- Koike-Akino, T., Mahajan, R., Marks, T.K., Tuzel, C.O., Wang, Y., Watanabe, S., Orlik, P.V., "High-Accuracy User Identification Using EEG Biometrics", International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), DOI: 10.1109/EMBC.2016.7590835, August 2016, pp. 854-858.
BibTeX TR2016-105 PDF Presentation- @inproceedings{Koike-Akino2016aug,
- author = {Koike-Akino, Toshiaki and Mahajan, Ruhi and Marks, Tim K. and Tuzel, C. Oncel and Wang, Ye and Watanabe, Shinji and Orlik, Philip V.},
- title = {{High-Accuracy User Identification Using EEG Biometrics}},
- booktitle = {International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)},
- year = 2016,
- pages = {854--858},
- month = aug,
- doi = {10.1109/EMBC.2016.7590835},
- url = {https://www.merl.com/publications/TR2016-105}
- }
- Basciftci, Y.O., Wang, Y., Ishwar, P., "On Privacy-Utility Tradeoffs for Constrained Data Release Mechanisms", IEEE Information Theory and Applications Workshop (ITA), February 2016.
BibTeX TR2016-019 PDF- @inproceedings{Basciftci2016feb,
- author = {Basciftci, Yuksel Ozan and Wang, Ye and Ishwar, Prakash},
- title = {{On Privacy-Utility Tradeoffs for Constrained Data Release Mechanisms}},
- booktitle = {IEEE Information Theory and Applications Workshop (ITA)},
- year = 2016,
- month = feb,
- url = {https://www.merl.com/publications/TR2016-019}
- }
- Wang, Y., Ishwar, P., Rane, S., "An Elementary Completeness Proof for Secure Two-party Computation Primitives", IEEE Information Theory Workshop (ITW), DOI: 10.1109/ITW.2014.6970886, November 2014, pp. 521-525.
BibTeX TR2014-092 PDF- @inproceedings{Wang2014nov,
- author = {Wang, Y. and Ishwar, P. and Rane, S.},
- title = {{An Elementary Completeness Proof for Secure Two-party Computation Primitives}},
- booktitle = {IEEE Information Theory Workshop (ITW)},
- year = 2014,
- pages = {521--525},
- month = nov,
- publisher = {IEEE},
- doi = {10.1109/ITW.2014.6970886},
- issn = {1662-9019},
- url = {https://www.merl.com/publications/TR2014-092}
- }
- Wang, Y., Rane, S.D., Ishwar, P., Sun, W., "Unconditionally Secure Computation on Large Distributed Databases with Vanishing Cost", arXiv, February 2014.
BibTeX arXiv- @article{Wang2014feb1,
- author = {Wang, Y. and Rane, S.D. and Ishwar, P. and Sun, W.},
- title = {{Unconditionally Secure Computation on Large Distributed Databases with Vanishing Cost}},
- journal = {arXiv},
- year = 2014,
- month = feb,
- url = {https://arxiv.org/abs/1010.0670}
- }
- Wang, Y., Rane, S., Ishwar, P., "On Unconditionally Secure Multiparty Computation for Realizing Correlated Equilibria in Games", IEEE Global Conference on Signal and Information Processing (GlobalSIP), December 2013.
BibTeX TR2013-113 PDF- @inproceedings{Wang2013dec3,
- author = {Wang, Y. and Rane, S. and Ishwar, P.},
- title = {{On Unconditionally Secure Multiparty Computation for Realizing Correlated Equilibria in Games}},
- booktitle = {IEEE Global Conference on Signal and Information Processing (GlobalSIP)},
- year = 2013,
- month = dec,
- url = {https://www.merl.com/publications/TR2013-113}
- }
- Rane, S., Wang, Y., Draper, S.C., Ishwar, P., "Secure Biometrics: Concepts, Authentication Architectures & Challenges", IEEE Signal Processing Magazine, DOI: 10.1109/MSP.2013.2261691, Vol. 30, No. 5, pp. 51-64, September 2013.
BibTeX TR2013-030 PDF- @article{Rane2013aug,
- author = {Rane, S. and Wang, Y. and Draper, S.C. and Ishwar, P.},
- title = {{Secure Biometrics: Concepts, Authentication Architectures \& Challenges}},
- journal = {IEEE Signal Processing Magazine},
- year = 2013,
- volume = 30,
- number = 5,
- pages = {51--64},
- month = aug,
- doi = {10.1109/MSP.2013.2261691},
- issn = {1053-5888},
- url = {https://www.merl.com/publications/TR2013-030}
- }
- Wang, Y., Ishwar, P., Rane, S., "Information-Theoretically Secure Three-Party Computation with One Corrupted Party", IEEE International Symposium on Information Theory (ISIT), DOI: 10.1109/ISIT.2013.6620808, July 2013, pp. 3160-3164.
