3.8 Proceedings Paper

Information Leakage in Zero-Error Source Coding: A Graph-Theoretic Perspective

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Privacy in Index Coding: k-Limited-Access Schemes

Mohammed Karmoose et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2020)

Proceedings Paper Computer Science, Theory & Methods

Weakly Private Information Retrieval Under the Maximal Leakage Metric

Ruida Zhou et al.

2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT) (2020)

Proceedings Paper Computer Science, Theory & Methods

Privacy-Utility Tradeoff in a Guessing Framework Inspired by Index Coding

Yucheng Liu et al.

2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT) (2020)

Article Computer Science, Information Systems

Tunable Measures for Information Leakage and Applications to Privacy-Utility Tradeoffs

Jiachun Liao et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2019)

Proceedings Paper Computer Science, Information Systems

Learning and Adaptive Data Analysis via Maximal Leakage

Amedeo Roberto Esposito et al.

2019 IEEE INFORMATION THEORY WORKSHOP (ITW) (2019)

Article Computer Science, Interdisciplinary Applications

Fundamentals of Index Coding

Fatemeh Arbabjolfaei et al.

FOUNDATIONS AND TRENDS IN COMMUNICATIONS AND INFORMATION THEORY (2018)

Article Computer Science, Information Systems

Measuring Secrecy by the Probability of a Successful Guess

Ibrahim Issa et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2017)

Article Computer Science, Information Systems

A Large Deviations Approach to Secure Lossy Compression

Nir Weinberger et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2017)

Article Computer Science, Information Systems

The Henchman Problem: Measuring Secrecy by the Minimum Distortion in a List

Curt Schieler et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2016)

Proceedings Paper Computer Science, Theory & Methods

Recent Developments in Quantitative Information Flow

Geoffrey Smith

2015 30TH ANNUAL ACM/IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE (LICS) (2015)

Article Computer Science, Information Systems

Rate-Distortion Theory for Secrecy Systems

Curt Schieler et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2014)

Proceedings Paper Computer Science, Theory & Methods

Additive and multiplicative notions of leakage, and their capacities

Mario S. Alvim et al.

2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF) (2014)

Article Computer Science, Theory & Methods

Min-entropy as a resource

Barbara Espinoza et al.

INFORMATION AND COMPUTATION (2013)

Proceedings Paper Computer Science, Theory & Methods

Measuring Information Leakage using Generalized Gain Functions

Mario S. Alvim et al.

2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF) (2012)

Article Computer Science, Theory & Methods

Quantitative Notions of Leakage for One-try Attacks

Christelle Braun et al.

ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE (2009)