Research Output per year
Research Output 2006 2019
Authentication Against a Myopic Adversary
Beemer, A., Kosut, O., Kliewer, J., Graves, E. & Yu, P., Jun 1 2019, 2019 IEEE Conference on Communications and Network Security, CNS 2019. Institute of Electrical and Electronics Engineers Inc., 8802705. (2019 IEEE Conference on Communications and Network Security, CNS 2019).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Authentication capacity of adversarial channels
Kosut, O. & Kliewer, J., Jan 15 2019, 2018 IEEE Information Theory Workshop, ITW 2018. Institute of Electrical and Electronics Engineers Inc., 8613353. (2018 IEEE Information Theory Workshop, ITW 2018).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Capacity of Gaussian Arbitrarily-Varying Fading Channels
Hosseinigoki, F. & Kosut, O., Apr 16 2019, 2019 53rd Annual Conference on Information Sciences and Systems, CISS 2019. Institute of Electrical and Electronics Engineers Inc., 8693030. (2019 53rd Annual Conference on Information Sciences and Systems, CISS 2019).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Privacy under hard distortion constraints
Liao, J., Kosut, O., Sankar, L. & Calmon, F. P., Jan 15 2019, 2018 IEEE Information Theory Workshop, ITW 2018. Institute of Electrical and Electronics Engineers Inc., 8613385. (2018 IEEE Information Theory Workshop, ITW 2018).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Robustness of Maximal α-Leakage to Side Information
Liao, J., Sankar, L., Kosut, O. & Calmon, F. P., Jul 2019, 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 642-646 5 p. 8849769. (IEEE International Symposium on Information Theory - Proceedings; vol. 2019-July).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Structured Coding for Authentication in the Presence of a Malicious Adversary
Beemer, A., Kosut, O., Kliewer, J., Graves, E. & Yu, P., Jul 2019, 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 617-621 5 p. 8849581. (IEEE International Symposium on Information Theory - Proceedings; vol. 2019-July).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A Tunable Measure for Information Leakage
Liao, J., Kosut, O., Sankar, L. & Calmon, F. P., Aug 15 2018, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-June. p. 701-705 5 p. 8437307Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Capacity of the Gaussian Arbitrarily-Varying Channel with List Decoding
Hosseinigoki, F. & Kosut, O., Aug 15 2018, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-June. p. 471-475 5 p. 8437866Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
False data injection attacks on phasor measurements that bypass low-rank decomposition
Zhang, J., Chu, Z., Sankar, L. & Kosut, O., Apr 17 2018, 2017 IEEE International Conference on Smart Grid Communications, SmartGridComm 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 96-101 6 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Finite Blocklength and Dispersion Bounds for the Arbitrarily- Varying Channel
Kosut, O. & Kliewer, J., Aug 15 2018, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-June. p. 2007-2011 5 p. 8437724Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Fundamental limits of universal variable-to-fixed length coding of parametric sources
Iri, N. & Kosut, O., Jan 17 2018, 55th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 31-37 7 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Load Redistribution Attack Detection using Machine Learning: A Data-Driven Approach
Pinceti, A., Sankar, L. & Kosut, O., Dec 21 2018, 2018 IEEE Power and Energy Society General Meeting, PESGM 2018. IEEE Computer Society, Vol. 2018-August. 8586644Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Unobservable False Data Injection Attacks against PMUs: Feasible Conditions and Multiplicative Attacks
Chu, Z., Zhang, J., Kosut, O. & Sankar, L., Dec 24 2018, 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2018. Institute of Electrical and Electronics Engineers Inc., 8587555Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Dispersion of the discrete arbitrarily-varying channel with limited shared randomness
Kosut, O. & Kliewer, J., Aug 9 2017, 2017 IEEE International Symposium on Information Theory, ISIT 2017. Institute of Electrical and Electronics Engineers Inc., p. 1242-1246 5 p. 8006727Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
On information-theoretic privacy with general distortion cost functions
Kalantari, K., Sankar, L. & Kosut, O., Aug 9 2017, 2017 IEEE International Symposium on Information Theory, ISIT 2017. Institute of Electrical and Electronics Engineers Inc., p. 2865-2869 5 p. 8007053Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
