default search action
Parv Venkitasubramaniam
Person information
- affiliation: Lehigh University, Bethlehem, PA, USA
- affiliation (PhD 2007): Cornell University, Ithaca, NY, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i11]Ce Feng, Parv Venkitasubramaniam:
RQP-SGD: Differential Private Machine Learning through Noisy SGD and Randomized Quantization. CoRR abs/2402.06606 (2024) - [i10]Rui Xu, Yue Sun, Chao Chen, Parv Venkitasubramaniam, Sihong Xie:
Robust Conformal Prediction under Distribution Shift via Physics-Informed Structural Causal Model. CoRR abs/2403.15025 (2024) - [i9]Yue Sun, Chao Chen, Yuesheng Xu, Sihong Xie, Rick S. Blum, Parv Venkitasubramaniam:
Incorporating Domain Differential Equations into Graph Convolutional Networks to Lower Generalization Discrepancy. CoRR abs/2404.01217 (2024) - 2023
- [c47]Elham Jamalinia, Parv Venkitasubramaniam:
Prospect Theoretic Contract Design in a Stackelberg Game via Bayesian Inference. CISS 2023: 1-6 - [c46]Ce Feng, Nuo Xu, Wujie Wen, Parv Venkitasubramaniam, Caiwen Ding:
Spectral-DP: Differentially Private Deep Learning through Spectral Perturbation and Filtering. SP 2023: 1944-1960 - [i8]Ce Feng, Nuo Xu, Wujie Wen, Parv Venkitasubramaniam, Caiwen Ding:
Spectral-DP: Differentially Private Deep Learning through Spectral Perturbation and Filtering. CoRR abs/2307.13231 (2023) - [i7]Xiaoyu Ge, Kamelia Norouzi, Faegheh Moazeni, Mirel Sehic, Javad Khazaei, Parv Venkitasubramaniam, Rick S. Blum:
Vulnerability of Building Energy Management against Targeted False Data Injection Attacks: Model Predictive Control vs. Proportional Integral. CoRR abs/2312.03588 (2023) - 2022
- [j25]Nayara Aguiar, Parv Venkitasubramaniam, Vijay Gupta:
Data-Driven Contract Design for Multi-Agent Systems With Collusion Detection. IEEE Signal Process. Lett. 29: 1002-1006 (2022) - [j24]Nicholas LaRosa, Jacob Farber, Parv Venkitasubramaniam, Rick S. Blum, Ahmad Al Rashdan:
Separating Sensor Anomalies From Process Anomalies in Data-Driven Anomaly Detection. IEEE Signal Process. Lett. 29: 1704-1708 (2022) - [j23]Ce Feng, Parv Venkitasubramaniam:
Inferential Separation for Privacy: Irrelevant Statistics and Quantization. IEEE Trans. Inf. Forensics Secur. 17: 2241-2255 (2022) - [c45]Nuo Xu, Binghui Wang, Ran Ran, Wujie Wen, Parv Venkitasubramaniam:
NeuGuard: Lightweight Neuron-Guided Defense against Membership Inference Attacks. ACSAC 2022: 669-683 - [i6]Nuo Xu, Binghui Wang, Ran Ran, Wujie Wen, Parv Venkitasubramaniam:
NeuGuard: Lightweight Neuron-Guided Defense against Membership Inference Attacks. CoRR abs/2206.05565 (2022) - 2021
- [i5]Nayara Aguiar, Parv Venkitasubramaniam, Vijay Gupta:
Data-Driven Contract Design for Multi-Agent Systems with Collusion Detection. CoRR abs/2105.02931 (2021) - 2020
- [j22]Ruochi Zhang, Parv Venkitasubramaniam:
False Data Injection and Detection in LQG Systems: A Game Theoretic Approach. IEEE Trans. Control. Netw. Syst. 7(1): 338-348 (2020) - [j21]Ruochi Zhang, Parv Venkitasubramaniam:
Optimal Local Differentially Private Quantization. IEEE Trans. Signal Process. 68: 6509-6520 (2020)
2010 – 2019
- 2019
- [c44]Parv Venkitasubramaniam, Vijay Gupta:
Data-driven Contract Design. ACC 2019: 2283-2288 - [i4]Kostas Hatalis, Parv Venkitasubramaniam, Shalinee Kishore:
Modeling and Detection of Future Cyber-Enabled DSM Data Attacks using Supervised Learning. CoRR abs/1909.12894 (2019) - 2018
