Publications

38 / 2,449 publications found.


  •  Wang, Y., Basciftci, Y.O., Ishwar, P., "Privacy-Utility Tradeoffs under Constrained Data Release Mechanisms", arXiv, October 2017.
    BibTeX Download PDFRead TR2017-167
    • @techreport{MERL_TR2017-167,
    • author = {Wang, Y. and Basciftci, Y.O. and Ishwar, P.},
    • title = {Privacy-Utility Tradeoffs under Constrained Data Release Mechanisms},
    • institution = {MERL - Mitsubishi Electric Research Laboratories},
    • address = {Cambridge, MA 02139},
    • number = {TR2017-167},
    • month = oct,
    • year = 2017,
    • url = {http://www.merl.com/publications/TR2017-167/}
    • }
  •  Wang, Y., Raval, N.J., Ishwar, P., Hattori, M., Hirano, T., Matsuda, N., Shimizu, R., "On Methods for Privacy-Preserving Energy Disaggregation", IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), March 2017.
  •  Liu, C., Wu, J., Long, C., Wang, Y., "Dynamic State Recovery for Cyber-Physical Systems under Switching Location Attacks", IEEE Transactions on Control of Networked Systems, DOI: 10.1109/TCNS.2016.2580906, ISSN: 2325-5870, Vol. 4, No. 1, pp. 14-22, June 2016.
  •  Wang, Y.; Ishwar, P.; Rane, S., "An Elementary Completeness Proof for Secure Two-party Computation Primitives", IEEE Information Theory Workshop (ITW), DOI: 10.1109/ITW.2014.6970886, ISSN: 1662-9019, November 2014, pp. 521-525.
    BibTeX Download PDFRead TR2014-092
    • @inproceedings{Wang2014nov,
    • author = {Wang, Y. and Ishwar, P. and Rane, S.},
    • title = {An Elementary Completeness Proof for Secure Two-party Computation Primitives},
    • booktitle = {IEEE Information Theory Workshop (ITW)},
    • year = 2014,
    • pages = {521--525},
    • month = nov,
    • publisher = {IEEE},
    • doi = {10.1109/ITW.2014.6970886},
    • issn = {1662-9019},
    • url = {http://www.merl.com/publications/TR2014-092}
    • }
  •  Rane, S.; Wang, Y.; Draper, S.C.; Ishwar, P., "Secure Biometrics: Concepts, Authentication Architectures & Challenges", IEEE Signal Processing Magazine, DOI: 10.1109/MSP.2013.2261691, ISSN: 1053-5888, Vol. 30, No. 5, pp. 51-64, September 2013.
    BibTeX Download PDFRead TR2013-030
    • @article{Rane2013aug,
    • author = {Rane, S. and Wang, Y. and Draper, S.C. and Ishwar, P.},
    • title = {Secure Biometrics: Concepts, Authentication Architectures & Challenges},
    • journal = {IEEE Signal Processing Magazine},
    • year = 2013,
    • volume = 30,
    • number = 5,
    • pages = {51--64},
    • month = aug,
    • doi = {10.1109/MSP.2013.2261691},
    • issn = {1053-5888},
    • url = {http://www.merl.com/publications/TR2013-030}
    • }
  •  Wang, Y.; Ishwar, P.; Rane, S., "Information-Theoretically Secure Three-Party Computation with One Corrupted Party", IEEE International Symposium on Information Theory (ISIT), DOI: 10.1109/ISIT.2013.6620808, ISSN: 2157-8095, July 2013, pp. 3160-3164.
    BibTeX Download PDFRead TR2013-077
    • @inproceedings{Wang2013jul3,
    • author = {Wang, Y. and Ishwar, P. and Rane, S.},
    • title = {Information-Theoretically Secure Three-Party Computation with One Corrupted Party},
    • booktitle = {IEEE International Symposium on Information Theory (ISIT)},
    • year = 2013,
    • pages = {3160--3164},
    • month = jul,
    • doi = {10.1109/ISIT.2013.6620808},
    • issn = {2157-8095},
    • url = {http://www.merl.com/publications/TR2013-077}
    • }
  •  Garg, R.; Rane, S., "A Keypoint Descriptor for Alignment-Free Fingerprint Matching", IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), May 2013.
    BibTeX Download PDFRead TR2013-023
    • @inproceedings{Garg2013may,
    • author = {Garg, R. and Rane, S.},
    • title = {A Keypoint Descriptor for Alignment-Free Fingerprint Matching},
    • booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)},
    • year = 2013,
    • month = may,
    • url = {http://www.merl.com/publications/TR2013-023}
    • }
  •  Lin, B.-R.; Wang, Y.; Rane, S., "On the Benefits of Sampling in Privacy Preserving Statistical Analysis on Distributed Databases," Tech. Rep. TR2013-028, arXiv, April 2013.