On the fine asymptotics of information theoretic privacy
Kalantari, K., Kosut, O. & Sankar, L., Feb 10 2017, 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016. Institute of Electrical and Electronics Engineers Inc., p. 532-539 8 p. 7852277Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
The Gaussian interference channel in the presence of a malicious jammer
Hosseinigoki, F. & Kosut, O., Feb 10 2017, 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016. Institute of Electrical and Electronics Engineers Inc., p. 679-686 8 p. 7852297Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Universal coding with point type classes
Iri, N. & Kosut, O., May 10 2017, 2017 51st Annual Conference on Information Sciences and Systems, CISS 2017. Institute of Electrical and Electronics Engineers Inc., 7926131Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A new Type Size code for universal one-to-one compression of parametric sources
Iri, N. & Kosut, O., Aug 10 2016, Proceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-August. p. 1227-1231 5 p. 7541494Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Arbitrarily varying networks: Capacity-achieving computationally efficient codes
Tian, P., Jaggi, S., Bakshi, M. & Kosut, O., Aug 10 2016, Proceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-August. p. 2139-2143 5 p. 7541677Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Decentralized MMSE attacks in electricity grids
Esnaola, I., Perlaza, S. M., Poor, H. V. & Kosut, O., Aug 24 2016, 2016 19th IEEE Statistical Signal Processing Workshop, SSP 2016. IEEE Computer Society, Vol. 2016-August. 7551823Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Evaluating power system vulnerability to false data injection attacks via scalable optimization
Chu, Z., Zhang, J., Kosut, O. & Sankar, L., Dec 8 2016, 2016 IEEE International Conference on Smart Grid Communications, SmartGridComm 2016. Institute of Electrical and Electronics Engineers Inc., p. 260-265 6 p. 7778771Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
False data injection attacks on power system state estimation with limited information
Zhang, J., Chu, Z., Sankar, L. & Kosut, O., Nov 10 2016, 2016 IEEE Power and Energy Society General Meeting, PESGM 2016. IEEE Computer Society, Vol. 2016-November. 7741928Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Network equivalence for a joint compound-arbitrarily-varying network model
Kosut, O. & Kliewer, J., Oct 21 2016, 2016 IEEE Information Theory Workshop, ITW 2016. Institute of Electrical and Electronics Engineers Inc., p. 141-145 5 p. 7606812Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
On the relationship between edge removal and strong converses
Kosut, O. & Kliewer, J., Aug 10 2016, Proceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-August. p. 1779-1783 5 p. 7541605Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Boosting output distributions in finite blocklength channel coding converse bounds
Kosut, O., Jun 24 2015, 2015 IEEE Information Theory Workshop, ITW 2015. Institute of Electrical and Electronics Engineers Inc., 7133158Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Third-order coding rate for universal compression of Markov sources
Iri, N. & Kosut, O., Sep 28 2015, IEEE International Symposium on Information Theory - Proceedings. Institute of Electrical and Electronics Engineers Inc., Vol. 2015-June. p. 1996-2000 5 p. 7282805Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Cyber attacks on AC state estimation: Unobservability and physical consequences
Liang, J., Kosut, O. & Sankar, L., Oct 29 2014, IEEE Power and Energy Society General Meeting. October ed. IEEE Computer Society, Vol. 2014-October. 6939486Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Equivalence for networks with adversarial state
Kosut, O. & Kliewer, J., 2014, IEEE International Symposium on Information Theory - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2401-2405 5 p. 6875264Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Max-flow min-cut for power system security index computation
Kosut, O., 2014, Proceedings of the IEEE Sensor Array and Multichannel Signal Processing Workshop. IEEE Computer Society, p. 61-64 4 p. 6882338Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
New results on third-order coding rate for universal fixed-to-variable source coding