BibTeX TR2013-077 PDF- @inproceedings{Wang2013jul3,
- author = {Wang, Y. and Ishwar, P. and Rane, S.},
- title = {{Information-Theoretically Secure Three-Party Computation with One Corrupted Party}},
- booktitle = {IEEE International Symposium on Information Theory (ISIT)},
- year = 2013,
- pages = {3160--3164},
- month = jul,
- doi = {10.1109/ISIT.2013.6620808},
- issn = {2157-8095},
- url = {https://www.merl.com/publications/TR2013-077}
- }
- Lin, B.-R., Wang, Y., Rane, S., "On the Benefits of Sampling in Privacy Preserving Statistical Analysis on Distributed Databases", arXiv, April 2013.
BibTeX arXiv- @article{Lin2013apr2,
- author = {Lin, B.-R. and Wang, Y. and Rane, S.},
- title = {{On the Benefits of Sampling in Privacy Preserving Statistical Analysis on Distributed Databases}},
- journal = {arXiv},
- year = 2013,
- month = apr,
- url = {https://arxiv.org/abs/1304.4613}
- }
- Lin, B.-R., Wang, Y., Rane, S., "A Framework for Privacy Preserving Statistical Analysis on Distributed Databases", IEEE International Workshop on Information Forensics and Security (WIFS), December 2012, pp. 61-66.
BibTeX TR2012-064 PDF- @inproceedings{Lin2012dec,
- author = {Lin, B.-R. and Wang, Y. and Rane, S.},
- title = {{A Framework for Privacy Preserving Statistical Analysis on Distributed Databases}},
- booktitle = {IEEE International Workshop on Information Forensics and Security (WIFS)},
- year = 2012,
- pages = {61--66},
- month = dec,
- isbn = {978-1-4673-2286-7},
- url = {https://www.merl.com/publications/TR2012-064}
- }
- Wang, Y., Rane, S., Draper, S.C., Ishwar, P., "A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems", IEEE Transactions on Information Forensics and Security, Vol. 7, No. 6, pp. 1825-1840, July 2012.
BibTeX TR2012-051 PDF- @article{Wang2012jul,
- author = {Wang, Y. and Rane, S. and Draper, S.C. and Ishwar, P.},
- title = {{A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems}},
- journal = {IEEE Transactions on Information Forensics and Security},
- year = 2012,
- volume = 7,
- number = 6,
- pages = {1825--1840},
- month = jul,
- issn = {1556-6013},
- url = {https://www.merl.com/publications/TR2012-051}
- }
- Wang, Y., Ishwar, P., Rane, S., "Information-Theoretically Secure Three-party Computation with One Active Adversary", arXiv, June 2012.
BibTeX arXiv- @article{Wang2012jun,
- author = {Wang, Y. and Ishwar, P. and Rane, S.},
- title = {{Information-Theoretically Secure Three-party Computation with One Active Adversary}},
- journal = {arXiv},
- year = 2012,
- month = jun,
- url = {https://arxiv.org/abs/1206.2669}
- }
- Wang, Y., Porikli, F., "Multiple Dictionary Learning for Blocking Artifacts Reduction", IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), March 2012.
BibTeX TR2012-014 PDF- @inproceedings{Wang2012mar1,
- author = {Wang, Y. and Porikli, F.},
- title = {{Multiple Dictionary Learning for Blocking Artifacts Reduction}},
- booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)},
- year = 2012,
- month = mar,
- url = {https://www.merl.com/publications/TR2012-014}
- }
- Wang, Y., Rane, S., Draper, S.C., Ishwar, P., "An Information-Theoretic Analysis of Revocability and Reusability in Secure Biometrics", IEEE Information Theory and Applications Workshop (ITA), February 2011.
BibTeX TR2011-005 PDF- @inproceedings{Wang2011feb,
- author = {Wang, Y. and Rane, S. and Draper, S.C. and Ishwar, P.},
- title = {{An Information-Theoretic Analysis of Revocability and Reusability in Secure Biometrics}},
- booktitle = {IEEE Information Theory and Applications Workshop (ITA)},
- year = 2011,
- month = feb,
- url = {https://www.merl.com/publications/TR2011-005}
- }
- Wang, Y., Rane, S., Sun, W., Ishwar, P., "On Unconditionally Secure Computation with Vanishing Communication Cost", Allerton Conference on Communication, Control, and Computing, DOI: 10.1109/ALLERTON.2010.5707010, September 2010.
BibTeX TR2010-092 PDF- @inproceedings{Wang2010sep,
- author = {Wang, Y. and Rane, S. and Sun, W. and Ishwar, P.},
- title = {{On Unconditionally Secure Computation with Vanishing Communication Cost}},
- booktitle = {Allerton Conference on Communication, Control, and Computing},
- year = 2010,
- month = sep,
- doi = {10.1109/ALLERTON.2010.5707010},
- url = {https://www.merl.com/publications/TR2010-092}
- }