Lalitha Sankar

Orcid: 0000-0001-8122-5444

Affiliations:
  • Arizona State University, Tempe, Arizona, USA


According to our database1, Lalitha Sankar authored at least 137 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Operational Approach to Information Leakage via Generalized Gain Functions.
IEEE Trans. Inf. Theory, February, 2024

An Adversarial Approach to Evaluating the Robustness of Event Identification Models.
CoRR, 2024

Robustness to Subpopulation Shift with Domain Label Noise via Regularized Annotation of Domains.
CoRR, 2024

2023
Localization and Estimation of Unknown Forced Inputs: A Group LASSO Approach.
IEEE Trans. Control. Netw. Syst., December, 2023

PMU Tracker: A Visualization Platform for Epicentric Event Propagation Analysis in the Power Grid.
IEEE Trans. Vis. Comput. Graph., 2023

Addressing GAN Training Instabilities via Tunable Classification Losses.
CoRR, 2023

A Semi-Supervised Approach for Power System Event Identification.
CoRR, 2023

(α, β)-Leakage: A Unified Privacy Leakage Measure.
CoRR, 2023

Towards Addressing GAN Training Instabilities: Dual-objective GANs with Tunable Parameters.
CoRR, 2023

Parameter Optimization with Conscious Allocation (POCA).
Proceedings of the Winter Simulation Conference, 2023

(αD, αG)-GANs: Addressing GAN Training Instabilities via Dual Objectives.
Proceedings of the IEEE International Symposium on Information Theory, 2023

Schrödinger Mechanisms: Optimal Differential Privacy Mechanisms for Small Sensitivity.
Proceedings of the IEEE International Symposium on Information Theory, 2023

Optimal Multidimensional Differentially Private Mechanisms in the Large-Composition Regime.
Proceedings of the IEEE International Symposium on Information Theory, 2023

The Saddle-Point Method in Differential Privacy.
Proceedings of the International Conference on Machine Learning, 2023

Source Localization in Linear Dynamical Systems using Subspace Model Identification.
Proceedings of the IEEE Conference on Control Technology and Applications, 2023

Smoothly Giving up: Robustness for Simple Models.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2023

2022
A Tunable Loss Function for Robust Classification: Calibration, Landscape, and Generalization.
IEEE Trans. Inf. Theory, 2022

Generating Fair Universal Representations Using Adversarial Models.
IEEE Trans. Inf. Forensics Secur., 2022

Grid Topology Identification With Hidden Nodes via Structured Norm Minimization.
IEEE Control. Syst. Lett., 2022

Robust Model Selection of Non Tree-Structured Gaussian Graphical Models.
CoRR, 2022

The Saddle-Point Accountant for Differential Privacy.
CoRR, 2022

Parameter Estimation in Ill-conditioned Low-inertia Power Systems.
CoRR, 2022

AugLoss: A Learning Methodology for Real-World Dataset Corruption.
CoRR, 2022

A Machine Learning Framework for Event Identification via Modal Analysis of PMU Data.
CoRR, 2022

PMUVis : A Large-Scale Platform to Assist Power System Operators in a Smart Grid.
IEEE Computer Graphics and Applications, 2022

An Alphabet of Leakage Measures.
Proceedings of the IEEE Information Theory Workshop, 2022

α-GAN: Convergence and Estimation Guarantees.
Proceedings of the IEEE International Symposium on Information Theory, 2022

A Variational Formula for Infinity-Rényi Divergence with Applications to Information Leakage.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Cactus Mechanisms: Optimal Differential Privacy Mechanisms in the Large-Composition Regime.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Being Properly Improper.
Proceedings of the International Conference on Machine Learning, 2022

2021
Editorial.
IEEE J. Sel. Areas Inf. Theory, 2021

An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications.
IEEE J. Sel. Areas Inf. Theory, 2021

Three Variants of Differential Privacy: Lossless Conversion and Applications.
IEEE J. Sel. Areas Inf. Theory, 2021

Lower Bounds for the Minimum Mean-Square Error via Neural Network-based Estimation.
CoRR, 2021

Generation of Synthetic Multi-Resolution Time Series Load Data.
CoRR, 2021

Synthetic Time-Series Load Data via Conditional Generative Adversarial Networks.
CoRR, 2021

A Verifiable Framework for Cyber-Physical Attacks and Countermeasures in a Resilient Electric Power Grid.
CoRR, 2021

Realizing GANs via a Tunable Loss Function.
Proceedings of the IEEE Information Theory Workshop, 2021

Evaluating Multiple Guesses by an Adversary via a Tunable Loss Function.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Neural Network-based Estimation of the MMSE.
Proceedings of the IEEE International Symposium on Information Theory, 2021

