Hypothesis testing under maximal leakage privacy constraints
暂无分享,去创建一个
V. Tan | Jiachun Liao | L. Sankar | F. Calmon
[1] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[2] Lizhong Zheng,et al. Euclidean Information Theory , 2008, 2008 IEEE International Zurich Seminar on Communications.
[3] Mário S. Alvim,et al. Measuring Information Leakage Using Generalized Gain Functions , 2012, 2012 IEEE 25th Computer Security Foundations Symposium.
[4] Shao-Lun Huang,et al. Euclidean Information Theory of Networks , 2015, IEEE Transactions on Information Theory.
[5] Vincent Y. F. Tan,et al. Hypothesis testing in the high privacy limit , 2016, 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[6] Sudeep Kamath,et al. An operational measure of information leakage , 2016, 2016 Annual Conference on Information Science and Systems (CISS).