Oliver Kosut

Orcid: 0000-0003-4779-0102

According to our database1, Oliver Kosut authored at least 101 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Operational Approach to Information Leakage via Generalized Gain Functions.
IEEE Trans. Inf. Theory, February, 2024

Identifying Edge Changes in Networks From Input and Output Covariance Data.
IEEE Control. Syst. Lett., 2024

An Adversarial Approach to Evaluating the Robustness of Event Identification Models.
CoRR, 2024

Nobody Expects a Differential Equation: Minimum Energy-Per-Bit for the Gaussian Relay Channel with Rank-1 Linear Relaying.
CoRR, 2024

2023
Localization and Estimation of Unknown Forced Inputs: A Group LASSO Approach.
IEEE Trans. Control. Netw. Syst., December, 2023

Keyless Authentication for AWGN Channels.
IEEE Trans. Inf. Theory, 2023

A Semi-Supervised Approach for Power System Event Identification.
CoRR, 2023

(α, β)-Leakage: A Unified Privacy Leakage Measure.
CoRR, 2023

Identification Codes: A Topical Review With Design Guidelines for Practical Systems.
IEEE Access, 2023

Perfect vs. Independent Feedback in the Multiple-Access Channel.
Proceedings of the IEEE International Symposium on Information Theory, 2023

On Authentication against a Myopic Adversary using Stochastic Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2023

Schrödinger Mechanisms: Optimal Differential Privacy Mechanisms for Small Sensitivity.
Proceedings of the IEEE International Symposium on Information Theory, 2023

Optimal Multidimensional Differentially Private Mechanisms in the Large-Composition Regime.
Proceedings of the IEEE International Symposium on Information Theory, 2023

The Saddle-Point Method in Differential Privacy.
Proceedings of the International Conference on Machine Learning, 2023

Source Localization in Linear Dynamical Systems using Subspace Model Identification.
Proceedings of the IEEE Conference on Control Technology and Applications, 2023

2022
A Second-Order Converse Bound for the Multiple-Access Channel via Wringing Dependence.
IEEE Trans. Inf. Theory, 2022

Grid Topology Identification With Hidden Nodes via Structured Norm Minimization.
IEEE Control. Syst. Lett., 2022

Robust Model Selection of Non Tree-Structured Gaussian Graphical Models.
CoRR, 2022

The Saddle-Point Accountant for Differential Privacy.
CoRR, 2022

Parameter Estimation in Ill-conditioned Low-inertia Power Systems.
CoRR, 2022

A Machine Learning Framework for Event Identification via Modal Analysis of PMU Data.
CoRR, 2022

An Alphabet of Leakage Measures.
Proceedings of the IEEE Information Theory Workshop, 2022

A Variational Formula for Infinity-Rényi Divergence with Applications to Information Leakage.
Proceedings of the IEEE International Symposium on Information Theory, 2022

On the Benefit of Cooperation in Relay Networks.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Cactus Mechanisms: Optimal Differential Privacy Mechanisms in the Large-Composition Regime.
Proceedings of the IEEE International Symposium on Information Theory, 2022

2021
Three Variants of Differential Privacy: Lossless Conversion and Applications.
IEEE J. Sel. Areas Inf. Theory, 2021

Generation of Synthetic Multi-Resolution Time Series Load Data.
CoRR, 2021

Synthetic Time-Series Load Data via Conditional Generative Adversarial Networks.
CoRR, 2021

A Verifiable Framework for Cyber-Physical Attacks and Countermeasures in a Resilient Electric Power Grid.
CoRR, 2021

A Wringing-Based Proof of a Second-Order Converse for the Multiple-Access Channel under Maximal Error Probability.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Evaluating Multiple Guesses by an Adversary via a Tunable Loss Function.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Every Bit Counts: Second-Order Analysis of Cooperation in the Multiple-Access Channel.
Proceedings of the IEEE International Symposium on Information Theory, 2021

2020
N-1 Reliability Makes It Difficult for False Data Injection Attacks to Cause Physical Consequences.
CoRR, 2020

Detecting Load Redistribution Attacks via Support Vector Models.
CoRR, 2020

Vulnerability Assessment of Large-scale Power Systems to False Data Injection Attacks.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Capacity Region of the Gaussian Arbitrarily-Varying Broadcast Channel.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Authentication with Mildly Myopic Adversaries.
Proceedings of the IEEE International Symposium on Information Theory, 2020

A Better Bound Gives a Hundred Rounds: Enhanced Privacy Guarantees via f-Divergences.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Maximal α-Leakage and its Properties.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Authentication and Partial Message Correction over Adversarial Multiple-Access Channels.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Tunable Measures for Information Leakage and Applications to Privacy-Utility Tradeoffs.
IEEE Trans. Inf. Theory, 2019

Strong Converses are Just Edge Removal Properties.
IEEE Trans. Inf. Theory, 2019

Corrections to "Fine Asymptotics for Universal One-to-One Compression of Parametric Sources".
IEEE Trans. Inf. Theory, 2019

Fine Asymptotics for Universal One-to-One Compression of Parametric Sources.
IEEE Trans. Inf. Theory, 2019

List-Decoding Capacity of the Gaussian Arbitrarily-Varying Channel.
Entropy, 2019

Detection and Localization of Load Redistribution Attacks on Large Scale Systems.
CoRR, 2019

