Shantanu Rane

According to our database1, Shantanu Rane authored at least 66 papers between 2001 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
SCIBORG: Secure Configurations for the IoT Based on optimization and Reasoning on Graphs.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Secure Two-Party Feature Selection.
CoRR, 2019

A Version Space Perspective on Differentially Private Pool-Based Active Learning.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019

2017
Achieving Differential Privacy in Secure Multiparty Data Aggregation Protocols on Star Networks.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
Matrix Factorization-based clustering of image features for bandwidth-constrained information retrieval.
Proceedings of the 2016 IEEE International Conference on Multimedia & Expo Workshops, 2016

2015
Representation and Coding of Signal Geometry.
CoRR, 2015

Privacy, efficiency & fault tolerance in aggregate computations on massive star networks.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

2014
Standardization of Biometric Template Protection.
IEEE Multim., 2014

Secure Two-Party Sampling Primitives are either Useless or Complete.
CoRR, 2014

A fuzzy commitment approach to privacy preserving behavioral targeting.
Proceedings of the ACM MobiCom Workshop on Security and Privacy in Mobile Environments, 2014

An elementary completeness proof for secure two-party computation primitives.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

Video querying via compact descriptors of visually salient objects.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

A vanishing point-based global descriptor for Manhattan scenes.
Proceedings of the IEEE International Conference on Acoustics, 2014

Privacy Preserving Data Quality Assessment for High-Fidelity Data Sharing.
Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, 2014

2013
Secure Biometrics: Concepts, Authentication Architectures, and Challenges.
IEEE Signal Process. Mag., 2013

Privacy-Preserving Nearest Neighbor Methods: Comparing Signals Without Revealing Them.
IEEE Signal Process. Mag., 2013

Privacy-Preserving Speech Processing: Cryptographic and String-Matching Frameworks Show Promise.
IEEE Signal Process. Mag., 2013

Introduction to the Special Issue on "Recent advances on analysis and processing for distributed video systems".
J. Vis. Commun. Image Represent., 2013

On the Benefits of Sampling in Privacy Preserving Statistical Analysis on Distributed Databases
CoRR, 2013

Information-theoretically secure three-party computation with One corrupted party.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

A keypoint descriptor for alignment-free fingerprint matching.
Proceedings of the IEEE International Conference on Acoustics, 2013

On unconditionally secure multiparty computation for realizing correlated equilibria in games.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

Embedding-based representation of signal distances.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

Efficient Coding of Signal Distances Using Universal Quantized Embeddings.
Proceedings of the 2013 Data Compression Conference, 2013

2012
A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems.
IEEE Trans. Inf. Forensics Secur., 2012

Information-Theoretically Secure Three-Party Computation with One Active Adversary
CoRR, 2012

A framework for privacy preserving statistical analysis on distributed databases.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Quantized embeddings of scale-invariant image features for mobile augmented reality.
Proceedings of the 14th IEEE International Workshop on Multimedia Signal Processing, 2012

A Distance-Sensitive Attribute Based Cryptosystem for Privacy-Preserving Querying.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo, 2012

An attribute-based framework for privacy preserving image querying.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

2011
Secure binary embeddings for privacy preserving nearest neighbors.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

An information-theoretic analysis of revocability and reusability in secure biometrics.
Proceedings of the Information Theory and Applications Workshop, 2011

Distributed compression of zerotrees of wavelet coefficients.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

Privacy preserving probabilistic inference with Hidden Markov Models.
Proceedings of the IEEE International Conference on Acoustics, 2011

2010
On Unconditionally Secure Computation with Vanishing Communication Cost
CoRR, 2010

Privacy preserving string comparisons based on Levenshtein distance.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Wyner-Ziv coding of multispectral images for space and airborne platforms.
Proceedings of the Picture Coding Symposium, 2010

Multiparty Differential Privacy via Aggregation of Locally Trained Classifiers.
Proceedings of the Advances in Neural Information Processing Systems 23: 24th Annual Conference on Neural Information Processing Systems 2010. Proceedings of a meeting held 6-9 December 2010, 2010

Toward realtime side information decoding on multi-core processors.
Proceedings of the 2010 IEEE International Workshop on Multimedia Signal Processing, 2010

Alignment and bit extraction for secure fingerprint biometrics.
Proceedings of the Media Forensics and Security II, 2010

Privacy-preserving approximation of L1 distance for multimedia applications.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

Privacy and security of features extracted from minutiae aggregates.
Proceedings of the IEEE International Conference on Acoustics, 2010

Hiding information inside structured shapes.
Proceedings of the IEEE International Conference on Acoustics, 2010

2009
Corrections to "Systematic Lossy Error Protection of Video Signals".
IEEE Trans. Circuits Syst. Video Technol., 2009

Leveraging reliable bits: ECC design considerations for practical secure biometric systems.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Secure distortion computation among untrusting parties using homomorphic encryption.
Proceedings of the International Conference on Image Processing, 2009

Data hiding in hard-copy text documents robust to print, scan and photocopy operations.
Proceedings of the IEEE International Conference on Acoustics, 2009

2008
Systematic Lossy Error Protection of Video Signals.
IEEE Trans. Circuits Syst. Video Technol., 2008

Feature extraction for a Slepian-Wolf biometric system using LDPC codes.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Feature transformation of biometric templates for secure biometric systems based on error correcting codes.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2008

2007
Robust Low-Delay Video Transmission using H.264/AVC Redundant Slices and Flexible Macroblock Ordering.
Proceedings of the International Conference on Image Processing, 2007

High-Rate Analysis of Systematic Lossy Error Protection of a Predictively Encoded Source.
Proceedings of the 2007 Data Compression Conference (DCC 2007), 2007

2006
High-rate quantization and transform coding with side information at the decoder.
Signal Process., 2006

2005
Distributed Video Coding.
Proc. IEEE, 2005

Error-resilient video transmission using multiple embedded Wyner-Ziv descriptions.
Proceedings of the 2005 International Conference on Image Processing, 2005

Systematic lossy error protection versus layered coding with unequal error protection.
Proceedings of the Electronic Imaging: Image and Video Communications and Processing 2005, 2005

2004
Systematic lossy forward error protection for error-resilient digital video broadcasting.
Proceedings of the Visual Communications and Image Processing 2004, 2004

Transform-domain Wyner-Ziv codec for video.
Proceedings of the Visual Communications and Image Processing 2004, 2004

Systematic lossy forward error protection for error-resilient digital video broadcasting -a wyner-ziv coding approach.
Proceedings of the 2004 International Conference on Image Processing, 2004

Wyner-ziv video coding with hash-based motion compensation at the receiver.
Proceedings of the 2004 International Conference on Image Processing, 2004

2003
Structure and texture filling-in of missing image blocks in wireless transmission and compression applications.
IEEE Trans. Image Process., 2003

Systematic lossy forward error protection for video waveforms.
Proceedings of the 2003 International Conference on Image Processing, 2003

Wyner-Ziv Coding for Video: Applications to Compression and Error Resilience.
Proceedings of the 2003 Data Compression Conference (DCC 2003), 2003

2002
Wavelet-domain reconstruction of lost blocks in wireless image transmission and packet-switched networks.
Proceedings of the 2002 International Conference on Image Processing, 2002

Structure and texture filling-in of missing image blocks in wireless transmission and compression.
Proceedings of the 2002 International Conference on Image Processing, 2002

2001
Evaluation of JPEG-LS, the new lossless and controlled-lossy still image compression standard, for compression of high-resolution elevation data.
IEEE Trans. Geosci. Remote. Sens., 2001


  Loading...