2020
On the Robustness of Information-Theoretic Privacy Measures and Mechanisms.
IEEE Trans. Inf. Theory, 2020

On the alpha-loss Landscape in the Logistic Model.
CoRR, 2020

N-1 Reliability Makes It Difficult for False Data Injection Attacks to Cause Physical Consequences.
CoRR, 2020

Detecting Load Redistribution Attacks via Support Vector Models.
CoRR, 2020

Vulnerability Assessment of Large-scale Power Systems to False Data Injection Attacks.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

On the α-loss Landscape in the Logistic Model.
Proceedings of the IEEE International Symposium on Information Theory, 2020

A Better Bound Gives a Hundred Rounds: Enhanced Privacy Guarantees via f-Divergences.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Maximal α-Leakage and its Properties.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Tunable Measures for Information Leakage and Applications to Privacy-Utility Tradeoffs.
IEEE Trans. Inf. Theory, 2019

Detection and Localization of Load Redistribution Attacks on Large Scale Systems.
CoRR, 2019

Theoretical Guarantees for Model Auditing with Finite Adversaries.
CoRR, 2019

Learning Generative Adversarial RePresentations (GAP) under Fairness and Censoring Constraints.
CoRR, 2019

A Tunable Loss Function for Classification.
CoRR, 2019

Vulnerability Assessment of N-1 Reliable Power Systems to False Data Injection Attacks.
CoRR, 2019

Can Predictive Filters Detect Gradually Ramping False Data Injection Attacks Against PMUs?
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Tunable Loss Function for Binary Classification.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Robustness of Maximal α-Leakage to Side Information.
Proceedings of the IEEE International Symposium on Information Theory, 2019

2018
Hypothesis Testing Under Mutual Information Privacy Constraints in the High Privacy Regime.
IEEE Trans. Inf. Forensics Secur., 2018

Robust Privacy-Utility Tradeoffs Under Differential Privacy and Hamming Distortion.
IEEE Trans. Inf. Forensics Secur., 2018

Generative Adversarial Privacy.
CoRR, 2018

On the Contractivity of Privacy Mechanisms.
CoRR, 2018

Unobservable False Data Injection Attacks against PMUs: Feasible Conditions and Multiplicative Attacks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Privacy Under Hard Distortion Constraints.
Proceedings of the IEEE Information Theory Workshop, 2018

The Utility Cost of Robust Privacy Guarantees.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

A Tunable Measure for Information Leakage.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Impact of Privacy on Free Online Service Markets.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

Generative Adversarial Privacy: A Data-Driven Approach to Information-Theoretic Privacy.
Proceedings of the 52nd Asilomar Conference on Signals, Systems, and Computers, 2018

2017
Asymptotics and Non-Asymptotics for Universal Fixed-to-Variable Source Coding.
IEEE Trans. Inf. Theory, 2017

Privacy-Guaranteed Two-Agent Interactions Using Information-Theoretic Mechanisms.
IEEE Trans. Inf. Forensics Secur., 2017

Context-Aware Generative Adversarial Privacy.
Entropy, 2017

Information-Theoretic Privacy with General Distortion Constraints.
CoRR, 2017

Can Attackers with Limited Information Exploit Historical Data to Mount Successful False Data Injection Attacks on Power Systems?
CoRR, 2017

False data injection attacks on phasor measurements that bypass low-rank decomposition.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

Hypothesis testing under maximal leakage privacy constraints.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

On information-theoretic privacy with general distortion cost functions.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

2016
Physical System Consequences of Unobservable State-and-Topology Cyber-Physical Attacks.
IEEE Trans. Smart Grid, 2016

The Optimal Differential Privacy Mechanism under Hamming Distortion for Universal Memoryless Source Classes.
CoRR, 2016

Market Segmentation for Privacy Differentiated "Free" Services.
CoRR, 2016

Evaluating power system vulnerability to false data injection attacks via scalable optimization.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

Optimal differential privacy mechanisms under Hamming distortion for structured source classes.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Incentive mechanisms for privacy-sensitive electricity consumers with alternative energy sources.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

Hypothesis testing in the high privacy limit.
Proceedings of the 54th Annual Allerton Conference on Communication, 2016

On the fine asymptotics of information theoretic privacy.
Proceedings of the 54th Annual Allerton Conference on Communication, 2016

2015
Introduction to the Issue on Signal and Information Processing for Privacy.
IEEE J. Sel. Top. Signal Process., 2015

Enabling Data Exchange in Two-Agent Interactive Systems Under Privacy Constraints.
IEEE J. Sel. Top. Signal Process., 2015

Designing Incentive Schemes for Privacy-Sensitive Users.
J. Priv. Confidentiality, 2015

Implication of Unobservable State-and-topology Cyber-physical Attacks.
CoRR, 2015

Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation.
CoRR, 2015

Cluster-and-connect: A more realistic model for the electric power network topology.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Incentive Schemes for Privacy-Sensitive Consumers.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Information-theoretic private interactive mechanism.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