- [j20]Omid Javidbakht, Parv Venkitasubramaniam:
Relay Selection and Operation Control for Optimal Delay Anonymity Tradeoff in Anonymous Networks. IEEE Trans. Control. Netw. Syst. 5(1): 607-617 (2018) - [j19]Jiyun Yao, Parv Venkitasubramaniam:
Privacy Aware Stochastic Games for Distributed End-User Energy Storage Sharing. IEEE Trans. Signal Inf. Process. over Networks 4(1): 82-95 (2018) - [c43]Ruochi Zhang, Parv Venkitasubramaniam:
Optimal Multi-Source Inference Privacy - A Generalized Lloyd-Max Algorithm. Allerton 2018: 219-226 - [c42]Omid Javidbakht, Parv Venkitasubramaniam, Alberto J. Lamadrid:
Coupon Targeting Competition in Privacy Sensitive Market. Allerton 2018: 267-274 - [c41]Ruochi Zhang, Parv Venkitasubramaniam:
Optimal Distribution Mapping for Inference Privacy. APSIPA 2018: 1179-1187 - [c40]Ruochi Zhang, Parv Venkitasubramaniam:
Mutual-Information-Private Online Gradient Descent Algorithm. ICASSP 2018: 2077-2081 - 2017
- [j18]Parth Pradhan, Parv Venkitasubramaniam:
Stealthy Attacks in Dynamical Systems: Tradeoffs Between Utility and Detectability With Application in Anonymous Systems. IEEE Trans. Inf. Forensics Secur. 12(4): 779-792 (2017) - [j17]Ruochi Zhang, Parv Venkitasubramaniam:
Stealthy Control Signal Attacks in Linear Quadratic Gaussian Control Systems: Detectability Reward Tradeoff. IEEE Trans. Inf. Forensics Secur. 12(7): 1555-1570 (2017) - [j16]Omid Javidbakht, Parv Venkitasubramaniam:
Delay Anonymity Tradeoff in Mix Networks: Optimal Routing. IEEE/ACM Trans. Netw. 25(2): 1162-1175 (2017) - [c39]Jiyun Yao, Parv Venkitasubramaniam, Shalinee Kishore, Lawrence V. Snyder, Rick S. Blum:
Network topology risk assessment of stealthy cyber attacks on advanced metering infrastructure networks. CISS 2017: 1-6 - [c38]Ruochi Zhang, Parv Venkitasubramaniam:
A game theoretic approach to analyze false data injection and detection in LQG system. CNS 2017: 427-431 - 2016
- [j15]Abhishek Mishra, Parv Venkitasubramaniam:
Anonymity and Fairness in Packet Scheduling: A Quantitative Tradeoff. IEEE/ACM Trans. Netw. 24(2): 688-702 (2016) - [j14]Sachin Kadloor, Negar Kiyavash, Parv Venkitasubramaniam:
Mitigating Timing Side Channel in Shared Schedulers. IEEE/ACM Trans. Netw. 24(3): 1562-1573 (2016) - [c37]Ruochi Zhang, Parv Venkitasubramaniam:
Stealthy control signal attacks in vector LQG systems. ACC 2016: 1179-1184 - [c36]Jiyun Yao, Parv Venkitasubramaniam:
Stochastic games of end-user energy storage sharing. CDC 2016: 4965-4972 - [c35]Omid Javidbakht, Parv Venkitasubramaniam:
Differential privacy in networked data collection. CISS 2016: 117-122 - [c34]Parth Pradhan, Kyatsandra G. Nagananda, Parv Venkitasubramaniam, Shalinee Kishore, Rick S. Blum:
GPS spoofing attack characterization and detection in smart grids. CNS 2016: 391-395 - 2015
- [j13]Parv Venkitasubramaniam, Jiyun Yao, Parth Pradhan:
Information-Theoretic Security in Stochastic Control Systems. Proc. IEEE 103(10): 1914-1931 (2015) - [j12]Parv Venkitasubramaniam, Abhishek Mishra:
Anonymity of Memory-Limited Chaum Mixes Under Timing Analysis: An Information Theoretic Perspective. IEEE Trans. Inf. Theory 61(2): 996-1009 (2015) - [j11]Jiyun Yao, Parv Venkitasubramaniam:
The Privacy Analysis of Battery Control Mechanisms in Demand Response: Revealing State Approach and Rate Distortion Bounds. IEEE Trans. Smart Grid 6(5): 2417-2425 (2015) - [c33]Ruochi Zhang, Parv Venkitasubramaniam:
