Publications

116 / 3,666 publications found.


  •  Wang, Y., Raval, N.J., Ishwar, P., Hattori, M., Hirano, T., Matsuda, N., Shimizu, R., "On Methods for Privacy-Preserving Energy Disaggregation", IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), March 2017.
    BibTeX TR2017-015 PDF
    • @inproceedings{Wang2017mar2,
    • author = {Wang, Ye and Raval, Nisarg J and Ishwar, Prakash and Hattori, Mitsuhiro and Hirano, Takato and Matsuda, Nori and Shimizu, Rina},
    • title = {On Methods for Privacy-Preserving Energy Disaggregation},
    • booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)},
    • year = 2017,
    • month = mar,
    • url = {https://www.merl.com/publications/TR2017-015}
    • }
  •  Koike-Akino, T., Draper, S.C., Wang, Y., Sugihara, K., Matsumoto, W., Millar, D.S., Parsons, K., Arlunno, V., Kojima, K., "Optimal Layered Scheduling for Hardware-Efficient Windowed Decoding of LDPC Convolutional Codes", European Conference on Optical Communication (ECOC), September 2016.
    BibTeX TR2016-124 PDF
    • @inproceedings{Koike-Akino2016sep,
    • author = {Koike-Akino, Toshiaki and Draper, Stark C. and Wang, Ye and Sugihara, Kenya and Matsumoto, Wataru and Millar, David S. and Parsons, Kieran and Arlunno, Valeria and Kojima, Keisuke},
    • title = {Optimal Layered Scheduling for Hardware-Efficient Windowed Decoding of LDPC Convolutional Codes},
    • booktitle = {European Conference on Optical Communication (ECOC)},
    • year = 2016,
    • month = sep,
    • url = {https://www.merl.com/publications/TR2016-124}
    • }
  •  Koike-Akino, T., Mahajan, R., Marks, T.K., Tuzel, C.O., Wang, Y., Watanabe, S., Orlik, P.V., "High-Accuracy User Identification Using EEG Biometrics", International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), DOI: 10.1109/​EMBC.2016.7590835, August 2016, pp. 854-858.
    BibTeX TR2016-105 PDF Presentation
    • @inproceedings{Koike-Akino2016aug,
    • author = {Koike-Akino, Toshiaki and Mahajan, Ruhi and Marks, Tim K. and Tuzel, C. Oncel and Wang, Ye and Watanabe, Shinji and Orlik, Philip V.},
    • title = {High-Accuracy User Identification Using EEG Biometrics},
    • booktitle = {International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)},
    • year = 2016,
    • pages = {854--858},
    • month = aug,
    • doi = {10.1109/EMBC.2016.7590835},
    • url = {https://www.merl.com/publications/TR2016-105}
    • }
  •  Basciftci, Y.O., Wang, Y., Ishwar, P., "On Privacy-Utility Tradeoffs for Constrained Data Release Mechanisms", IEEE Information Theory and Applications Workshop (ITA), February 2016.
    BibTeX TR2016-019 PDF
    • @inproceedings{Basciftci2016feb,
    • author = {Basciftci, Yuksel Ozan and Wang, Ye and Ishwar, Prakash},
    • title = {On Privacy-Utility Tradeoffs for Constrained Data Release Mechanisms},
    • booktitle = {IEEE Information Theory and Applications Workshop (ITA)},
    • year = 2016,
    • month = feb,
    • url = {https://www.merl.com/publications/TR2016-019}
    • }
  •  Wang, Y., Ishwar, P., Rane, S., "An Elementary Completeness Proof for Secure Two-party Computation Primitives", IEEE Information Theory Workshop (ITW), DOI: 10.1109/​ITW.2014.6970886, November 2014, pp. 521-525.