Vulnerability Assessment of N-1 Reliable Power Systems to False Data Injection Attacks.
CoRR, 2019

Can Predictive Filters Detect Gradually Ramping False Data Injection Attacks Against PMUs?
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Robustness of Maximal α-Leakage to Side Information.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Structured Coding for Authentication in the Presence of a Malicious Adversary.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Authentication Against a Myopic Adversary.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Capacity of Gaussian Arbitrarily-Varying Fading Channels.
Proceedings of the 53rd Annual Conference on Information Sciences and Systems, 2019

2018
Variable Packet-Error Coding.
IEEE Trans. Inf. Theory, 2018

Unobservable False Data Injection Attacks against PMUs: Feasible Conditions and Multiplicative Attacks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Privacy Under Hard Distortion Constraints.
Proceedings of the IEEE Information Theory Workshop, 2018

Authentication Capacity of Adversarial Channels.
Proceedings of the IEEE Information Theory Workshop, 2018

A Tunable Measure for Information Leakage.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Finite Blocklength and Dispersion Bounds for the Arbitrarily- Varying Channel.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Capacity of the Gaussian Arbitrarily-Varying Channel with List Decoding.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

2017
Asymptotics and Non-Asymptotics for Universal Fixed-to-Variable Source Coding.
IEEE Trans. Inf. Theory, 2017

Equivalence for Networks With Adversarial State.
IEEE Trans. Inf. Theory, 2017

The Gaussian Interference Channel in the Presence of Malicious Jammers.
CoRR, 2017

Information-Theoretic Privacy with General Distortion Constraints.
CoRR, 2017

Can Attackers with Limited Information Exploit Historical Data to Mount Successful False Data Injection Attacks on Power Systems?
CoRR, 2017

False data injection attacks on phasor measurements that bypass low-rank decomposition.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

Dispersion of the discrete arbitrarily-varying channel with limited shared randomness.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

On information-theoretic privacy with general distortion cost functions.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Universal coding with point type classes.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

Fundamental limits of universal variable-to-fixed length coding of parametric sources.
Proceedings of the 55th Annual Allerton Conference on Communication, 2017

2016
Maximum Distortion Attacks in Electricity Grids.
IEEE Trans. Smart Grid, 2016

Decentralized MMSE attacks in electricity grids.
Proceedings of the IEEE Statistical Signal Processing Workshop, 2016

Evaluating power system vulnerability to false data injection attacks via scalable optimization.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

Network equivalence for a joint compound-arbitrarily-varying network model.
Proceedings of the 2016 IEEE Information Theory Workshop, 2016

Arbitrarily varying networks: Capacity-achieving computationally efficient codes.
Proceedings of the IEEE International Symposium on Information Theory, 2016

On the relationship between edge removal and strong converses.
Proceedings of the IEEE International Symposium on Information Theory, 2016

A new Type Size code for universal one-to-one compression of parametric sources.
Proceedings of the IEEE International Symposium on Information Theory, 2016

On the fine asymptotics of information theoretic privacy.
Proceedings of the 54th Annual Allerton Conference on Communication, 2016

The Gaussian interference channel in the presence of a malicious jammer.
Proceedings of the 54th Annual Allerton Conference on Communication, 2016

2015
Sampling From Gaussian Markov Random Fields Using Stationary and Non-Stationary Subgraph Perturbations.
IEEE Trans. Signal Process., 2015

Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation.
CoRR, 2015

Boosting output distributions in finite blocklength channel coding converse bounds.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

Third-order coding rate for universal compression of Markov sources.
Proceedings of the IEEE International Symposium on Information Theory, 2015

2014
On the Dispersions of Three Network Information Theory Problems.
IEEE Trans. Inf. Theory, 2014

Polytope Codes Against Adversaries in Networks.
IEEE Trans. Inf. Theory, 2014

On generalized active attacks by causal adversaries in networks.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

New results on third-order coding rate for universal fixed-to-variable source coding.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Max-flow min-cut for power system security index computation.
Proceedings of the IEEE 8th Sensor Array and Multichannel Signal Processing Workshop, 2014

2013
Sampling from Gaussian graphical models using subgraph perturbations.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Universal fixed-to-variable source coding in the finite blocklength regime.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Polytope codes for distributed storage in the presence of an active omniscient adversary.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Malicious data attacks against dynamic state estimation in the presence of random noise.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

2012
The dispersion of Slepian-Wolf coding.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

2011
Malicious Data Attacks on the Smart Grid.
IEEE Trans. Smart Grid, 2011

2010
Limiting false data attacks on power system state estimation.
Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010

2009
The quadratic Gaussian CEO problem with byzantine agents.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Nonlinear network coding is necessary to combat general Byzantine attacks.
Proceedings of the 47th Annual Allerton Conference on Communication, 2009

2008
Distributed Source Coding in the Presence of Byzantine Sensors.
IEEE Trans. Inf. Theory, 2008

The Byzantine CEO Problem.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

A characterization of the error exponent for the Byzantine CEO problem.
Proceedings of the 46th Annual Allerton Conference on Communication, 2008

2007
Variable-Rate Distributed Source Coding in the Presence of Byzantine Sensors.
Proceedings of the IEEE International Symposium on Information Theory, 2007

2006
Capacity of Cooperative Fusion in the Presence of Byzantine Sensors
CoRR, 2006


  Loading...