Lalitha Sankar
Orcid: 0000-0001-8122-5444Affiliations:
- Arizona State University, Tempe, Arizona, USA
According to our database1,
Lalitha Sankar
authored at least 144 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Theory, June, 2024
IEEE Trans. Inf. Theory, February, 2024
IEEE J. Sel. Areas Inf. Theory, 2024
IEEE Control. Syst. Lett., 2024
Label Noise Robustness for Domain-Agnostic Fair Corrections via Nearest Neighbors Label Spreading.
CoRR, 2024
Model Predictive Control for Joint Ramping and Regulation-Type Service from Distributed Energy Resource Aggregations.
CoRR, 2024
Robustness to Subpopulation Shift with Domain Label Noise via Regularized Annotation of Domains.
CoRR, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the IEEE International Symposium on Information Theory, 2024
Proceedings of the IEEE International Symposium on Information Theory, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
2023
IEEE Trans. Control. Netw. Syst., December, 2023
PMU Tracker: A Visualization Platform for Epicentric Event Propagation Analysis in the Power Grid.
IEEE Trans. Vis. Comput. Graph., 2023
Towards Addressing GAN Training Instabilities: Dual-objective GANs with Tunable Parameters.
CoRR, 2023
Proceedings of the Winter Simulation Conference, 2023
Proceedings of the IEEE International Symposium on Information Theory, 2023
Schrödinger Mechanisms: Optimal Differential Privacy Mechanisms for Small Sensitivity.
Proceedings of the IEEE International Symposium on Information Theory, 2023
Optimal Multidimensional Differentially Private Mechanisms in the Large-Composition Regime.
Proceedings of the IEEE International Symposium on Information Theory, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the IEEE Conference on Control Technology and Applications, 2023
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2023
2022
A Tunable Loss Function for Robust Classification: Calibration, Landscape, and Generalization.
IEEE Trans. Inf. Theory, 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Control. Syst. Lett., 2022
A Machine Learning Framework for Event Identification via Modal Analysis of PMU Data.
CoRR, 2022
IEEE Computer Graphics and Applications, 2022
Proceedings of the IEEE Information Theory Workshop, 2022
Proceedings of the IEEE International Symposium on Information Theory, 2022
A Variational Formula for Infinity-Rényi Divergence with Applications to Information Leakage.
Proceedings of the IEEE International Symposium on Information Theory, 2022
Cactus Mechanisms: Optimal Differential Privacy Mechanisms in the Large-Composition Regime.
Proceedings of the IEEE International Symposium on Information Theory, 2022
Proceedings of the International Conference on Machine Learning, 2022
2021
An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications.
IEEE J. Sel. Areas Inf. Theory, 2021
IEEE J. Sel. Areas Inf. Theory, 2021
CoRR, 2021
CoRR, 2021
A Verifiable Framework for Cyber-Physical Attacks and Countermeasures in a Resilient Electric Power Grid.
CoRR, 2021
Proceedings of the IEEE Information Theory Workshop, 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
2020
IEEE Trans. Inf. Theory, 2020
N-1 Reliability Makes It Difficult for False Data Injection Attacks to Cause Physical Consequences.
CoRR, 2020
Vulnerability Assessment of Large-scale Power Systems to False Data Injection Attacks.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the IEEE International Symposium on Information Theory, 2020
A Better Bound Gives a Hundred Rounds: Enhanced Privacy Guarantees via f-Divergences.
Proceedings of the IEEE International Symposium on Information Theory, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
Tunable Measures for Information Leakage and Applications to Privacy-Utility Tradeoffs.
IEEE Trans. Inf. Theory, 2019
CoRR, 2019
Learning Generative Adversarial RePresentations (GAP) under Fairness and Censoring Constraints.
CoRR, 2019
Vulnerability Assessment of N-1 Reliable Power Systems to False Data Injection Attacks.
CoRR, 2019
Can Predictive Filters Detect Gradually Ramping False Data Injection Attacks Against PMUs?
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
2018
Hypothesis Testing Under Mutual Information Privacy Constraints in the High Privacy Regime.
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Inf. Forensics Secur., 2018
Unobservable False Data Injection Attacks against PMUs: Feasible Conditions and Multiplicative Attacks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the IEEE Information Theory Workshop, 2018
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018
Generative Adversarial Privacy: A Data-Driven Approach to Information-Theoretic Privacy.
Proceedings of the 52nd Asilomar Conference on Signals, Systems, and Computers, 2018
2017
IEEE Trans. Inf. Theory, 2017
IEEE Trans. Inf. Forensics Secur., 2017
Can Attackers with Limited Information Exploit Historical Data to Mount Successful False Data Injection Attacks on Power Systems?
CoRR, 2017
False data injection attacks on phasor measurements that bypass low-rank decomposition.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
2016
Physical System Consequences of Unobservable State-and-Topology Cyber-Physical Attacks.
IEEE Trans. Smart Grid, 2016
The Optimal Differential Privacy Mechanism under Hamming Distortion for Universal Memoryless Source Classes.
CoRR, 2016
Evaluating power system vulnerability to false data injection attacks via scalable optimization.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016
Optimal differential privacy mechanisms under Hamming distortion for structured source classes.
Proceedings of the IEEE International Symposium on Information Theory, 2016
Incentive mechanisms for privacy-sensitive electricity consumers with alternative energy sources.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016
Proceedings of the 54th Annual Allerton Conference on Communication, 2016
Proceedings of the 54th Annual Allerton Conference on Communication, 2016
2015
IEEE J. Sel. Top. Signal Process., 2015
IEEE J. Sel. Top. Signal Process., 2015
J. Priv. Confidentiality, 2015
Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation.
CoRR, 2015
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015
Cluster-and-Connect: An algorithmic approach to generating synthetic electric power network graphs.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015
2014
CoRR, 2014
New results on third-order coding rate for universal fixed-to-variable source coding.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014
2013
IEEE Trans. Inf. Theory, 2013
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Signal Process. Mag., 2013
IEEE Signal Process. Mag., 2013
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013
2012
Repeated games for privacy-aware distributed state estimation in interconnected networks.
Proceedings of the 6th International Conference on Network Games, 2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
Proceedings of the 5th International Symposium on Communications, 2012
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012
Proceedings of the Conference Record of the Forty Sixth Asilomar Conference on Signals, 2012
Session TA4b: Signal processing for cyber-security and privacy in networks (invited).
Proceedings of the Conference Record of the Forty Sixth Asilomar Conference on Signals, 2012
2011
IEEE Trans. Inf. Theory, 2011
Fading Multiple Access Relay Channels: Achievable Rates and Opportunistic Scheduling.
IEEE Trans. Inf. Theory, 2011
J. Commun., 2011
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
2010
Utility and privacy of data sources: Can Shannon help conceal and reveal information?
Proceedings of the Information Theory and Applications Workshop, 2010
Proceedings of the IEEE International Symposium on Information Theory, 2010
Proceedings of the 48th Annual Allerton Conference on Communication, 2010
2009
IEEE Trans. Inf. Theory, 2009
EURASIP J. Wirel. Commun. Netw., 2009
Proceedings of the IEEE International Symposium on Information Theory, 2009
Proceedings of the 47th Annual Allerton Conference on Communication, 2009
2008
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
Proceedings of the 46th Annual Allerton Conference on Communication, 2008
2007
Proceedings of the IEEE International Symposium on Information Theory, 2007
2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the 40th Annual Conference on Information Sciences and Systems, 2006
2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
2004
Hierarchical sensor networks: capacity bounds and cooperative strategies using the multiple-access relay channel model.
Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004