    BibTeX TR2014-092 PDF
    • @inproceedings{Wang2014nov,
    • author = {Wang, Y. and Ishwar, P. and Rane, S.},
    • title = {An Elementary Completeness Proof for Secure Two-party Computation Primitives},
    • booktitle = {IEEE Information Theory Workshop (ITW)},
    • year = 2014,
    • pages = {521--525},
    • month = nov,
    • publisher = {IEEE},
    • doi = {10.1109/ITW.2014.6970886},
    • issn = {1662-9019},
    • url = {https://www.merl.com/publications/TR2014-092}
    • }
  •  Wang, Y., Rane, S.D., Ishwar, P., Sun, W., "Unconditionally Secure Computation on Large Distributed Databases with Vanishing Cost", arXiv, February 2014.
    BibTeX arXiv
    • @article{Wang2014feb1,
    • author = {Wang, Y. and Rane, S.D. and Ishwar, P. and Sun, W.},
    • title = {Unconditionally Secure Computation on Large Distributed Databases with Vanishing Cost},
    • journal = {arXiv},
    • year = 2014,
    • month = feb,
    • url = {https://arxiv.org/abs/1010.0670}
    • }
  •  Wang, Y., Rane, S., Ishwar, P., "On Unconditionally Secure Multiparty Computation for Realizing Correlated Equilibria in Games", IEEE Global Conference on Signal and Information Processing (GlobalSIP), December 2013.
    BibTeX TR2013-113 PDF
    • @inproceedings{Wang2013dec3,
    • author = {Wang, Y. and Rane, S. and Ishwar, P.},
    • title = {On Unconditionally Secure Multiparty Computation for Realizing Correlated Equilibria in Games},
    • booktitle = {IEEE Global Conference on Signal and Information Processing (GlobalSIP)},
    • year = 2013,
    • month = dec,
    • url = {https://www.merl.com/publications/TR2013-113}
    • }
  •  Rane, S., Wang, Y., Draper, S.C., Ishwar, P., "Secure Biometrics: Concepts, Authentication Architectures & Challenges", IEEE Signal Processing Magazine, DOI: 10.1109/​MSP.2013.2261691, Vol. 30, No. 5, pp. 51-64, September 2013.
    BibTeX TR2013-030 PDF
    • @article{Rane2013aug,
    • author = {Rane, S. and Wang, Y. and Draper, S.C. and Ishwar, P.},
    • title = {Secure Biometrics: Concepts, Authentication Architectures & Challenges},
    • journal = {IEEE Signal Processing Magazine},
    • year = 2013,
    • volume = 30,
    • number = 5,
    • pages = {51--64},
    • month = aug,
    • doi = {10.1109/MSP.2013.2261691},
    • issn = {1053-5888},
    • url = {https://www.merl.com/publications/TR2013-030}
    • }
  •  Wang, Y., Ishwar, P., Rane, S., "Information-Theoretically Secure Three-Party Computation with One Corrupted Party", IEEE International Symposium on Information Theory (ISIT), DOI: 10.1109/​ISIT.2013.6620808, July 2013, pp. 3160-3164.
    BibTeX TR2013-077 PDF
    • @inproceedings{Wang2013jul3,
    • author = {Wang, Y. and Ishwar, P. and Rane, S.},
    • title = {Information-Theoretically Secure Three-Party Computation with One Corrupted Party},
    • booktitle = {IEEE International Symposium on Information Theory (ISIT)},
    • year = 2013,
    • pages = {3160--3164},
    • month = jul,
    • doi = {10.1109/ISIT.2013.6620808},
    • issn = {2157-8095},
    • url = {https://www.merl.com/publications/TR2013-077}
    • }
  •  Lin, B.-R., Wang, Y., Rane, S., "On the Benefits of Sampling in Privacy Preserving Statistical Analysis on Distributed Databases", arXiv, April 2013.
    BibTeX arXiv
    • @article{Lin2013apr2,
    • author = {Lin, B.-R. and Wang, Y. and Rane, S.},
    • title = {On the Benefits of Sampling in Privacy Preserving Statistical Analysis on Distributed Databases},
    • journal = {arXiv},
    • year = 2013,
    • month = apr,
    • url = {https://arxiv.org/abs/1304.4613}
    • }
  •  Lin, B.-R., Wang, Y., Rane, S., "A Framework for Privacy Preserving Statistical Analysis on Distributed Databases", IEEE International Workshop on Information Forensics and Security (WIFS), December 2012, pp. 61-66.
