Parv Venkitasubramaniam

Orcid: 0000-0002-0999-3331

Affiliations:
  • Lehigh University, Bethlehem, PA, USA
  • Cornell University, Ithaca, NY, USA (PhD 2007)


According to our database1, Parv Venkitasubramaniam authored at least 76 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Incorporating Domain Differential Equations into Graph Convolutional Networks to Lower Generalization Discrepancy.
CoRR, 2024

Robust Conformal Prediction under Distribution Shift via Physics-Informed Structural Causal Model.
CoRR, 2024

RQP-SGD: Differential Private Machine Learning through Noisy SGD and Randomized Quantization.
CoRR, 2024

2023
Vulnerability of Building Energy Management against Targeted False Data Injection Attacks: Model Predictive Control vs. Proportional Integral.
CoRR, 2023

Spectral-DP: Differentially Private Deep Learning through Spectral Perturbation and Filtering.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Prospect Theoretic Contract Design in a Stackelberg Game via Bayesian Inference.
Proceedings of the 57th Annual Conference on Information Sciences and Systems, 2023

2022
Inferential Separation for Privacy: Irrelevant Statistics and Quantization.
IEEE Trans. Inf. Forensics Secur., 2022

Separating Sensor Anomalies From Process Anomalies in Data-Driven Anomaly Detection.
IEEE Signal Process. Lett., 2022

Data-Driven Contract Design for Multi-Agent Systems With Collusion Detection.
IEEE Signal Process. Lett., 2022

NeuGuard: Lightweight Neuron-Guided Defense against Membership Inference Attacks.
Proceedings of the Annual Computer Security Applications Conference, 2022

2020
Optimal Local Differentially Private Quantization.
IEEE Trans. Signal Process., 2020

False Data Injection and Detection in LQG Systems: A Game Theoretic Approach.
IEEE Trans. Control. Netw. Syst., 2020

2019
Modeling and Detection of Future Cyber-Enabled DSM Data Attacks using Supervised Learning.
CoRR, 2019

Data-driven Contract Design.
Proceedings of the 2019 American Control Conference, 2019

2018
Privacy Aware Stochastic Games for Distributed End-User Energy Storage Sharing.
IEEE Trans. Signal Inf. Process. over Networks, 2018

Relay Selection and Operation Control for Optimal Delay Anonymity Tradeoff in Anonymous Networks.
IEEE Trans. Control. Netw. Syst., 2018

Mutual-Information-Private Online Gradient Descent Algorithm.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Optimal Distribution Mapping for Inference Privacy.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Optimal Multi-Source Inference Privacy - A Generalized Lloyd-Max Algorithm.
Proceedings of the 56th Annual Allerton Conference on Communication, 2018

Coupon Targeting Competition in Privacy Sensitive Market.
Proceedings of the 56th Annual Allerton Conference on Communication, 2018

2017
Delay Anonymity Tradeoff in Mix Networks: Optimal Routing.
IEEE/ACM Trans. Netw., 2017

Stealthy Control Signal Attacks in Linear Quadratic Gaussian Control Systems: Detectability Reward Tradeoff.
IEEE Trans. Inf. Forensics Secur., 2017

Stealthy Attacks in Dynamical Systems: Tradeoffs Between Utility and Detectability With Application in Anonymous Systems.
IEEE Trans. Inf. Forensics Secur., 2017

A game theoretic approach to analyze false data injection and detection in LQG system.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Network topology risk assessment of stealthy cyber attacks on advanced metering infrastructure networks.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

2016
Anonymity and Fairness in Packet Scheduling: A Quantitative Tradeoff.
IEEE/ACM Trans. Netw., 2016

Mitigating Timing Side Channel in Shared Schedulers.
IEEE/ACM Trans. Netw., 2016

GPS spoofing attack characterization and detection in smart grids.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Differential privacy in networked data collection.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

Stochastic games of end-user energy storage sharing.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

Stealthy control signal attacks in vector LQG systems.
Proceedings of the 2016 American Control Conference, 2016

2015
The Privacy Analysis of Battery Control Mechanisms in Demand Response: Revealing State Approach and Rate Distortion Bounds.
IEEE Trans. Smart Grid, 2015

Anonymity of Memory-Limited Chaum Mixes Under Timing Analysis: An Information Theoretic Perspective.
IEEE Trans. Inf. Theory, 2015

