Secure estimation and control for cyberphysical systems under adversarial attacksHamza Fawzi, Paulo Tabuada, and Suhas Diggavi IEEE Transactions on Automatic Control, June 2014 (pdf download link provided below) An Achievable Rate Region for Gaussian Interference Channel with Intermittent FeedbackCan Karakus, I-Hsiang Wang and Suhas Diggavi Allerton 2013. (pdf download link provided below) Candidate Indistinguishability Obfuscation and Functional Encryption for all CircuitsSanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, and Brent Waters FOCS 2013. (pdf download link provided below) Cross-Domain Secure ComputationChongwon Cho, Sanjam Garg, Rafail Ostrovsky Public Key Cryptography (PKC) 2014. (pdf download link provided below) Error-Correcting Codes for Sliding WindowsRan Gelles, Rafail Ostrovsky, Alan Roytman International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM) 2014 (pdf download link provided below) Event-Triggered Projected Luenberger Observer for Linear Systems Under Sensor AttacksYasser Shoukry and Paulo Tabuada To appear in CDC 2014. Harnessing Bursty Interference in Multicarrier Systems with FeedbackShaunak Mishra, I-Hsiang Wang, and Suhas Diggavi ISIT 2014 (pdf download link provided below) Hierarchical Coded CachingNikhil Karamchandani, Urs Niesen, Mohammad Ali Maddah-Ali and Suhas Diggavi ISIT 2014 (pdf download link provided below) Multi-level Coded CachingJad Hachem, Nikhil Karamchandani, and Suhas Diggavi ISIT 2014 (pdf download link provided below) Noninvasive Spoofing Attacks For AntiLock Braking SystemsYasser Shoukry, Paul Martin, Paulo Tabuada, and Mani Srivastava Workshop on Cryptographic Hardware and Wmbedded Systems (CHES) 2013. (pdf download link provided below) QUILT: A Decode/Quantize-Interleave-Transmit approach to cooperative relayingSiddhartha Brahma, Melissa Duarte, Ayan Sengupta, I-Hsiang Wang, Christina Fragouli, Suhas N. Diggavi INFOCOM 2014 (pdf download link provided below) Secure Network Coding with Erasures and FeedbackLaszlo Czap, Christina Fragouli, Vinod Prabhakaran and Suhas Diggavi Allerton 2013. (pdf download link provided below) Secure state estimation and control using multiple (insecure) observers.Shaunak Mishra, Nikhil Karamchandani, Paulo Tabuada, and Suhas Diggavi To appear in CDC 2014. Statistical Concurrent Non-malleable Zero KnowledgeClaudio Orlandi, Rafail Ostrovsky, Vanishree Rao, Amit Sahai, and Ivan Visconti TCC 2014 (pdf download link provided below) The Oblivious Transfer Capacity of the Wiretapped Binary Erasure ChannelManoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, and Suhas Diggavi ISIT 2014 (pdf download link provided below) Triangle Network SecrecyLaszlo Czap, Vinod Prabhakaran, Christina Fragouli and Suhas Diggavi ISIT 2014 (pdf download link provided below) Exploiting Common Randomness: A Resource for Network SecrecyL. Czap, V. M. Prabhakaran, S. Diggavi and C. Fragouli IEEE Information Theory Workshop (ITW), 2013. (pdf download link provided below) Creating secrets out of erasuresKaterina J. Argyraki, Suhas N. Diggavi, Melissa Duarte, Christina Fragouli, Marios Gatzianas and Panagiotis Kostopoulos MOBICOM 2013 (pdf download link provided below) **For all material posted on this page: This material is presented to ensure timely dissemination of scholarly and technical work. All persons copying this material are expected to adhere to the terms and constraints invoked by the copyright holder. In most cases, these works may not be reposted without the explicit permission of the copyright holder. |
Resources >
Publications 2013-2014
**For all material posted on this page: This material is presented to ensure timely dissemination of scholarly and technical work. All persons copying this material are expected to adhere to the terms and constraints invoked by the copyright holder. In most cases, these works may not be reposted without the explicit permission of the copyright holder. |
Selection | File type icon | File name | Description | Size | Revision | Time | User |
---|---|---|---|---|---|---|---|
Ċ | View Download |
1013k | v. 1 | Aug 1, 2014, 2:30 PM | admin uclacps | ||
Ċ | View Download |
633k | v. 1 | Aug 1, 2014, 2:30 PM | admin uclacps | ||
Ċ | View Download |
201k | v. 1 | Aug 3, 2014, 10:50 AM | admin uclacps | ||
Ċ | View Download |
333k | v. 1 | Aug 1, 2014, 2:31 PM | admin uclacps | ||
Ċ | View Download |
235k | v. 1 | Aug 1, 2014, 2:30 PM | admin uclacps | ||
Ċ | View Download |
126k | v. 1 | Aug 3, 2014, 10:50 AM | admin uclacps | ||
Ċ | View Download |
357k | v. 1 | Aug 1, 2014, 2:31 PM | admin uclacps | ||
Ċ | View Download |
365k | v. 1 | Aug 1, 2014, 2:31 PM | admin uclacps | ||
Ċ | View Download |
431k | v. 1 | Aug 1, 2014, 2:31 PM | admin uclacps | ||
Ċ | View Download |
1139k | v. 1 | Aug 1, 2014, 2:30 PM | admin uclacps | ||
Ċ | View Download |
284k | v. 1 | Aug 1, 2014, 2:30 PM | admin uclacps | ||
Ċ | View Download |
655k | v. 1 | Aug 1, 2014, 2:31 PM | admin uclacps | ||
Ċ | View Download |
234k | v. 1 | Aug 1, 2014, 2:31 PM | admin uclacps | ||
Ċ | View Download |
573k | v. 1 | Aug 1, 2014, 2:31 PM | admin uclacps | ||
Ċ | View Download |
140k | v. 1 | Aug 1, 2014, 2:31 PM | admin uclacps | ||
Ċ | View Download |
268k | v. 1 | Aug 1, 2014, 2:31 PM | admin uclacps |