A Tunable Measure for Information Leakage J Liao, O Kosut, L Sankar, FP Calmon 2018 IEEE International Symposium on Information Theory (ISIT), 701-705, 2018 | 149* | 2018 |
Hypothesis testing under maximal leakage privacy constraints J Liao, L Sankar, FP Calmon, VYF Tan 2017 IEEE International Symposium on Information Theory (ISIT), 779-783, 2017 | 75 | 2017 |
Hypothesis testing under mutual information privacy constraints in the high privacy regime J Liao, L Sankar, VYF Tan, F du Pin Calmon IEEE Transactions on Information Forensics and Security 13 (4), 1058-1071, 2017 | 62 | 2017 |
Generating fair universal representations using adversarial models P Kairouz, J Liao, C Huang, M Vyas, M Welfert, L Sankar IEEE Transactions on Information Forensics and Security 17, 1970-1985, 2022 | 42 | 2022 |
A better bound gives a hundred rounds: Enhanced privacy guarantees via f-divergences S Asoodeh, J Liao, FP Calmon, O Kosut, L Sankar 2020 IEEE International Symposium on Information Theory (ISIT), 920-925, 2020 | 41 | 2020 |
Three variants of differential privacy: Lossless conversion and applications S Asoodeh, J Liao, FP Calmon, O Kosut, L Sankar IEEE Journal on Selected Areas in Information Theory 2 (1), 208-222, 2021 | 38 | 2021 |
Hypothesis testing in the high privacy limit J Liao, L Sankar, VYF Tan, FP Calmon 2016 54th Annual Allerton Conference on Communication, Control, and …, 2016 | 24 | 2016 |
Learning generative adversarial representations (GAP) under fairness and censoring constraints J Liao, C Huang, P Kairouz, L Sankar arXiv preprint arXiv:1910.00411 1, 2019 | 23 | 2019 |
Privacy under hard distortion constraints J Liao, O Kosut, L Sankar, FP Calmon 2018 IEEE Information Theory Workshop (ITW), 1-5, 2018 | 21 | 2018 |
Robustness of maximal α-leakage to side information J Liao, L Sankar, O Kosut, FP Calmon 2019 IEEE International Symposium on Information Theory (ISIT), 642-646, 2019 | 19 | 2019 |
Maximal α-leakage and its properties J Liao, L Sankar, O Kosut, FP Calmon 2020 IEEE Conference on Communications and Network Security (CNS), 1-6, 2020 | 9 | 2020 |
A general framework for information leakage J Liao, O Kosut, L Sankar, FP Calmon A-General-Framework-for-Information-Leakage-Privacy-Utility-Trade-offs1. pdf, 2017 | 9 | 2017 |
Neural Network-based Estimation of the MMSE M Diaz, P Kairouz, J Liao, L Sankar 2021 IEEE International Symposium on Information Theory (ISIT), 1023-1028, 2021 | 4 | 2021 |
Research on Downlink Synchronization for TETRA Release II H Liu, D Yao, J Liao 2012 13th International Conference on Parallel and Distributed Computing …, 2012 | 3 | 2012 |
Which is better: One-way or two-way relaying with an amplify-and-forward relay? J Liao, F Wang, D Yao, M Wang 2014 IEEE Wireless Communications and Networking Conference (WCNC), 1087-1092, 2014 | 2 | 2014 |
Theoretical guarantees for model auditing with finite adversaries M Diaz, P Kairouz, J Liao, L Sankar arXiv preprint arXiv:1911.03405, 2019 | 1 | 2019 |
Quantifying Information Leakage via Adversarial Loss Functions: Theory and Practice J Liao Arizona State University, 2020 | | 2020 |
Adaptive demodulate-and-forward relaying for asymmetric two-way relay channels J Liao, F Wang, D Yao, L Lu 2015 IEEE/CIC International Conference on Communications in China (ICCC), 1-6, 2015 | | 2015 |
A mapping algorithm of superposed signals in two-way relaying system J Liao, F Wang, D Yao 2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS), 1-4, 2014 | | 2014 |
Fair Universal Representations using Adversarial Models P Kairouz, J Liao, C Huang, M Welfert, L Sankar | | |