Stealthy control signal attacks in scalar LQG systems. GlobalSIP 2015: 240-244 - [c32]Omid Javidbakht, Parv Venkitasubramaniam:
Relay selection for optimal delay anonymity tradeoff in anonymous networks. MILCOM 2015: 960-965 - [c31]Jiyun Yao, Parv Venkitasubramaniam:
Optimal end user energy storage sharing in demand response. SmartGridComm 2015: 175-180 - [c30]Omid Javidbakht, Parv Venkitasubramaniam:
Relay selection in wireless networks for optimal delay anonymity tradeoff. SPAWC 2015: 360-364 - 2014
- [c29]Jiyun Yao, Parv Venkitasubramaniam:
The privacy analysis of battery control mechanisms in demand response: Revealing state approach and rate distortion bounds. CDC 2014: 1377-1382 - [c28]Omid Javidbakht, Parv Venkitasubramaniam:
Rate allocation for Multihop routing in anonymous networking. CISS 2014: 1-6 - [c27]Abhishek Mishra, Parv Venkitasubramaniam:
Encompassing anonymity in signaling games. CISS 2014: 1-6 - [c26]Parth Pradhan, Parv Venkitasubramaniam:
Under the radar attacks in dynamical systems: Adversarial privacy utility tradeoffs. ITW 2014: 242-246 - 2013
- [j10]Abhishek Mishra, Parv Venkitasubramaniam:
Admissible Length Study in Anonymous Networking: A Detection Theoretic Perspective. IEEE J. Sel. Areas Commun. 31(9): 1957-1969 (2013) - [j9]Sachin Kadloor, Parv Venkitasubramaniam, Negar Kiyavash:
Preventing Timing Analysis in Networks: A Statistical Inference Perspective. IEEE Signal Process. Mag. 30(5): 76-85 (2013) - [c25]Jiyun Yao, Parv Venkitasubramaniam:
On the privacy-cost tradeoff of an in-home power storage mechanism. Allerton 2013: 115-122 - [c24]Parv Venkitasubramaniam:
Privacy in stochastic control: A Markov Decision Process perspective. Allerton 2013: 381-388 - [c23]Parv Venkitasubramaniam:
Decision making under privacy restrictions. CDC 2013: 4693-4698 - [c22]Jiyun Yao, Parv Venkitasubramaniam:
Maximizing privacy in Variable Bit rate Coding. ICASSP 2013: 2959-2963 - [c21]Abhishek Mishra, Parv Venkitasubramaniam:
Anonymity of a buffer constrained chaum mix: Optimal strategy and asymptotics. ISIT 2013: 71-75 - [c20]Abhishek Mishra, Parv Venkitasubramaniam:
Anonymity in wireless networks under capture or selective jamming: An admissible length study. WPMC 2013: 1-6 - [i3]Sachin Kadloor, Negar Kiyavash, Parv Venkitasubramaniam:
Mitigating Timing Side Channel in Shared Schedulers. CoRR abs/1302.6123 (2013) - [i2]Xun Gong, Negar Kiyavash, Parv Venkitasubramaniam:
An Information Theoretic Study of Timing Side Channels in Two-user Schedulers. CoRR abs/1306.3484 (2013) - 2012
- [j8]Parvathinathan Venkitasubramaniam, Lang Tong:
A Game-Theoretic Approach to Anonymous Networking. IEEE/ACM Trans. Netw. 20(3): 892-905 (2012) - [j7]Sachin Kadloor, Xun Gong, Negar Kiyavash, Parv Venkitasubramaniam:
Designing Router Scheduling Policies: A Privacy Perspective. IEEE Trans. Signal Process. 60(4): 2001-2012 (2012) - [c19]Abhishek Mishra, Parv Venkitasubramaniam:
Anonymity in packet scheduling under the max-min fairness criterion. CISS 2012: 1-6 - [c18]Abhishek Mishra, Parv Venkitasubramaniam:
Source anonymity in fair scheduling: A case for the proportional method. ICC 2012: 1118-1122 - [c17]Abhishek Mishra, Parv Venkitasubramaniam:
Thwarting traffic analysis: A signal processing perspective. SAM 2012: 169-172 - [c16]Sachin Kadloor, Negar Kiyavash, Parv Venkitasubramaniam:
