Publications

19 / 2,443 publications found.


  •  Wang, Y., Basciftci, Y.O., Ishwar, P., "Privacy-Utility Tradeoffs under Constrained Data Release Mechanisms", arXiv, October 2017.
    BibTeX Download PDFRead TR2017-167
    • @techreport{MERL_TR2017-167,
    • author = {Wang, Y. and Basciftci, Y.O. and Ishwar, P.},
    • title = {Privacy-Utility Tradeoffs under Constrained Data Release Mechanisms},
    • institution = {MERL - Mitsubishi Electric Research Laboratories},
    • address = {Cambridge, MA 02139},
    • number = {TR2017-167},
    • month = oct,
    • year = 2017,
    • url = {http://www.merl.com/publications/TR2017-167/}
    • }
  •  Koike-Akino, T., Cao, C., Wang, Y., Draper, S.C., Millar, D.S., Parsons, K., Kojima, K., Pajovic, M., Galdino, L., Elson, D.J., Lavery, D., Bayvel, P., "Irregular Polar Coding for Multi-Level Modulation in Complexity-Constrained Lightwave Systems", European Conference on Optical Communication (ECOC), September 2017.
  •  Koike-Akino, T., Wang, Y., Draper, S.C., Sugihara, K., Matsumoto, W., "Bit-Interleaved Polar-Coded OFDM for Low-Latency M2M Wireless Communications", IEEE International Conference on Communications (ICC), May 2017.
  •  Koike-Akino, T., Wang, Y., Draper, S.C., Sugihara, K., Matsumoto, W., Millar, D.S., Parsons, K., Kojima, K., "Bit-Interleaved Polar-Coded Modulation for Low-Latency Short-Block Transmission", Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference (OFC/NFOEC), DOI: 10.1364/OFC.2017.W1J.6, March 2017.
  •  Wang, Y., Raval, N.J., Ishwar, P., Hattori, M., Hirano, T., Matsuda, N., Shimizu, R., "On Methods for Privacy-Preserving Energy Disaggregation", IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), March 2017.
  •  Koike-Akino, T., Draper, S.C., Wang, Y., Sugihara, K., Matsumoto, W., Millar, D.S., Parsons, K., Arlunno, V., Kojima, K., "Optimal Layered Scheduling for Hardware-Efficient Windowed Decoding of LDPC Convolutional Codes", European Conference on Optical Communication (ECOC), September 2016.
  •  Koike-Akino, T., Mahajan, R., Marks, T.K., Tuzel, C.O., Wang, Y., Watanabe, S., Orlik, P.V., "High-Accuracy User Identification Using EEG Biometrics", International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), DOI: 10.1109/EMBC.2016.7590835, August 2016, pp. 854-858.
  •  Basciftci, Y.O.; Wang, Y.; Ishwar, P., "On Privacy-Utility Tradeoffs for Constrained Data Release Mechanisms", IEEE Information Theory and Applications Workshop (ITA), February 2016.
    BibTeX Download PDFRead TR2016-019
    • @inproceedings{Basciftci2016feb,
    • author = {Basciftci, Y.O. and Wang, Y. and Ishwar, P.},
    • title = {On Privacy-Utility Tradeoffs for Constrained Data Release Mechanisms},
    • booktitle = {IEEE Information Theory and Applications Workshop (ITA)},
    • year = 2016,
    • month = feb,
    • url = {http://www.merl.com/publications/TR2016-019}
    • }
  •  Wang, Y.; Ishwar, P.; Rane, S., "An Elementary Completeness Proof for Secure Two-party Computation Primitives", IEEE Information Theory Workshop (ITW), DOI: 10.1109/ITW.2014.6970886, ISSN: 1662-9019, November 2014, pp. 521-525.
    BibTeX Download PDFRead TR2014-092
    • @inproceedings{Wang2014nov,
    • author = {Wang, Y. and Ishwar, P. and Rane, S.},
    • title = {An Elementary Completeness Proof for Secure Two-party Computation Primitives},
    • booktitle = {IEEE Information Theory Workshop (ITW)},
    • year = 2014,
    • pages = {521--525},
    • month = nov,
    • publisher = {IEEE},
    • doi = {10.1109/ITW.2014.6970886},
    • issn = {1662-9019},
    • url = {http://www.merl.com/publications/TR2014-092}
    • }
  •  Wang, Y.; Rane, S.D.; Ishwar, P.; Sun, W., "Unconditionally Secure Computation on Large Distributed Databases with Vanishing Cost," Tech. Rep. TR2014-015, arXiv, February 2014.
    BibTeX Download PDFRead TR2014-015
    • @techreport{Wang2014feb1,
    • author = {Wang, Y. and Rane, S.D. and Ishwar, P. and Sun, W.},
    • title = {Unconditionally Secure Computation on Large Distributed Databases with Vanishing Cost},
    • journal = {arXiv},
    • year = 2014,
    • month = feb,
    • url = {http://www.merl.com/publications/TR2014-015}
    • }
  •  Wang, Y.; Rane, S.; Ishwar, P., "On Unconditionally Secure Multiparty Computation for Realizing Correlated Equilibria in Games", IEEE Global Conference on Signal and Information Processing (GlobalSIP), December 2013.
    BibTeX Download PDFRead TR2013-113
    • @inproceedings{Wang2013dec3,
    • author = {Wang, Y. and Rane, S. and Ishwar, P.},
    • title = {On Unconditionally Secure Multiparty Computation for Realizing Correlated Equilibria in Games},
    • booktitle = {IEEE Global Conference on Signal and Information Processing (GlobalSIP)},
    • year = 2013,
    • month = dec,
    • url = {http://www.merl.com/publications/TR2013-113}
    • }
  •  Rane, S.; Wang, Y.; Draper, S.C.; Ishwar, P., "Secure Biometrics: Concepts, Authentication Architectures & Challenges", IEEE Signal Processing Magazine, DOI: 10.1109/MSP.2013.2261691, ISSN: 1053-5888, Vol. 30, No. 5, pp. 51-64, September 2013.
