Oliver Kosut

According to our database1, Oliver Kosut authored at least 69 papers between 2006 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Three Variants of Differential Privacy: Lossless Conversion and Applications.
CoRR, 2020

A Second-Order Converse Bound for the Multiple-Access Channel via Wringing Dependence.
CoRR, 2020

N-1 Reliability Makes It Difficult for False Data Injection Attacks to Cause Physical Consequences.
CoRR, 2020

Detecting Load Redistribution Attacks via Support Vector Models.
CoRR, 2020

Capacity Region of the Gaussian Arbitrarily-Varying Broadcast Channel.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Authentication with Mildly Myopic Adversaries.
Proceedings of the IEEE International Symposium on Information Theory, 2020

A Better Bound Gives a Hundred Rounds: Enhanced Privacy Guarantees via f-Divergences.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Maximal α-Leakage and its Properties.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Authentication and Partial Message Correction over Adversarial Multiple-Access Channels.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Tunable Measures for Information Leakage and Applications to Privacy-Utility Tradeoffs.
IEEE Trans. Inf. Theory, 2019

Strong Converses are Just Edge Removal Properties.
IEEE Trans. Inf. Theory, 2019

Corrections to "Fine Asymptotics for Universal One-to-One Compression of Parametric Sources".
IEEE Trans. Inf. Theory, 2019

Fine Asymptotics for Universal One-to-One Compression of Parametric Sources.
IEEE Trans. Inf. Theory, 2019

List-Decoding Capacity of the Gaussian Arbitrarily-Varying Channel.
Entropy, 2019

Detection and Localization of Load Redistribution Attacks on Large Scale Systems.
CoRR, 2019

Vulnerability Assessment of N-1 Reliable Power Systems to False Data Injection Attacks.
CoRR, 2019

Can Predictive Filters Detect Gradually Ramping False Data Injection Attacks Against PMUs?
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Robustness of Maximal α-Leakage to Side Information.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Structured Coding for Authentication in the Presence of a Malicious Adversary.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Authentication Against a Myopic Adversary.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Capacity of Gaussian Arbitrarily-Varying Fading Channels.
Proceedings of the 53rd Annual Conference on Information Sciences and Systems, 2019

2018
Variable Packet-Error Coding.
IEEE Trans. Inf. Theory, 2018

Unobservable False Data Injection Attacks against PMUs: Feasible Conditions and Multiplicative Attacks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Privacy Under Hard Distortion Constraints.
Proceedings of the IEEE Information Theory Workshop, 2018

Authentication Capacity of Adversarial Channels.
Proceedings of the IEEE Information Theory Workshop, 2018

A Tunable Measure for Information Leakage.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Finite Blocklength and Dispersion Bounds for the Arbitrarily- Varying Channel.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Capacity of the Gaussian Arbitrarily-Varying Channel with List Decoding.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

2017
Asymptotics and Non-Asymptotics for Universal Fixed-to-Variable Source Coding.
IEEE Trans. Inf. Theory, 2017

Equivalence for Networks With Adversarial State.
IEEE Trans. Inf. Theory, 2017

The Gaussian Interference Channel in the Presence of Malicious Jammers.
CoRR, 2017

Information-Theoretic Privacy with General Distortion Constraints.
CoRR, 2017

Can Attackers with Limited Information Exploit Historical Data to Mount Successful False Data Injection Attacks on Power Systems?
CoRR, 2017

Vulnerability Assessment of Large-scale Power Systems to False Data Injection Attacks.
CoRR, 2017

False data injection attacks on phasor measurements that bypass low-rank decomposition.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

Dispersion of the discrete arbitrarily-varying channel with limited shared randomness.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

On information-theoretic privacy with general distortion cost functions.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Universal coding with point type classes.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

Fundamental limits of universal variable-to-fixed length coding of parametric sources.
Proceedings of the 55th Annual Allerton Conference on Communication, 2017

2016
Maximum Distortion Attacks in Electricity Grids.
IEEE Trans. Smart Grid, 2016

Decentralized MMSE attacks in electricity grids.
Proceedings of the IEEE Statistical Signal Processing Workshop, 2016

Evaluating power system vulnerability to false data injection attacks via scalable optimization.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

Network equivalence for a joint compound-arbitrarily-varying network model.
Proceedings of the 2016 IEEE Information Theory Workshop, 2016

Arbitrarily varying networks: Capacity-achieving computationally efficient codes.
Proceedings of the IEEE International Symposium on Information Theory, 2016

On the relationship between edge removal and strong converses.
Proceedings of the IEEE International Symposium on Information Theory, 2016

A new Type Size code for universal one-to-one compression of parametric sources.
Proceedings of the IEEE International Symposium on Information Theory, 2016

On the fine asymptotics of information theoretic privacy.
Proceedings of the 54th Annual Allerton Conference on Communication, 2016

The Gaussian interference channel in the presence of a malicious jammer.
Proceedings of the 54th Annual Allerton Conference on Communication, 2016

2015
Sampling From Gaussian Markov Random Fields Using Stationary and Non-Stationary Subgraph Perturbations.
IEEE Trans. Signal Process., 2015

Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation.
CoRR, 2015

Boosting output distributions in finite blocklength channel coding converse bounds.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

Third-order coding rate for universal compression of Markov sources.
Proceedings of the IEEE International Symposium on Information Theory, 2015

2014
On the Dispersions of Three Network Information Theory Problems.
IEEE Trans. Inf. Theory, 2014

Polytope Codes Against Adversaries in Networks.
IEEE Trans. Inf. Theory, 2014

On generalized active attacks by causal adversaries in networks.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

New results on third-order coding rate for universal fixed-to-variable source coding.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Max-flow min-cut for power system security index computation.
Proceedings of the IEEE 8th Sensor Array and Multichannel Signal Processing Workshop, 2014

2013
Sampling from Gaussian graphical models using subgraph perturbations.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Universal fixed-to-variable source coding in the finite blocklength regime.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Polytope codes for distributed storage in the presence of an active omniscient adversary.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Malicious data attacks against dynamic state estimation in the presence of random noise.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

2012
The dispersion of Slepian-Wolf coding.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

2011
Malicious Data Attacks on the Smart Grid.
IEEE Trans. Smart Grid, 2011

2010
Limiting false data attacks on power system state estimation.
Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010

2009
The quadratic Gaussian CEO problem with byzantine agents.
Proceedings of the IEEE International Symposium on Information Theory, 2009

2008
Distributed Source Coding in the Presence of Byzantine Sensors.
IEEE Trans. Inf. Theory, 2008

The Byzantine CEO Problem.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

2007
Variable-Rate Distributed Source Coding in the Presence of Byzantine Sensors.
Proceedings of the IEEE International Symposium on Information Theory, 2007

2006
Capacity of Cooperative Fusion in the Presence of Byzantine Sensors
CoRR, 2006


  Loading...