    BibTeX Download PDFRead TR2013-028
    • @techreport{Lin2013apr2,
    • author = {Lin, B.-R. and Wang, Y. and Rane, S.},
    • title = {On the Benefits of Sampling in Privacy Preserving Statistical Analysis on Distributed Databases},
    • journal = {arXiv},
    • year = 2013,
    • month = apr,
    • url = {http://www.merl.com/publications/TR2013-028}
    • }
  •  Pathak, M.A.; Raj, B.; Rane, S.; Samaragdis, P., "Privacy-preserving Speech Processing: Cryptographic and String-Matching Frameworks Show Promise", IEEE Signal Processing Magazine, March 2013.
    BibTeX Download PDFRead TR2013-063
    • @article{Pathak2013feb,
    • author = {Pathak, M.A. and Raj, B. and Rane, S. and Samaragdis, P.},
    • title = {Privacy-preserving Speech Processing: Cryptographic and String-Matching Frameworks Show Promise},
    • journal = {IEEE Signal Processing Magazine},
    • year = 2013,
    • month = feb,
    • url = {http://www.merl.com/publications/TR2013-063}
    • }
  •  Rane, S.; Boufounos, P.T., "Privacy-Preserving Nearest Neighbor Methods: Comparing Signals without Revealing Them", IEEE Signal Processing Magazine, DOI: 10.1109/MSP.2012.2230221, ISSN: 1053-5888, Vol. 30, No. 2, pp. 18-28, March 2013.
    BibTeX Download PDFRead TR2013-004
    • @article{Rane2013feb,
    • author = {Rane, S. and Boufounos, P.T.},
    • title = {Privacy-Preserving Nearest Neighbor Methods: Comparing Signals without Revealing Them},
    • journal = {IEEE Signal Processing Magazine},
    • year = 2013,
    • volume = 30,
    • number = 2,
    • pages = {18--28},
    • month = feb,
    • doi = {10.1109/MSP.2012.2230221},
    • issn = {1053-5888},
    • url = {http://www.merl.com/publications/TR2013-004}
    • }
  •  Lin, B.-R.; Wang, Y.; Rane, S., "A Framework for Privacy Preserving Statistical Analysis on Distributed Databases", IEEE International Workshop on Information Forensics and Security (WIFS), ISBN: 978-1-4673-2286-7, December 2012, pp. 61-66.
    BibTeX Download PDFRead TR2012-064
    • @inproceedings{Lin2012dec,
    • author = {Lin, B.-R. and Wang, Y. and Rane, S.},
    • title = {A Framework for Privacy Preserving Statistical Analysis on Distributed Databases},
    • booktitle = {IEEE International Workshop on Information Forensics and Security (WIFS)},
    • year = 2012,
    • pages = {61--66},
    • month = dec,
    • isbn = {978-1-4673-2286-7},
    • url = {http://www.merl.com/publications/TR2012-064}
    • }
  •  Puech, W.; Erkin, Z.; Barni, M.; Rane, S.; Lagendijk, R.L., "Emerging Cryptographic Challenges in Image and Video Processing", IEEE International Conference on Image Processing (ICIP), October 2012.
    BibTeX Download PDFRead TR2012-067
    • @inproceedings{Puech2012sep,
    • author = {Puech, W. and Erkin, Z. and Barni, M. and Rane, S. and Lagendijk, R.L.},
    • title = {Emerging Cryptographic Challenges in Image and Video Processing},
    • booktitle = {IEEE International Conference on Image Processing (ICIP)},
    • year = 2012,
    • month = sep,
    • url = {http://www.merl.com/publications/TR2012-067}
    • }
  •  Rane, S.; Sun, W., "An Attribute-Based Framework for Privacy Preserving Image Querying", IEEE International Conference on Image Processing (ICIP), DOI: 10.1109/ICIP.2012.6487443, ISSN: 1522-4880, ISBN: 978-1-4673-2534-9, September 2012, pp. 2649-2652.
    BibTeX Download PDFRead TR2012-066
    • @inproceedings{Rane2012sep,
    • author = {Rane, S. and Sun, W.},
    • title = {An Attribute-Based Framework for Privacy Preserving Image Querying},
    • booktitle = {IEEE International Conference on Image Processing (ICIP)},
    • year = 2012,
    • pages = {2649--2652},
    • month = sep,
    • doi = {10.1109/ICIP.2012.6487443},
    • issn = {1522-4880},
    • isbn = {978-1-4673-2534-9},
    • url = {http://www.merl.com/publications/TR2012-066}
    • }
  •  Wang, Y.; Rane, S.; Draper, S.C.; Ishwar, P., "A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems", IEEE Transactions on Information Forensics and Security, ISSN: 1556-6013, Vol. 7, No. 6, pp. 1825-1840, July 2012.