Kosut, O. & Sankar, L., 2014, IEEE International Symposium on Information Theory - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2689-2693 5 p. 6875322Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
On generalized active attacks by causal adversaries in networks
Kosut, O. & Kao, L. W., Dec 1 2014, 2014 IEEE Information Theory Workshop, ITW 2014. Institute of Electrical and Electronics Engineers Inc., p. 247-251 5 p. 6970830Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Malicious data attacks against dynamic state estimation in the presence of random noise
Kosut, O., 2013, 2013 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2013 - Proceedings. p. 261-264 4 p. 6736865Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Polytope codes for distributed storage in the presence of an active omniscient adversary
Kosut, O., 2013, IEEE International Symposium on Information Theory - Proceedings. p. 897-901 5 p. 6620356Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Sampling from Gaussian graphical models using subgraph perturbations
Liu, Y., Kosut, O. & Willsky, A. S., 2013, IEEE International Symposium on Information Theory - Proceedings. p. 2498-2502 5 p. 6620676Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Universal fixed-to-variable source coding in the finite blocklength regime
Kosut, O. & Sankar, L., 2013, IEEE International Symposium on Information Theory - Proceedings. p. 649-653 5 p. 6620306Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
On the dispersions of three network information theory problems
Tan, V. Y. F. & Kosut, O., 2012, 2012 46th Annual Conference on Information Sciences and Systems, CISS 2012. 6310768Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
The dispersion of Slepian-Wolf coding
Tan, V. Y. F. & Kosut, O., 2012, IEEE International Symposium on Information Theory - Proceedings. p. 915-919 5 p. 6284695Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Limiting false data attacks on power system state estimation
Kosut, O., Jia, L., Thomas, R. J. & Tong, L., 2010, 2010 44th Annual Conference on Information Sciences and Systems, CISS 2010. 5464816Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
On malicious data attacks on power system state estimation
Kosut, O., Jia, L., Thomas, R. J. & Tong, L., 2010, Proceedings of the Universities Power Engineering Conference. 5649823Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Polytope codes against adversaries in networks
Kosut, O., Tong, L. & Tse, D., 2010, IEEE International Symposium on Information Theory - Proceedings. p. 2423-2427 5 p. 5513777Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Nonlinear network coding is necessary to combat General Byzantine attacks
Kosut, O., Tong, L. & Tse, D., 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009. p. 593-599 7 p. 5394912Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
The quadratic gaussian CEO problem with byzantine agents
Kosut, O. & Tong, L., 2009, IEEE International Symposium on Information Theory - Proceedings. p. 1145-1149 5 p. 5206013Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A characterization of the error exponent for the Byzantine CEO Problem
Kosut, O. & Tong, L., 2008, 46th Annual Allerton Conference on Communication, Control, and Computing. p. 1207-1214 8 p. 4797697Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
The Byzantine CEO Problem
Kosut, O. & Tong, L., 2008, IEEE International Symposium on Information Theory - Proceedings. p. 46-50 5 p. 4594945Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Integrated mobile and static sensing for target tracking
Kosut, O., Turovsky, A., Sun, J., Ezovski, M., Tong, L. & Whipps, G., 2007, Proceedings - IEEE Military Communications Conference MILCOM. 4454968Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
The nose of a bloodhound: Target chasing aided by a static sensor network
Kosut, O. & Tong, L., 2007, Conference Record - Asilomar Conference on Signals, Systems and Computers. p. 376-380 5 p. 4487234Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Variable-rate distributed source coding in the presence of Byzantine sensors
Kosut, O. & Tong, L., 2007, IEEE International Symposium on Information Theory - Proceedings. p. 2121-2125 5 p. 4557534Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Capacity of cooperative fusion in the presence of byzantine sensors
Kosut, O. & Tong, L., 2006, 44th Annual Allerton Conference on Communication, Control, and Computing 2006. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, Vol. 2. p. 987-995 9 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution