Publications

111 / 3,609 publications found.


  •  Wang, Y., Rane, S.D., Ishwar, P., Sun, W., "Unconditionally Secure Computation on Large Distributed Databases with Vanishing Cost", arXiv, February 2014.
    BibTeX arXiv
    • @article{Wang2014feb1,
    • author = {Wang, Y. and Rane, S.D. and Ishwar, P. and Sun, W.},
    • title = {Unconditionally Secure Computation on Large Distributed Databases with Vanishing Cost},
    • journal = {arXiv},
    • year = 2014,
    • month = feb,
    • url = {https://arxiv.org/abs/1010.0670}
    • }
  •  Wang, Y., Rane, S., Ishwar, P., "On Unconditionally Secure Multiparty Computation for Realizing Correlated Equilibria in Games", IEEE Global Conference on Signal and Information Processing (GlobalSIP), December 2013.
    BibTeX TR2013-113 PDF
    • @inproceedings{Wang2013dec3,
    • author = {Wang, Y. and Rane, S. and Ishwar, P.},
    • title = {On Unconditionally Secure Multiparty Computation for Realizing Correlated Equilibria in Games},
    • booktitle = {IEEE Global Conference on Signal and Information Processing (GlobalSIP)},
    • year = 2013,
    • month = dec,
    • url = {https://www.merl.com/publications/TR2013-113}
    • }
  •  Rane, S., Wang, Y., Draper, S.C., Ishwar, P., "Secure Biometrics: Concepts, Authentication Architectures & Challenges", IEEE Signal Processing Magazine, DOI: 10.1109/​MSP.2013.2261691, Vol. 30, No. 5, pp. 51-64, September 2013.
    BibTeX TR2013-030 PDF
    • @article{Rane2013aug,
    • author = {Rane, S. and Wang, Y. and Draper, S.C. and Ishwar, P.},
    • title = {Secure Biometrics: Concepts, Authentication Architectures & Challenges},
    • journal = {IEEE Signal Processing Magazine},
    • year = 2013,
    • volume = 30,
    • number = 5,
    • pages = {51--64},
    • month = aug,
    • doi = {10.1109/MSP.2013.2261691},
    • issn = {1053-5888},
    • url = {https://www.merl.com/publications/TR2013-030}
    • }
  •  Wang, Y., Ishwar, P., Rane, S., "Information-Theoretically Secure Three-Party Computation with One Corrupted Party", IEEE International Symposium on Information Theory (ISIT), DOI: 10.1109/​ISIT.2013.6620808, July 2013, pp. 3160-3164.
    BibTeX TR2013-077 PDF
    • @inproceedings{Wang2013jul3,
    • author = {Wang, Y. and Ishwar, P. and Rane, S.},
    • title = {Information-Theoretically Secure Three-Party Computation with One Corrupted Party},
    • booktitle = {IEEE International Symposium on Information Theory (ISIT)},
    • year = 2013,
    • pages = {3160--3164},
    • month = jul,
    • doi = {10.1109/ISIT.2013.6620808},
    • issn = {2157-8095},
    • url = {https://www.merl.com/publications/TR2013-077}
    • }
  •  Lin, B.-R., Wang, Y., Rane, S., "On the Benefits of Sampling in Privacy Preserving Statistical Analysis on Distributed Databases", arXiv, April 2013.
    BibTeX arXiv
    • @article{Lin2013apr2,
    • author = {Lin, B.-R. and Wang, Y. and Rane, S.},
    • title = {On the Benefits of Sampling in Privacy Preserving Statistical Analysis on Distributed Databases},
    • journal = {arXiv},
    • year = 2013,
    • month = apr,
    • url = {https://arxiv.org/abs/1304.4613}
    • }
  •  Lin, B.-R., Wang, Y., Rane, S., "A Framework for Privacy Preserving Statistical Analysis on Distributed Databases", IEEE International Workshop on Information Forensics and Security (WIFS), December 2012, pp. 61-66.
    BibTeX TR2012-064 PDF
    • @inproceedings{Lin2012dec,
    • author = {Lin, B.-R. and Wang, Y. and Rane, S.},
    • title = {A Framework for Privacy Preserving Statistical Analysis on Distributed Databases},
    • booktitle = {IEEE International Workshop on Information Forensics and Security (WIFS)},
    • year = 2012,
    • pages = {61--66},
    • month = dec,
    • isbn = {978-1-4673-2286-7},
    • url = {https://www.merl.com/publications/TR2012-064}
    • }
  •  Wang, Y., Rane, S., Draper, S.C., Ishwar, P., "A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems", IEEE Transactions on Information Forensics and Security, Vol. 7, No. 6, pp. 1825-1840, July 2012.
    BibTeX TR2012-051 PDF
    • @article{Wang2012jul,
    • author = {Wang, Y. and Rane, S. and Draper, S.C. and Ishwar, P.},
    • title = {A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems},
    • journal = {IEEE Transactions on Information Forensics and Security},
    • year = 2012,
    • volume = 7,
    • number = 6,
    • pages = {1825--1840},
    • month = jul,
    • issn = {1556-6013},
    • url = {https://www.merl.com/publications/TR2012-051}
    • }
  •  Wang, Y., Ishwar, P., Rane, S., "Information-Theoretically Secure Three-party Computation with One Active Adversary", arXiv, June 2012.
    BibTeX arXiv
    • @article{Wang2012jun,
    • author = {Wang, Y. and Ishwar, P. and Rane, S.},
    • title = {Information-Theoretically Secure Three-party Computation with One Active Adversary},
    • journal = {arXiv},
    • year = 2012,
    • month = jun,
    • url = {https://arxiv.org/abs/1206.2669v1}
    • }
  •  Wang, Y., Porikli, F., "Multiple Dictionary Learning for Blocking Artifacts Reduction", IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), March 2012.
    BibTeX TR2012-014 PDF
    • @inproceedings{Wang2012mar1,
    • author = {Wang, Y. and Porikli, F.},
    • title = {Multiple Dictionary Learning for Blocking Artifacts Reduction},
    • booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)},
    • year = 2012,
    • month = mar,
    • url = {https://www.merl.com/publications/TR2012-014}
    • }
  •  Wang, Y., Rane, S., Draper, S.C., Ishwar, P., "An Information-Theoretic Analysis of Revocability and Reusability in Secure Biometrics", IEEE Information Theory and Applications Workshop (ITA), February 2011.
    BibTeX TR2011-005 PDF
    • @inproceedings{Wang2011feb,
    • author = {Wang, Y. and Rane, S. and Draper, S.C. and Ishwar, P.},
    • title = {An Information-Theoretic Analysis of Revocability and Reusability in Secure Biometrics},
    • booktitle = {IEEE Information Theory and Applications Workshop (ITA)},
    • year = 2011,
    • month = feb,
    • url = {https://www.merl.com/publications/TR2011-005}
    • }
  •  Wang, Y., Rane, S., Sun, W., Ishwar, P., "On Unconditionally Secure Computation with Vanishing Communication Cost", Allerton Conference on Communication, Control, and Computing, DOI: 10.1109/​ALLERTON.2010.5707010, September 2010.
    BibTeX TR2010-092 PDF
    • @inproceedings{Wang2010sep,
    • author = {Wang, Y. and Rane, S. and Sun, W. and Ishwar, P.},
    • title = {On Unconditionally Secure Computation with Vanishing Communication Cost},
    • booktitle = {Allerton Conference on Communication, Control, and Computing},
    • year = 2010,
    • month = sep,
    • doi = {10.1109/ALLERTON.2010.5707010},
    • url = {https://www.merl.com/publications/TR2010-092}
    • }