aug 10 2016, Proceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-August. p. 1227-1231 5 p. 7541494

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Compression
Statistics
Source Coding
Sufficient Statistics
Exponential Family

Arbitrarily varying networks: Capacity-achieving computationally efficient codes

Tian, P., Jaggi, S., Bakshi, M. & Kosut, O., Aug 10 2016, Proceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-August. p. 2139-2143 5 p. 7541677

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Vertex of a graph
Linear networks
Network coding
Subset

Decentralized MMSE attacks in electricity grids

Esnaola, I., Perlaza, S. M., Poor, H. V. & Kosut, O., Aug 24 2016, 2016 19th IEEE Statistical Signal Processing Workshop, SSP 2016. IEEE Computer Society, Vol. 2016-August. 7551823

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Minimum Mean Square Error
Electricity
Decentralized
Attack
Game
6 Citations (Scopus)

Evaluating power system vulnerability to false data injection attacks via scalable optimization

Chu, Z., Zhang, J., Kosut, O. & Sankar, L., Dec 8 2016, 2016 IEEE International Conference on Smart Grid Communications, SmartGridComm 2016. Institute of Electrical and Electronics Engineers Inc., p. 260-265 6 p. 7778771

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Vulnerability
Power System
Injection
Attack
Power Flow
10 Citations (Scopus)

False data injection attacks on power system state estimation with limited information

Zhang, J., Chu, Z., Sankar, L. & Kosut, O., Nov 10 2016, 2016 IEEE Power and Energy Society General Meeting, PESGM 2016. IEEE Computer Society, Vol. 2016-November. 7741928

Research output: Chapter in Book/Report/Conference proceedingConference contribution

State estimation
Electric power systems
Information systems
1 Citation (Scopus)

Network equivalence for a joint compound-arbitrarily-varying network model

Kosut, O. & Kliewer, J., Oct 21 2016, 2016 IEEE Information Theory Workshop, ITW 2016. Institute of Electrical and Electronics Engineers Inc., p. 141-145 5 p. 7606812

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pipe
1 Citation (Scopus)

On the relationship between edge removal and strong converses

Kosut, O. & Kliewer, J., Aug 10 2016, Proceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-August. p. 1779-1783 5 p. 7541605

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Converse
Information theory
Error Probability
Information Theory
Converge
2015

Boosting output distributions in finite blocklength channel coding converse bounds

Kosut, O., Jun 24 2015, 2015 IEEE Information Theory Workshop, ITW 2015. Institute of Electrical and Electronics Engineers Inc., 7133158

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Channel coding
12 Citations (Scopus)

Third-order coding rate for universal compression of Markov sources

Iri, N. & Kosut, O., Sep 28 2015, IEEE International Symposium on Information Theory - Proceedings. Institute of Electrical and Electronics Engineers Inc., Vol. 2015-June. p. 1996-2000 5 p. 7282805

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Compression
Coding
Source Coding
Converse
Optimality
2014
25 Citations (Scopus)

Cyber attacks on AC state estimation: Unobservability and physical consequences

Liang, J., Kosut, O. & Sankar, L., Oct 29 2014, IEEE Power and Energy Society General Meeting. October ed. IEEE Computer Society, Vol. 2014-October. 6939486

Research output: Chapter in Book/Report/Conference proceedingConference contribution

State estimation
2 Citations (Scopus)

Equivalence for networks with adversarial state

Kosut, O. & Kliewer, J., 2014, IEEE International Symposium on Information Theory - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2401-2405 5 p. 6875264

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pipe
Equivalence
Feedback
Path
Subset
8 Citations (Scopus)

Max-flow min-cut for power system security index computation

Kosut, O., 2014, Proceedings of the IEEE Sensor Array and Multichannel Signal Processing Workshop. IEEE Computer Society, p. 61-64 4 p. 6882338

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security systems
Polynomials
Costs
13 Citations (Scopus)

New results on third-order coding rate for universal fixed-to-variable source coding

Kosut, O. & Sankar, L., 2014, IEEE International Symposium on Information Theory - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2689-2693 5 p. 6875322

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Source Coding
Coding
Converse
Optimality
Strictly
2 Citations (Scopus)

On generalized active attacks by causal adversaries in networks

Kosut, O. & Kao, L. W., Dec 1 2014, 2014 IEEE Information Theory Workshop, ITW 2014. Institute of Electrical and Electronics Engineers Inc., p. 247-251 5 p. 6970830

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2013
4 Citations (Scopus)

Malicious data attacks against dynamic state estimation in the presence of random noise

Kosut, O., 2013, 2013 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2013 - Proceedings. p. 261-264 4 p. 6736865

Research output: Chapter in Book/Report/Conference proceedingConference contribution

State estimation
Random processes
Dynamical systems
6 Citations (Scopus)