Information-Theoretic Security in Stochastic Control Systems.
Proc. IEEE, 2015

Relay selection in wireless networks for optimal delay anonymity tradeoff.
Proceedings of the 16th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2015

Optimal end user energy storage sharing in demand response.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Relay selection for optimal delay anonymity tradeoff in anonymous networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Stealthy control signal attacks in scalar LQG systems.
Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing, 2015

2014
Under the radar attacks in dynamical systems: Adversarial privacy utility tradeoffs.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

Encompassing anonymity in signaling games.
Proceedings of the 48th Annual Conference on Information Sciences and Systems, 2014

Rate allocation for Multihop routing in anonymous networking.
Proceedings of the 48th Annual Conference on Information Sciences and Systems, 2014

2013
Preventing Timing Analysis in Networks: A Statistical Inference Perspective.
IEEE Signal Process. Mag., 2013

Admissible Length Study in Anonymous Networking: A Detection Theoretic Perspective.
IEEE J. Sel. Areas Commun., 2013

An Information Theoretic Study of Timing Side Channels in Two-user Schedulers.
CoRR, 2013

Anonymity in wireless networks under capture or selective jamming: An admissible length study.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

Anonymity of a buffer constrained chaum mix: Optimal strategy and asymptotics.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Maximizing privacy in Variable Bit rate Coding.
Proceedings of the IEEE International Conference on Acoustics, 2013

Decision making under privacy restrictions.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

On the privacy-cost tradeoff of an in-home power storage mechanism.
Proceedings of the 51st Annual Allerton Conference on Communication, 2013

Privacy in stochastic control: A Markov Decision Process perspective.
Proceedings of the 51st Annual Allerton Conference on Communication, 2013

2012
Designing Router Scheduling Policies: A Privacy Perspective.
IEEE Trans. Signal Process., 2012

A Game-Theoretic Approach to Anonymous Networking.
IEEE/ACM Trans. Netw., 2012

Scheduling with privacy constraints.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

Mitigating timing based information leakage in shared schedulers.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Thwarting traffic analysis: A signal processing perspective.
Proceedings of the IEEE 7th Sensor Array and Multichannel Signal Processing Workshop, 2012

Source anonymity in fair scheduling: A case for the proportional method.
Proceedings of IEEE International Conference on Communications, 2012

Anonymity in packet scheduling under the max-min fairness criterion.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012

2011
Dummy rate analysis of buffer constrained chaum mix.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Information theoretic analysis of side channel information leakage in FCFS schedulers.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Designing privacy preserving router scheduling policies.
Proceedings of the 45st Annual Conference on Information Sciences and Systems, 2011

The anonymity of an almost fair chaum mix.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

2010
Anonymous Networking under Memory Constraints.
Proceedings of IEEE International Conference on Communications, 2010

2009
Anonymous networking with localized eavesdroppers: A game-theoretic approach.
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009

2008
Anonymous Networking Amidst Eavesdroppers.
IEEE Trans. Inf. Theory, 2008

Toward an analytical approach to anonymous wireless networking.
IEEE Commun. Mag., 2008

Anonymous Networking with Minimum Latency in Multihop Networks.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

On the anonymity of Chaum mixes.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Throughput Anonymity Trade-off in Wireless Networks under Latency Constraints.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Incentivizing anonymous "peer-to-peer" reviews.
Proceedings of the 46th Annual Allerton Conference on Communication, 2008

Anonymity under light traffic conditions using a network of mixes.
Proceedings of the 46th Annual Allerton Conference on Communication, 2008

2007
Quantization for Maximin ARE in Distributed Estimation.
IEEE Trans. Signal Process., 2007

2006
Minimax Quantization for Distributed Maximum Likelihood Estimation.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

Score-Function Quantization for Distributed Estimation.
Proceedings of the 40th Annual Conference on Information Sciences and Systems, 2006

2005
Sensitivity and Coding of Opportunistic ALOHA in Sensor Networks with Mobile Access.
J. VLSI Signal Process., 2005

2004
Signal processing in random access.
IEEE Signal Process. Mag., 2004

Sensor networks with mobile access: optimal random access and coding.
IEEE J. Sel. Areas Commun., 2004


  Loading...