Mitigating timing based information leakage in shared schedulers. INFOCOM 2012: 1044-1052 - [c15]Sachin Kadloor, Negar Kiyavash, Parv Venkitasubramaniam:
Scheduling with privacy constraints. ITW 2012: 40-44 - 2011
- [c14]Abhishek Mishra, Parv Venkitasubramaniam:
The anonymity of an almost fair chaum mix. Allerton 2011: 693-700 - [c13]Sachin Kadloor, Xun Gong, Negar Kiyavash, Parv Venkitasubramaniam:
Designing privacy preserving router scheduling policies. CISS 2011: 1-6 - [c12]Xun Gong, Negar Kiyavash, Parv Venkitasubramaniam:
Information theoretic analysis of side channel information leakage in FCFS schedulers. ISIT 2011: 1255-1259 - [c11]Abhishek Mishra, Parv Venkitasubramaniam:
Dummy rate analysis of buffer constrained chaum mix. SIGCOMM 2011: 408-409 - 2010
- [c10]Sachin Kadloor, Xun Gong, Negar Kiyavash, Parv Venkitasubramaniam:
Designing router scheduling policies: a privacy perspective. CCS 2010: 702-704 - [c9]Parv Venkitasubramaniam:
Anonymous Networking under Memory Constraints. ICC 2010: 1-5
2000 – 2009
- 2009
- [c8]Parvathinathan Venkitasubramaniam, Lang Tong:
Anonymous networking with localized eavesdroppers: A game-theoretic approach. CISS 2009: 278-283 - 2008
- [j6]Parv Venkitasubramaniam, Ting He, Lang Tong, Stephen B. Wicker:
Toward an analytical approach to anonymous wireless networking. IEEE Commun. Mag. 46(2): 140-146 (2008) - [j5]Parvathinathan Venkitasubramaniam, Ting He, Lang Tong:
Anonymous Networking Amidst Eavesdroppers. IEEE Trans. Inf. Theory 54(6): 2770-2784 (2008) - [c7]Parv Venkitasubramaniam, Anant Sahai:
Incentivizing anonymous "peer-to-peer" reviews. Allerton 2008: 692-699 - [c6]Parv Venkitasubramaniam, Venkat Anantharam:
Anonymity under light traffic conditions using a network of mixes. Allerton 2008: 1373-1380 - [c5]Parvathinathan Venkitasubramaniam, Lang Tong:
Throughput Anonymity Trade-off in Wireless Networks under Latency Constraints. INFOCOM 2008: 241-245 - [c4]Parvathinathan Venkitasubramaniam, Parvathinathan Anantharam:
On the anonymity of Chaum mixes. ISIT 2008: 534-538 - [c3]Parvathinathan Venkitasubramaniam, Lang Tong:
Anonymous Networking with Minimum Latency in Multihop Networks. SP 2008: 18-32 - 2007
- [j4]Parvathinathan Venkitasubramaniam, Lang Tong, Ananthram Swami:
Quantization for Maximin ARE in Distributed Estimation. IEEE Trans. Signal Process. 55(7-2): 3596-3605 (2007) - [i1]Parvathinathan Venkitasubramaniam, Ting He, Lang Tong:
Anonymous Networking amidst Eavesdroppers. CoRR abs/0710.4903 (2007) - 2006
- [c2]Parvathinathan Venkitasubramaniam, Lang Tong, Ananthram Swami:
Score-Function Quantization for Distributed Estimation. CISS 2006: 369-374 - [c1]Parvathinathan Venkitasubramaniam, Lang Tong, Ananthram Swami:
Minimax Quantization for Distributed Maximum Likelihood Estimation. ICASSP (3) 2006: 652-655 - 2005
- [j3]Parvathinathan Venkitasubramaniam, Srihari Adireddy, Lang Tong:
Sensitivity and Coding of Opportunistic ALOHA in Sensor Networks with Mobile Access. J. VLSI Signal Process. 41(3): 329-344 (2005) - 2004
- [j2]Parvathinathan Venkitasubramaniam, Srihari Adireddy, Lang Tong:
Sensor networks with mobile access: optimal random access and coding. IEEE J. Sel. Areas Commun. 22(6): 1058-1068 (2004) - [j1]Lang Tong, Vidyut Naware, Parvathinathan Venkitasubramaniam:
Signal processing in random access. IEEE Signal Process. Mag. 21(5): 29-39 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-10 20:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint