From the information bottleneck to the privacy funnel A Makhdoumi, S Salamatian, N Fawaz, M Médard 2014 IEEE Information Theory Workshop (ITW 2014), 501-505, 2014 | 186 | 2014 |
Managing your private and public data: Bringing down inference attacks against your privacy S Salamatian, A Zhang, F du Pin Calmon, S Bhamidipati, N Fawaz, ... IEEE Journal of Selected Topics in Signal Processing 9 (7), 1240-1255, 2015 | 77 | 2015 |
How to hide the elephant-or the donkey-in the room: Practical privacy against statistical inference for large data S Salamatian, A Zhang, F du Pin Calmon, S Bhamidipati, N Fawaz, ... 2013 IEEE Global Conference on Signal and Information Processing, 269-272, 2013 | 74 | 2013 |
Why botnets work: Distributed brute-force attacks need no synchronization S Salamatian, W Huleihel, A Beirami, A Cohen, M Médard IEEE Transactions on Information Forensics and Security 14 (9), 2288-2299, 2019 | 59* | 2019 |
Generalizing bottleneck problems H Hsu, S Asoodeh, S Salamatian, FP Calmon 2018 IEEE International Symposium on Information Theory (ISIT), 531-535, 2018 | 34 | 2018 |
Network coding-based post-quantum cryptography A Cohen, RGL D’Oliveira, S Salamatian, M Médard IEEE journal on selected areas in information theory 2 (1), 49-64, 2021 | 32 | 2021 |
Task-based quantization for recovering quadratic functions using principal inertia components S Salamatian, N Shlezinger, YC Eldar, M Médard 2019 IEEE International Symposium on Information Theory (ISIT), 390-394, 2019 | 30 | 2019 |
Centralized vs decentralized targeted brute-force attacks: Guessing with side-information S Salamatian, W Huleihel, A Beirami, A Cohen, M Médard IEEE Transactions on Information Forensics and Security 15, 3749-3759, 2020 | 23* | 2020 |
Neural network coding L Liu, A Solomon, S Salamatian, M Médard ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020 | 16 | 2020 |
Joint sampling and recovery of correlated sources N Shlezinger, S Salamatian, YC Eldar, M Médard 2019 IEEE International Symposium on Information Theory (ISIT), 385-389, 2019 | 14 | 2019 |
Privacy-utility tradeoff and privacy funnel S Salamatian, FP Calmon, N Fawaz, A Makhdoumi, M Médard Unpublished preprint, http://www. mit. edu/∼ salmansa/files/privacy TIFS. pdf, 2020 | 11 | 2020 |
Mismatched guesswork and one-to-one codes S Salamatian, L Liu, A Beirami, M Médard 2019 IEEE Information Theory Workshop (ITW), 1-5, 2019 | 9* | 2019 |
Correspondence analysis using neural networks H Hsu, S Salamatian, FP Calmon The 22nd International Conference on Artificial Intelligence and Statistics …, 2019 | 8 | 2019 |
Maximum Entropy Functions: Approximate Gacs-Korner for Distributed Compression S Salamatian, A Cohen, M Médard arXiv preprint arXiv:1604.03877, 2016 | 8 | 2016 |
Serial quantization for sparse time sequences A Cohen, N Shlezinger, S Salamatian, YC Eldar, M Médard IEEE Transactions on Signal Processing 69, 3299-3314, 2021 | 7 | 2021 |
SPPM: Sparse Privacy Preserving Mappings. S Salamatian, N Fawaz, B Kveton, N Taft UAI, 712-721, 2014 | 7 | 2014 |
Efficient coding for multi-source networks using Gács-Körner common information S Salamatian, A Cohen, M Médard 2016 International Symposium on Information Theory and Its Applications …, 2016 | 6 | 2016 |
Privacy against inference attacks for large data N Fawaz, S Salamatian, F du Pin Calmon, SS Bhamidipati, PC Oliveira, ... US Patent App. 14/765,601, 2015 | 6 | 2015 |
A successive description property of monotone-chain polar codes for slepian-wolf coding S Salamatian, M Médard, E Telatar 2015 IEEE International Symposium on Information Theory (ISIT), 1522-1526, 2015 | 4 | 2015 |
Distributed quantization for sparse time sequences A Cohen, N Shlezinger, S Salamatian, YC Eldar, M Médard ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and …, 2020 | 3 | 2020 |