Cluster-and-Connect: An algorithmic approach to generating synthetic electric power network graphs.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

2014
Enabling Data Exchange in Interactive State Estimation under Privacy Constraints.
CoRR, 2014

New results on third-order coding rate for universal fixed-to-variable source coding.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

A rate-disortion perspective on local differential privacy.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

2013
Smart Meter Privacy: A Theoretical Framework.
IEEE Trans. Smart Grid, 2013

Discriminatory Lossy Source Coding: Side Information Privacy.
IEEE Trans. Inf. Theory, 2013

Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach.
IEEE Trans. Inf. Forensics Secur., 2013

The Role of Signal Processing in Meeting Privacy Challenges: An Overview.
IEEE Signal Process. Mag., 2013

Signal Processing for Cybersecurity and Privacy [From the Guest Editors].
IEEE Signal Process. Mag., 2013

Universal fixed-to-variable source coding in the finite blocklength regime.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Competitive privacy: Distributed computation with privacy guarantees.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

2012
Repeated games for privacy-aware distributed state estimation in interconnected networks.
Proceedings of the 6th International Conference on Network Games, 2012

Distributed estimation in multi-agent networks.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Pricing mechanisms for cooperative state estimation.
Proceedings of the 5th International Symposium on Communications, 2012

Twitter vs. printed English: An information-theoretic comparison.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Competitive privacy in the smart grid.
Proceedings of the Conference Record of the Forty Sixth Asilomar Conference on Signals, 2012

Session TA4b: Signal processing for cyber-security and privacy in networks (invited).
Proceedings of the Conference Record of the Forty Sixth Asilomar Conference on Signals, 2012

2011
Ergodic Fading Interference Channels: Sum-Capacity and Separability.
IEEE Trans. Inf. Theory, 2011

Fading Multiple Access Relay Channels: Achievable Rates and Opportunistic Scheduling.
IEEE Trans. Inf. Theory, 2011

Dedicated-Relay vs. User Cooperation in Time-Duplexed Multiaccess Networks.
J. Commun., 2011

A Theory of Privacy and Utility in Databases
CoRR, 2011

Competitive privacy in the smart grid: An information-theoretic approach.
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011

Smart meter privacy: A utility-privacy framework.
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011

Multi-user privacy: The Gray-Wyner system and generalized common information.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

2010
A General Coding Scheme for Two-User Fading Interference Channels
CoRR, 2010

Utility and privacy of data sources: Can Shannon help conceal and reveal information?
Proceedings of the Information Theory and Applications Workshop, 2010

A theory of utility and privacy of data sources.
Proceedings of the IEEE International Symposium on Information Theory, 2010

An information-theoretic approach to privacy.
Proceedings of the 48th Annual Allerton Conference on Communication, 2010

2009
On the sum-capacity of degraded Gaussian multiple-access relay channels.
IEEE Trans. Inf. Theory, 2009

Secrecy Capacity of a Class of Orthogonal Relay Eavesdropper Channels.
EURASIP J. Wirel. Commun. Netw., 2009

Frequency of Occurrence and Information Entropy of American Sign Language
CoRR, 2009

Ergodic Layered Erasure One-Sided Interference Channels
CoRR, 2009

Opportunistic Communications in Fading Multiaccess Relay Channels
CoRR, 2009

Information secrecy from multiple eavesdroppers in orthogonal relay channels.
Proceedings of the IEEE International Symposium on Information Theory, 2009

K-user fading interference channels: The ergodic very strong case.
Proceedings of the 47th Annual Allerton Conference on Communication, 2009

2008
Coalitions in Cooperative Wireless Networks.
IEEE J. Sel. Areas Commun., 2008

Relay vs. User Cooperation in Time-Duplexed Multiaccess Networks
CoRR, 2008

On the Sum-Capacity of Degraded Gaussian Multiaccess Relay Channels
CoRR, 2008

Sum-capacity of ergodic fading interference and compound multiaccess channels.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Ergodic two-user interference channels: Is separability optimal?
Proceedings of the 46th Annual Allerton Conference on Communication, 2008

2007
Offset Encoding for Multiple-Access Relay Channels.
IEEE Trans. Inf. Theory, 2007

Opportunistic Communications in an Orthogonal Multiaccess Relay Channel.
Proceedings of the IEEE International Symposium on Information Theory, 2007

2006
Coalitional Games in Gaussian Interference Channels.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Coalitional Games in Receiver Cooperation for Spectrum Sharing.
Proceedings of the 40th Annual Conference on Information Sciences and Systems, 2006

2005
Cooperation vs. hierarchy: an information-theoretic comparison.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

2004
Hierarchical sensor networks: capacity bounds and cooperative strategies using the multiple-access relay channel model.
Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004


  Loading...