暂无分享,去创建一个
[1] Ufuk Topcu,et al. Event-based information-theoretic privacy: A case study of smart meters , 2016, 2016 American Control Conference (ACC).
[2] Ruoheng Liu,et al. Securing Wireless Communications at the Physical Layer , 2014 .
[3] Jerome Le Ny,et al. Differential Privacy for Dynamic Data , 2020 .
[4] Karl Henrik Johansson,et al. Directed information and privacy loss in cloud-based control , 2017, 2017 American Control Conference (ACC).
[5] Minghui Zhu,et al. A control-theoretic perspective on cyber-physical privacy: Where data privacy meets dynamic systems , 2019, Annu. Rev. Control..
[6] George J. Pappas,et al. Privacy in Control and Dynamical Systems , 2018 .
[7] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[8] Jie Chen,et al. Towards Integrating Control and Information Theories , 2017 .
[9] Thomas M. Cover,et al. Network Information Theory , 2001 .
[10] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[11] Pedro M. Crespo,et al. Asymptotically Equivalent Sequences of Matrices and Hermitian Block Toeplitz Matrices With Continuous Symbols: Applications to MIMO Systems , 2008, IEEE Transactions on Information Theory.
[12] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[13] Quanyan Zhu,et al. Generic Variance Bounds on Estimation and Prediction Errors in Time Series Analysis: An Entropy Perspective , 2019, 2019 IEEE Information Theory Workshop (ITW).
[14] H. Vincent Poor,et al. Competitive privacy in the smart grid: An information-theoretic approach , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[15] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[16] John G. Proakis,et al. Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..
[17] U. Grenander,et al. Toeplitz Forms And Their Applications , 1958 .
[18] Paul Cuff,et al. Information Theoretic Security and Privacy of Information Systems , 2016 .
[19] Raymond W. Yeung,et al. Information Theory and Network Coding , 2008 .
[20] Parv Venkitasubramaniam,et al. Information-Theoretic Security in Stochastic Control Systems , 2015, Proceedings of the IEEE.
[21] Carles Padró,et al. Information Theoretic Security , 2013, Lecture Notes in Computer Science.