    BibTeX Download PDFRead TR2013-030
    • @article{Rane2013aug,
    • author = {Rane, S. and Wang, Y. and Draper, S.C. and Ishwar, P.},
    • title = {Secure Biometrics: Concepts, Authentication Architectures & Challenges},
    • journal = {IEEE Signal Processing Magazine},
    • year = 2013,
    • volume = 30,
    • number = 5,
    • pages = {51--64},
    • month = aug,
    • doi = {10.1109/MSP.2013.2261691},
    • issn = {1053-5888},
    • url = {http://www.merl.com/publications/TR2013-030}
    • }
  •  Wang, Y.; Ishwar, P.; Rane, S., "Information-Theoretically Secure Three-Party Computation with One Corrupted Party", IEEE International Symposium on Information Theory (ISIT), DOI: 10.1109/ISIT.2013.6620808, ISSN: 2157-8095, July 2013, pp. 3160-3164.
    BibTeX Download PDFRead TR2013-077
    • @inproceedings{Wang2013jul3,
    • author = {Wang, Y. and Ishwar, P. and Rane, S.},
    • title = {Information-Theoretically Secure Three-Party Computation with One Corrupted Party},
    • booktitle = {IEEE International Symposium on Information Theory (ISIT)},
    • year = 2013,
    • pages = {3160--3164},
    • month = jul,
    • doi = {10.1109/ISIT.2013.6620808},
    • issn = {2157-8095},
    • url = {http://www.merl.com/publications/TR2013-077}
    • }
  •  Lin, B.-R.; Wang, Y.; Rane, S., "On the Benefits of Sampling in Privacy Preserving Statistical Analysis on Distributed Databases," Tech. Rep. TR2013-028, arXiv, April 2013.
    BibTeX Download PDFRead TR2013-028
    • @techreport{Lin2013apr2,
    • author = {Lin, B.-R. and Wang, Y. and Rane, S.},
    • title = {On the Benefits of Sampling in Privacy Preserving Statistical Analysis on Distributed Databases},
    • journal = {arXiv},
    • year = 2013,
    • month = apr,
    • url = {http://www.merl.com/publications/TR2013-028}
    • }
  •  Wang, Y.; Ishwar, P.; Rane, S., "Information-Theoretically Secure Three-Party Computation with One Corrupted Party," Tech. Rep. TR2013-002, arXiv, February 2013.
    BibTeX Download PDFRead TR2013-002
    • @techreport{Wang2013feb,
    • author = {Wang, Y. and Ishwar, P. and Rane, S.},
    • title = {Information-Theoretically Secure Three-Party Computation with One Corrupted Party},
    • journal = {arXiv},
    • year = 2013,
    • month = feb,
    • url = {http://www.merl.com/publications/TR2013-002}
    • }
  •  Lin, B.-R.; Wang, Y.; Rane, S., "A Framework for Privacy Preserving Statistical Analysis on Distributed Databases", IEEE International Workshop on Information Forensics and Security (WIFS), ISBN: 978-1-4673-2286-7, December 2012, pp. 61-66.
    BibTeX Download PDFRead TR2012-064
    • @inproceedings{Lin2012dec,
    • author = {Lin, B.-R. and Wang, Y. and Rane, S.},
    • title = {A Framework for Privacy Preserving Statistical Analysis on Distributed Databases},
    • booktitle = {IEEE International Workshop on Information Forensics and Security (WIFS)},
    • year = 2012,
    • pages = {61--66},
    • month = dec,
    • isbn = {978-1-4673-2286-7},
    • url = {http://www.merl.com/publications/TR2012-064}
    • }
  •  Wang, Y.; Rane, S.; Draper, S.C.; Ishwar, P., "A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems", IEEE Transactions on Information Forensics and Security, ISSN: 1556-6013, Vol. 7, No. 6, pp. 1825-1840, July 2012.
    BibTeX Download PDFRead TR2012-051
    • @article{Wang2012jul,
    • author = {Wang, Y. and Rane, S. and Draper, S.C. and Ishwar, P.},
    • title = {A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems},
    • journal = {IEEE Transactions on Information Forensics and Security},
    • year = 2012,
    • volume = 7,
    • number = 6,
    • pages = {1825--1840},
    • month = jul,
    • issn = {1556-6013},
    • url = {http://www.merl.com/publications/TR2012-051}
    • }
  •  Wang, Y.; Ishwar, P.; Rane, S., "Information-Theoretically Secure Three-party Computation with One Active Adversary," Tech. Rep. TR2012-045, arXiv, June 2012.
    BibTeX Download PDFRead TR2012-045
    • @techreport{Wang2012jun,
    • author = {Wang, Y. and Ishwar, P. and Rane, S.},
    • title = {Information-Theoretically Secure Three-party Computation with One Active Adversary},
    • journal = {arXiv},
    • year = 2012,
    • month = jun,
    • url = {http://www.merl.com/publications/TR2012-045}
    • }
  •  Wang, Y.; Porikli, F., "Multiple Dictionary Learning for Blocking Artifacts Reduction", IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), March 2012.
    BibTeX Download PDFRead TR2012-014
    • @inproceedings{Wang2012mar1,
    • author = {Wang, Y. and Porikli, F.},
    • title = {Multiple Dictionary Learning for Blocking Artifacts Reduction},
    • booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)},
    • year = 2012,
    • month = mar,
    • url = {http://www.merl.com/publications/TR2012-014}
    • }