Topological and Algebraic Properties for Classifying Unrooted Gaussian Trees under Privacy Constraints
暂无分享,去创建一个
George T. Amariucai | Shuangqing Wei | Jing Deng | Ali Moharrer | G. Amariucai | Shuangqing Wei | Jing Deng | A. Moharrer
[1] Sanjay Chaudhuri,et al. Qualitative inequalities for squared partial correlations of a Gaussian random vector , 2015, 1503.03879.
[2] Kamal Lochan Patra,et al. The effect on the algebraic connectivity of a tree by grafting or collapsing of edges , 2008 .
[3] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[4] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[5] Seth Sullivant,et al. Algebraic geometry of Gaussian Bayesian networks , 2007, Adv. Appl. Math..
[6] David Eisenstat,et al. Non-isomorphic caterpillars with identical subtree data , 2006, Discret. Math..
[7] Yury Polyanskiy,et al. Algebraic methods of classifying directed graphical models , 2014, 2014 IEEE International Symposium on Information Theory.
[8] George T. Amariucai,et al. Evaluation of security robustness against information leakage in Gaussian polytree graphical models , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).
[9] W. Trotter,et al. Combinatorics and Partially Ordered Sets: Dimension Theory , 1992 .
[10] Rudolf Ahlswede,et al. Common Randomness in Information Theory and Cryptography - Part II: CR Capacity , 1998, IEEE Trans. Inf. Theory.
[11] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[12] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[13] George T. Amariucai,et al. Classifying Unrooted Gaussian Trees under Privacy Constraints , 2015, ArXiv.
[14] Gary Gordon,et al. Tutte polynomials for trees , 1991, J. Graph Theory.