George T. Amariucai
Orcid: 0000-0003-4471-6425Affiliations:
- Kansas State University, USA
According to our database1,
George T. Amariucai
authored at least 60 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on cs.ksu.edu
-
on orcid.org
On csauthors.net:
Bibliography
2025
Information Leakage Measures for Imperfect Statistical Information: Application to Non-Bayesian Framework.
IEEE Trans. Inf. Forensics Secur., 2025
2024
IEEE Trans. Inf. Forensics Secur., 2024
A comprehensive and reliable feature attribution method: Double-sided remove and reconstruct (DoRaR).
Neural Networks, 2024
CoRR, 2024
Initial Exploration of Zero-Shot Privacy Utility Tradeoffs in Tabular Data Using GPT-4.
Proceedings of the International Joint Conference on Neural Networks, 2024
Proceedings of the International Joint Conference on Neural Networks, 2024
2023
Measures of Information Leakage for Incomplete Statistical Information: Application to a Binary Privacy Mechanism.
ACM Trans. Priv. Secur., November, 2023
ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications.
IEEE Trans. Dependable Secur. Comput., 2023
Reinforcement Learning Approach to Generate Zero-Dynamics Attacks on Control Systems Without State Space Models.
Proceedings of the Computer Security - ESORICS 2023, 2023
Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023
2022
Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication.
Proc. Priv. Enhancing Technol., 2022
Uncertainty-Autoencoder-Based Privacy and Utility Preserving Data Type Conscious Transformation.
Proceedings of the International Joint Conference on Neural Networks, 2022
Heuristic Gradient Optimization Approach to Controlling Susceptibility to Manipulation in Online Social Networks.
Proceedings of the Computational Data and Social Networks - 11th International Conference, 2022
Artificial Intelligence Meets Kinesthetic Intelligence: Mouse-based User Authentication based on Hybrid Human-Machine Learning.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IEEE Access, 2021
Proceedings of the ICC 2021, 2021
Information Leakage Metrics for Adversaries with Incomplete Information: Binary Privacy Mechanism.
Proceedings of the ICC 2021, 2021
2020
CoRR, 2020
Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication.
CoRR, 2020
CoRR, 2020
An Information Diffusion Approach to Rumor Propagation and Identification on Twitter.
CoRR, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020
MIDMod-OSN: A Microscopic-Level Information Diffusion Model for Online Social Networks.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
An Implicit Crowdsourcing Approach to Rumor Identification in Online Social Networks.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
2018
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Proceedings of the 25th International Conference on Telecommunications, 2018
2017
IEEE Trans. Parallel Distributed Syst., 2017
Proceedings of the 2017 IEEE Military Communications Conference, 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
Extractable Common Randomness From Gaussian Trees: Topological and Algebraic Perspectives.
IEEE Trans. Inf. Forensics Secur., 2016
Synthesis of Gaussian trees with correlation sign ambiguity: An information theoretic approach.
Proceedings of the 54th Annual Allerton Conference on Communication, 2016
2015
CoRR, 2015
Evaluation of security robustness against information leakage in Gaussian polytree graphical models.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Topological and Algebraic Properties for Classifying Unrooted Gaussian Trees under Privacy Constraints.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Block Programs: Improving Efficiency of Verifiable Computation for Circuits with Repeated Substructures.
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Proceedings of the 2014 Third GENI Research and Educational Experiment Workshop, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2012
IEEE Trans. Inf. Theory, 2012
Half-Duplex Active Eavesdropping in Fast-Fading Channels: A Block-Markov Wyner Secrecy Encoding Scheme.
IEEE Trans. Inf. Theory, 2012
2011
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011
2010
Active eavesdropping in fast fading channels: A Block-Markov Wyner secrecy encoding scheme.
Proceedings of the IEEE International Symposium on Information Theory, 2010
2009
Mixed anti-jamming strategies in fixed-rate wireless systems over fast fading channels.
Proceedings of the IEEE International Symposium on Information Theory, 2009
2008
Int. J. Auton. Adapt. Commun. Syst., 2008
Jamming in Fixed-Rate Wireless Systems with Power Constraints - Part I: Fast Fading Channels
CoRR, 2008
Jamming in Fixed-Rate Wireless Systems with Power Constraints - Part II: Parallel Slow Fading Channels
CoRR, 2008
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008
2007
Proceedings of the IEEE International Symposium on Information Theory, 2007
Minimax and Maxmin Solutions to Gaussian Jamming in Block-Fading Channels under Long Term Power Constraints.
Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007