Channel Leakage, Information-Theoretic Limitations of Obfuscation, and Optimal Privacy Mask Design for Streaming Data
暂无分享,去创建一个
[1] Andrea Goldsmith,et al. Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).
[2] H. Vincent Poor,et al. Smart Meter Privacy: A Theoretical Framework , 2013, IEEE Transactions on Smart Grid.
[3] Pedro M. Crespo,et al. Asymptotically Equivalent Sequences of Matrices and Hermitian Block Toeplitz Matrices With Continuous Symbols: Applications to MIMO Systems , 2008, IEEE Transactions on Information Theory.
[4] Athanasios Papoulis,et al. Probability, Random Variables and Stochastic Processes , 1965 .
[5] Quanyan Zhu,et al. Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning , 2017, IEEE Transactions on Information Forensics and Security.
[6] Ali Makhdoumi,et al. Privacy-utility tradeoff under statistical uncertainty , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[7] Jerome Le Ny,et al. Differential Privacy for Dynamic Data , 2020 .
[8] Minghui Zhu,et al. A control-theoretic perspective on cyber-physical privacy: Where data privacy meets dynamic systems , 2019, Annu. Rev. Control..
[9] George J. Pappas,et al. Privacy in Control and Dynamical Systems , 2018 .
[10] H. Vincent Poor,et al. Competitive privacy in the smart grid: An information-theoretic approach , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[11] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[12] Parv Venkitasubramaniam,et al. Information-Theoretic Security in Stochastic Control Systems , 2015, Proceedings of the IEEE.
[13] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[14] David Tse,et al. Fundamentals of Wireless Communication , 2005 .
[15] Josep Domingo-Ferrer,et al. From t-Closeness-Like Privacy to Postrandomization via Information Theory , 2010, IEEE Transactions on Knowledge and Data Engineering.
[16] Karl Henrik Johansson,et al. Information-theoretic approaches to privacy in estimation and control , 2019, Annu. Rev. Control..
[17] Ufuk Topcu,et al. Event-based information-theoretic privacy: A case study of smart meters , 2016, 2016 American Control Conference (ACC).
[18] Karl Henrik Johansson,et al. Directed information and privacy loss in cloud-based control , 2017, 2017 American Control Conference (ACC).
[19] Holger Boche,et al. Information Theoretic Security and Privacy of Information Systems , 2017 .
[20] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[21] Flávio du Pin Calmon,et al. Privacy against statistical inference , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[22] H. Vincent Poor,et al. Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach , 2011, IEEE Transactions on Information Forensics and Security.
[23] Abbas El Gamal,et al. Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).
[24] Quanyan Zhu,et al. Generic Variance Bounds on Estimation and Prediction Errors in Time Series Analysis: An Entropy Perspective , 2019, 2019 IEEE Information Theory Workshop (ITW).
[25] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .