From the information bottleneck to the privacy funnel A Makhdoumi, S Salamatian, N Fawaz, M Médard 2014 IEEE Information Theory Workshop (ITW 2014), 501-505, 2014 | 229 | 2014 |
Managing your private and public data: Bringing down inference attacks against your privacy S Salamatian, A Zhang, F du Pin Calmon, S Bhamidipati, N Fawaz, ... IEEE Journal of Selected Topics in Signal Processing 9 (7), 1240-1255, 2015 | 90 | 2015 |
How to hide the elephant-or the donkey-in the room: Practical privacy against statistical inference for large data S Salamatian, A Zhang, F du Pin Calmon, S Bhamidipati, N Fawaz, ... 2013 IEEE Global Conference on Signal and Information Processing, 269-272, 2013 | 76 | 2013 |
Why botnets work: Distributed brute-force attacks need no synchronization S Salamatian, W Huleihel, A Beirami, A Cohen, M Médard IEEE Transactions on Information Forensics and Security 14 (9), 2288-2299, 2019 | 71* | 2019 |
Network coding-based post-quantum cryptography A Cohen, RGL D’Oliveira, S Salamatian, M Médard IEEE journal on selected areas in information theory 2 (1), 49-64, 2021 | 54 | 2021 |
Task-based quantization for recovering quadratic functions using principal inertia components S Salamatian, N Shlezinger, YC Eldar, M Médard 2019 IEEE International Symposium on Information Theory (ISIT), 390-394, 2019 | 40 | 2019 |
Generalizing bottleneck problems H Hsu, S Asoodeh, S Salamatian, FP Calmon 2018 IEEE International Symposium on Information Theory (ISIT), 531-535, 2018 | 37 | 2018 |
Centralized vs decentralized targeted brute-force attacks: Guessing with side-information S Salamatian, W Huleihel, A Beirami, A Cohen, M Médard IEEE Transactions on Information Forensics and Security 15, 3749-3759, 2020 | 28* | 2020 |
Neural network coding L Liu, A Solomon, S Salamatian, M Médard ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020 | 18 | 2020 |
Privacy-utility tradeoff and privacy funnel S Salamatian, FP Calmon, N Fawaz, A Makhdoumi, M Médard Unpublished preprint, http://www. mit. edu/∼ salmansa/files/privacy TIFS. pdf, 2020 | 15 | 2020 |
Joint sampling and recovery of correlated sources N Shlezinger, S Salamatian, YC Eldar, M Médard 2019 IEEE International Symposium on Information Theory (ISIT), 385-389, 2019 | 13 | 2019 |
Correspondence analysis using neural networks H Hsu, S Salamatian, FP Calmon The 22nd International Conference on Artificial Intelligence and Statistics …, 2019 | 12 | 2019 |
Serial quantization for sparse time sequences A Cohen, N Shlezinger, S Salamatian, YC Eldar, M Médard IEEE Transactions on Signal Processing 69, 3299-3314, 2021 | 11 | 2021 |
Mismatched guesswork and one-to-one codes S Salamatian, L Liu, A Beirami, M Médard 2019 IEEE Information Theory Workshop (ITW), 1-5, 2019 | 10* | 2019 |
Maximum entropy functions: Approximate gacs-korner for distributed compression S Salamatian, A Cohen, M Médard arXiv preprint arXiv:1604.03877, 2016 | 9 | 2016 |
Asymptotics of language model alignment JQ Yang, S Salamatian, Z Sun, AT Suresh, A Beirami arXiv preprint arXiv:2404.01730, 2024 | 7 | 2024 |
Efficient coding for multi-source networks using Gács-Körner common information S Salamatian, A Cohen, M Médard 2016 International Symposium on Information Theory and Its Applications …, 2016 | 7 | 2016 |
SPPM: Sparse Privacy Preserving Mappings. S Salamatian, N Fawaz, B Kveton, N Taft UAI, 712-721, 2014 | 7 | 2014 |
Privacy against inference attacks for large data N Fawaz, S Salamatian, F du Pin Calmon, SS Bhamidipati, PC Oliveira, ... US Patent App. 14/765,601, 2015 | 6 | 2015 |
Generalizing correspondence analysis for applications in machine learning H Hsu, S Salamatian, FP Calmon IEEE Transactions on Pattern Analysis and Machine Intelligence 44 (12), 9347 …, 2021 | 5 | 2021 |