暂无分享,去创建一个
[1] Neri Merhav. Shannon's Secrecy System With Informed Receivers and its Application to Systematic Coding for Wiretapped Channels , 2008, IEEE Transactions on Information Theory.
[2] Gerhard Wunder,et al. Deep learning based wiretap coding via mutual information estimation , 2020, WiseML@WiSec.
[3] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[4] Deniz Gündüz,et al. On Perfect Privacy , 2017, 2018 IEEE International Symposium on Information Theory (ISIT).
[5] Flávio du Pin Calmon,et al. Privacy against statistical inference , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[6] Deniz Gündüz,et al. Adversarial Networks for Secure Wireless Communications , 2020, ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[7] Mihaela van der Schaar,et al. Machine Learning in the Air , 2019, IEEE Journal on Selected Areas in Communications.
[8] Deniz Gündüz,et al. Privacy-Aware Time-Series Data Sharing With Deep Reinforcement Learning , 2021, IEEE Transactions on Information Forensics and Security.
[9] Muriel Médard,et al. From the Information Bottleneck to the Privacy Funnel , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).
[10] Jakob Hoydis,et al. An Introduction to Deep Learning for the Physical Layer , 2017, IEEE Transactions on Cognitive Communications and Networking.
[11] Tobias J. Oechtering,et al. A Design Framework for Epsilon-Private Data Disclosure , 2020, ArXiv.
[12] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[13] Deniz Gündüz,et al. Deep Joint Source-channel Coding for Wireless Image Transmission , 2018, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[14] Deniz Gündüz,et al. Optimal Utility-Privacy Trade-off with the Total Variation Distance as the Privacy Measure , 2018, ArXiv.
[15] David Barber,et al. The IM algorithm: a variational approach to Information Maximization , 2003, NIPS 2003.
[16] Alexander A. Alemi,et al. On Variational Bounds of Mutual Information , 2019, ICML.
[17] Deniz Gündüz,et al. Active Privacy-Utility Trade-Off Against A Hypothesis Testing Adversary , 2021, ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[18] Pier Luigi Dragotti,et al. Smart Meter Privacy , 2020 .
[19] Deniz Gündüz,et al. The Best Defense Is a Good Offense: Adversarial Attacks to Avoid Modulation Detection , 2021, IEEE Transactions on Information Forensics and Security.
[20] Gerhard Wunder,et al. Deep Learning for the Gaussian Wiretap Channel , 2018, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[21] Stefano Ermon,et al. Neural Joint Source-Channel Coding , 2018, ICML.
[22] H. Vincent Poor,et al. An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications , 2021, IEEE Journal on Selected Areas in Information Theory.
[23] Eduard A. Jorswieck,et al. Wiretap Code Design by Neural Network Autoencoders , 2020, IEEE Transactions on Information Forensics and Security.