    BibTeX TR2012-064 PDF
    • @inproceedings{Lin2012dec,
    • author = {Lin, B.-R. and Wang, Y. and Rane, S.},
    • title = {A Framework for Privacy Preserving Statistical Analysis on Distributed Databases},
    • booktitle = {IEEE International Workshop on Information Forensics and Security (WIFS)},
    • year = 2012,
    • pages = {61--66},
    • month = dec,
    • isbn = {978-1-4673-2286-7},
    • url = {https://www.merl.com/publications/TR2012-064}
    • }
  •  Wang, Y., Rane, S., Draper, S.C., Ishwar, P., "A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems", IEEE Transactions on Information Forensics and Security, Vol. 7, No. 6, pp. 1825-1840, July 2012.
    BibTeX TR2012-051 PDF
    • @article{Wang2012jul,
    • author = {Wang, Y. and Rane, S. and Draper, S.C. and Ishwar, P.},
    • title = {A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems},
    • journal = {IEEE Transactions on Information Forensics and Security},
    • year = 2012,
    • volume = 7,
    • number = 6,
    • pages = {1825--1840},
    • month = jul,
    • issn = {1556-6013},
    • url = {https://www.merl.com/publications/TR2012-051}
    • }
  •  Wang, Y., Ishwar, P., Rane, S., "Information-Theoretically Secure Three-party Computation with One Active Adversary", arXiv, June 2012.
    BibTeX arXiv
    • @article{Wang2012jun,
    • author = {Wang, Y. and Ishwar, P. and Rane, S.},
    • title = {Information-Theoretically Secure Three-party Computation with One Active Adversary},
    • journal = {arXiv},
    • year = 2012,
    • month = jun,
    • url = {https://arxiv.org/abs/1206.2669v1}
    • }
  •  Wang, Y., Porikli, F., "Multiple Dictionary Learning for Blocking Artifacts Reduction", IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), March 2012.
    BibTeX TR2012-014 PDF
    • @inproceedings{Wang2012mar1,
    • author = {Wang, Y. and Porikli, F.},
    • title = {Multiple Dictionary Learning for Blocking Artifacts Reduction},
    • booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)},
    • year = 2012,
    • month = mar,
    • url = {https://www.merl.com/publications/TR2012-014}
    • }
  •  Wang, Y., Rane, S., Draper, S.C., Ishwar, P., "An Information-Theoretic Analysis of Revocability and Reusability in Secure Biometrics", IEEE Information Theory and Applications Workshop (ITA), February 2011.
    BibTeX TR2011-005 PDF
    • @inproceedings{Wang2011feb,
    • author = {Wang, Y. and Rane, S. and Draper, S.C. and Ishwar, P.},
    • title = {An Information-Theoretic Analysis of Revocability and Reusability in Secure Biometrics},
    • booktitle = {IEEE Information Theory and Applications Workshop (ITA)},
    • year = 2011,
    • month = feb,
    • url = {https://www.merl.com/publications/TR2011-005}
    • }
  •  Wang, Y., Rane, S., Sun, W., Ishwar, P., "On Unconditionally Secure Computation with Vanishing Communication Cost", Allerton Conference on Communication, Control, and Computing, DOI: 10.1109/​ALLERTON.2010.5707010, September 2010.
    BibTeX TR2010-092 PDF
    • @inproceedings{Wang2010sep,
    • author = {Wang, Y. and Rane, S. and Sun, W. and Ishwar, P.},
    • title = {On Unconditionally Secure Computation with Vanishing Communication Cost},
    • booktitle = {Allerton Conference on Communication, Control, and Computing},
    • year = 2010,
    • month = sep,
    • doi = {10.1109/ALLERTON.2010.5707010},
    • url = {https://www.merl.com/publications/TR2010-092}
    • }