Polytope codes for distributed storage in the presence of an active omniscient adversary

Kosut, O., 2013, IEEE International Symposium on Information Theory - Proceedings. p. 897-901 5 p. 6620356

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Error detection
Error correction
Polytope
Linear Codes
Galois field
4 Citations (Scopus)

Sampling from Gaussian graphical models using subgraph perturbations

Liu, Y., Kosut, O. & Willsky, A. S., 2013, IEEE International Symposium on Information Theory - Proceedings. p. 2498-2502 5 p. 6620676

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Gaussian Model
Graphical Models
Subgraph
Sampling
Perturbation
16 Citations (Scopus)

Universal fixed-to-variable source coding in the finite blocklength regime

Kosut, O. & Sankar, L., 2013, IEEE International Symposium on Information Theory - Proceedings. p. 649-653 5 p. 6620306

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Source Coding
Coding
Numerical Results
2012
13 Citations (Scopus)

On the dispersions of three network information theory problems

Tan, V. Y. F. & Kosut, O., 2012, 2012 46th Annual Conference on Information Sciences and Systems, CISS 2012. 6310768

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information theory
Dispersions
Entropy
Redundancy
7 Citations (Scopus)

The dispersion of Slepian-Wolf coding

Tan, V. Y. F. & Kosut, O., 2012, IEEE International Symposium on Information Theory - Proceedings. p. 915-919 5 p. 6284695

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Coding
Entropy
Information theory
Curved Boundary
Multiple Access Channel
2010
77 Citations (Scopus)

Limiting false data attacks on power system state estimation

Kosut, O., Jia, L., Thomas, R. J. & Tong, L., 2010, 2010 44th Annual Conference on Information Sciences and Systems, CISS 2010. 5464816

Research output: Chapter in Book/Report/Conference proceedingConference contribution

State estimation
Detectors
Attack
Power system
55 Citations (Scopus)

On malicious data attacks on power system state estimation

Kosut, O., Jia, L., Thomas, R. J. & Tong, L., 2010, Proceedings of the Universities Power Engineering Conference. 5649823

Research output: Chapter in Book/Report/Conference proceedingConference contribution

State estimation
Mean square error
Detectors
16 Citations (Scopus)

Polytope codes against adversaries in networks

Kosut, O., Tong, L. & Tse, D., 2010, IEEE International Symposium on Information Theory - Proceedings. p. 2423-2427 5 p. 5513777

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Polytope
Network coding
Cutset
Network Coding
Linear Codes
2009
39 Citations (Scopus)

Nonlinear network coding is necessary to combat General Byzantine attacks

Kosut, O., Tong, L. & Tse, D., 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009. p. 593-599 7 p. 5394912

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Nonlinear networks
Network coding
coding
Throughput
Communication
2 Citations (Scopus)

The quadratic gaussian CEO problem with byzantine agents

Kosut, O. & Tong, L., 2009, IEEE International Symposium on Information Theory - Proceedings. p. 1145-1149 5 p. 5206013

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bins
Estimate
Damage
Attack
Unknown
2008
3 Citations (Scopus)

A characterization of the error exponent for the Byzantine CEO Problem

Kosut, O. & Tong, L., 2008, 46th Annual Allerton Conference on Communication, Control, and Computing. p. 1207-1214 8 p. 4797697

Research output: Chapter in Book/Report/Conference proceedingConference contribution

The Byzantine CEO Problem

Kosut, O. & Tong, L., 2008, IEEE International Symposium on Information Theory - Proceedings. p. 46-50 5 p. 4594945

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Attack
Error Exponent
Black Holes
Coding
Subset
2007
8 Citations (Scopus)

Integrated mobile and static sensing for target tracking

Kosut, O., Turovsky, A., Sun, J., Ezovski, M., Tong, L. & Whipps, G., 2007, Proceedings - IEEE Military Communications Conference MILCOM. 4454968

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Target tracking
Sensors
Ground vehicles
Military applications
Information use
2 Citations (Scopus)

The nose of a bloodhound: Target chasing aided by a static sensor network

Kosut, O. & Tong, L., 2007, Conference Record - Asilomar Conference on Signals, Systems and Computers. p. 376-380 5 p. 4487234

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensor networks
Sensors

Variable-rate distributed source coding in the presence of Byzantine sensors

Kosut, O. & Tong, L., 2007, IEEE International Symposium on Information Theory - Proceedings. p. 2121-2125 5 p. 4557534

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensors
Entropy
Fusion reactions
2006
5 Citations (Scopus)

Capacity of cooperative fusion in the presence of byzantine sensors

Kosut, O. & Tong, L., 2006, 44th Annual Allerton Conference on Communication, Control, and Computing 2006. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, Vol. 2. p. 987-995 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fusion reactions
Sensors