Salman Salamatian
Salman Salamatian
PhD candidate, MIT
Verified email at mit.edu
TitleCited byYear
From the information bottleneck to the privacy funnel
A Makhdoumi, S Salamatian, N Fawaz, M Médard
2014 IEEE Information Theory Workshop (ITW 2014), 501-505, 2014
572014
How to hide the elephant-or the donkey-in the room: Practical privacy against statistical inference for large data
S Salamatian, A Zhang, F du Pin Calmon, S Bhamidipati, N Fawaz, ...
2013 IEEE Global Conference on Signal and Information Processing, 269-272, 2013
482013
Managing your private and public data: Bringing down inference attacks against your privacy
S Salamatian, A Zhang, F du Pin Calmon, S Bhamidipati, N Fawaz, ...
IEEE Journal of Selected Topics in Signal Processing 9 (7), 1240-1255, 2015
302015
Generalizing bottleneck problems
H Hsu, S Asoodeh, S Salamatian, FP Calmon
2018 IEEE International Symposium on Information Theory (ISIT), 531-535, 2018
72018
Guessing with limited memory
W Huleihel, S Salamatian, M Médard
2017 IEEE International Symposium on Information Theory (ISIT), 2253-2257, 2017
62017
Why botnets work: Distributed brute-force attacks need no synchronization
S Salamatian, W Huleihel, A Beirami, A Cohen, M Médard
IEEE Transactions on Information Forensics and Security 14 (9), 2288-2299, 2019
52019
SPPM: Sparse Privacy Preserving Mappings.
S Salamatian, N Fawaz, B Kveton, N Taft
UAI, 712-721, 2014
42014
Centralized vs decentralized multi-agent guesswork
S Salamatian, A Beirami, A Cohen, M Médard
2017 IEEE International Symposium on Information Theory (ISIT), 2258-2262, 2017
32017
Privacy against inference attacks for large data
N Fawaz, S Salamatian, F du Pin Calmon, SS Bhamidipati, PC Oliveira, ...
US Patent App. 14/765,601, 2015
32015
Maximum Entropy Functions: Approximate Gacs-Korner for Distributed Compression
S Salamatian, A Cohen, M Médard
arXiv preprint arXiv:1604.03877, 2016
12016
Privacy against inference attacks under mismatched prior
N Fawaz, S Salamatian, F du Pin Calmon, SS Bhamidipati, PC Oliveira, ...
US Patent App. 14/765,603, 2016
12016
Efficient coding for multi-source networks using Gács-Körner common information
S Salamatian, A Cohen, M Médard
2016 International Symposium on Information Theory and Its Applications …, 2016
12016
A Successive Description Property of Monotone-Chain Polar Codes for Slepian-Wolf Coding
S Salamatian, M Médard, E Telatar
2015 IEEE International Symposium on Information Theory (ISIT), 1522-1526, 2015
12015
Mismatched Guesswork
S Salamatian, L Liu, A Beirami, M Médard
arXiv preprint arXiv:1907.00531, 2019
2019
Correspondence analysis using neural networks
H Hsu, S Salamatian, FP Calmon
arXiv preprint arXiv:1902.07828, 2019
2019
Gaussian intersymbol interference channels with mismatch
W Huleihel, S Salamatian, N Merhav, M Médard
IEEE Transactions on Information Theory, 2019
2019
Correspondence Analysis of Government Expenditure Patterns
H Hsu, FP Calmon, AP Calmon, S Salamatian
arXiv preprint arXiv:1812.01105, 2018
2018
Deep Orthogonal Representations: Fundamental Properties and Applications
H Hsu, S Salamatian, FP Calmon
arXiv preprint arXiv:1806.08449, 2018
2018
Gaussian ISI channels with mismatch
W Huleihel, S Salamatian, N Merhav, M Médard
2017 IEEE International Symposium on Information Theory (ISIT), 2815-2819, 2017
2017
Reducing Security Risks of Suspicious Data and Codes Through a Novel Dynamic Defense Model....................
Y Li, X Ren, S Yang, X Yang, C Xu, J Ren, D Zhang, Y Zhang, Z Qin, ...
The system can't perform the operation now. Try again later.
Articles 1–20