    BibTeX Download PDFRead TR2012-051
    • @article{Wang2012jul,
    • author = {Wang, Y. and Rane, S. and Draper, S.C. and Ishwar, P.},
    • title = {A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems},
    • journal = {IEEE Transactions on Information Forensics and Security},
    • year = 2012,
    • volume = 7,
    • number = 6,
    • pages = {1825--1840},
    • month = jul,
    • issn = {1556-6013},
    • url = {http://www.merl.com/publications/TR2012-051}
    • }
  •  Sun, W.; Rane, S., "A Distance-sensitive Attribute Based Cryptosystem for Privacy-Preserving Querying", IEEE International Conference on Multimedia and Expo (ICME), DOI: 10.1109/ICME.2012.64, ISSN: 1945-7871, ISBN: 978-1-4673-1659-0, July 2012, pp. 386-391.
    BibTeX Download PDFRead TR2012-054
    • @inproceedings{Sun2012jul,
    • author = {Sun, W. and Rane, S.},
    • title = {A Distance-sensitive Attribute Based Cryptosystem for Privacy-Preserving Querying},
    • booktitle = {IEEE International Conference on Multimedia and Expo (ICME)},
    • year = 2012,
    • pages = {386--391},
    • month = jul,
    • doi = {10.1109/ICME.2012.64},
    • issn = {1945-7871},
    • isbn = {978-1-4673-1659-0},
    • url = {http://www.merl.com/publications/TR2012-054}
    • }
  •  Wang, Y.; Ishwar, P.; Rane, S., "Information-Theoretically Secure Three-party Computation with One Active Adversary," Tech. Rep. TR2012-045, arXiv, June 2012.
    BibTeX Download PDFRead TR2012-045
    • @techreport{Wang2012jun,
    • author = {Wang, Y. and Ishwar, P. and Rane, S.},
    • title = {Information-Theoretically Secure Three-party Computation with One Active Adversary},
    • journal = {arXiv},
    • year = 2012,
    • month = jun,
    • url = {http://www.merl.com/publications/TR2012-045}
    • }
  •  Boufounos, P.; Rane, S., "Secure Binary Embeddings for Privacy Preserving Nearest Neighbors", IEEE International Workshop on Information Forensics and Security (WIFS), DOI: 10.1109/WIFS.2011.6123149, November 2011, pp. 1-6.
    BibTeX Download PDFRead TR2011-077
    • @inproceedings{Boufounos2011nov,
    • author = {Boufounos, P. and Rane, S.},
    • title = {Secure Binary Embeddings for Privacy Preserving Nearest Neighbors},
    • booktitle = {IEEE International Workshop on Information Forensics and Security (WIFS)},
    • year = 2011,
    • pages = {1--6},
    • month = nov,
    • doi = {10.1109/WIFS.2011.6123149},
    • url = {http://www.merl.com/publications/TR2011-077}
    • }
  •  Pathak, M.; Rane, S.; Sun, W.; Raj, B., "Privacy Preserving Probabilistic Inference with Hidden Markov Models", IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), DOI: 10.1109/ICASSP.2011.5947696, May 2011, pp. 5868-5871.
    BibTeX Download PDFRead TR2011-017
    • @inproceedings{Pathak2011may,
    • author = {Pathak, M. and Rane, S. and Sun, W. and Raj, B.},
    • title = {Privacy Preserving Probabilistic Inference with Hidden Markov Models},
    • booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)},
    • year = 2011,
    • pages = {5868--5871},
    • month = may,
    • doi = {10.1109/ICASSP.2011.5947696},
    • url = {http://www.merl.com/publications/TR2011-017}
    • }
  •  Wang, Y.; Rane, S.; Draper, S.C.; Ishwar, P., "An Information-Theoretic Analysis of Revocability and Reusability in Secure Biometrics", IEEE Information Theory and Applications Workshop (ITA), February 2011.
    BibTeX Download PDFRead TR2011-005
    • @inproceedings{Wang2011feb,
    • author = {Wang, Y. and Rane, S. and Draper, S.C. and Ishwar, P.},
    • title = {An Information-Theoretic Analysis of Revocability and Reusability in Secure Biometrics},
    • booktitle = {IEEE Information Theory and Applications Workshop (ITA)},
    • year = 2011,
    • month = feb,
    • url = {http://www.merl.com/publications/TR2011-005}
    • }
  •  Rane, S.; Sun, W., "Privacy Preserving String Comparisons Based on Levenshtein Distance", IEEE International Workshop on Information Forensics and Security (WIFS), ISBN: 978-1-4244-9078-3, December 2010, pp. 1-6.
    BibTeX Download PDFRead TR2010-109
    • @inproceedings{Rane2010dec1,
    • author = {Rane, S. and Sun, W.},
    • title = {Privacy Preserving String Comparisons Based on Levenshtein Distance},
    • booktitle = {IEEE International Workshop on Information Forensics and Security (WIFS)},
    • year = 2010,
    • pages = {1--6},
    • month = dec,
    • isbn = {978-1-4244-9078-3},
    • url = {http://www.merl.com/publications/TR2010-109}
    • }