default search action
George T. Amariucai
Person information
- affiliation: Kansas State University, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Dong Qin, George T. Amariucai, Daji Qiao, Yong Guan, Shen Fu:
A comprehensive and reliable feature attribution method: Double-sided remove and reconstruct (DoRaR). Neural Networks 173: 106166 (2024) - [j13]Chandra Sharma, George T. Amariucai, Shuangqing Wei:
The Economics of Privacy and Utility: Investment Strategies. IEEE Trans. Inf. Forensics Secur. 19: 1744-1755 (2024) - [c35]Bishwas Mandal, George T. Amariucai, Shuangqing Wei:
Optimizing Privacy and Utility Tradeoffs for Group Interests Through Harmonization. IJCNN 2024: 1-10 - [c34]Bishwas Mandal, George T. Amariucai, Shuangqing Wei:
Initial Exploration of Zero-Shot Privacy Utility Tradeoffs in Tabular Data Using GPT-4. IJCNN 2024: 1-8 - [i22]Dong Qin, George T. Amariucai, Daji Qiao, Yong Guan:
Improving behavior based authentication against adversarial attack using XAI. CoRR abs/2402.16430 (2024) - [i21]Bishwas Mandal, George T. Amariucai, Shuangqing Wei:
Optimizing Privacy and Utility Tradeoffs for Group Interests Through Harmonization. CoRR abs/2404.05043 (2024) - [i20]Bishwas Mandal, George T. Amariucai, Shuangqing Wei:
Initial Exploration of Zero-Shot Privacy Utility Tradeoffs in Tabular Data Using GPT-4. CoRR abs/2404.05047 (2024) - 2023
- [j12]Stephanie Harshbarger, Mohsen Hosseinzadehtaher, Alireza Zare, Amin Y. Fard, Mohammad B. Shadmand, George T. Amariucai:
Preventing Stealthy Attacks on Power Electronics Dominated Grids. IEEE Access 11: 126312-126322 (2023) - [j11]Shahnewaz Karim Sakib, George T. Amariucai, Yong Guan:
ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications. IEEE Trans. Dependable Secur. Comput. 20(5): 3636-3652 (2023) - [j10]Shahnewaz Karim Sakib, George T. Amariucai, Yong Guan:
Measures of Information Leakage for Incomplete Statistical Information: Application to a Binary Privacy Mechanism. ACM Trans. Priv. Secur. 26(4): 47:1-47:31 (2023) - [c33]Shahnewaz Karim Sakib, George T. Amariucai, Yong Guan:
Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information. CSF 2023: 407-422 - [c32]Bipin Paudel, George T. Amariucai:
Reinforcement Learning Approach to Generate Zero-Dynamics Attacks on Control Systems Without State Space Models. ESORICS (4) 2023: 3-22 - [i19]Dong Qin, George T. Amariucai, Daji Qiao, Yong Guan, Shen Fu:
A Comprehensive and Reliable Feature Attribution Method: Double-sided Remove and Reconstruct (DoRaR). CoRR abs/2310.17945 (2023) - [i18]William Bergeron, Michael Jones, Chase Barber, Kale DeYoung, George T. Amariucai, Kaleb Ernst, Nathan Fleming, Peter Michaleas, Sandeep Pisharody, Nathan Wells, Antonio Rosa, Eugene Y. Vasserman, Jeremy Kepner:
Hypersparse Traffic Matrix Construction using GraphBLAS on a DPU. CoRR abs/2310.18334 (2023) - 2022
- [j9]Abhishek Jana, Bipin Paudel, Md. Kamruzzaman Sarker, Monireh Ebrahimi, Pascal Hitzler, George T. Amariucai:
Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication. Proc. Priv. Enhancing Technol. 2022(4): 86-104 (2022) - [c31]Shen Fu, Dong Qin, George T. Amariucai, Daji Qiao, Yong Guan, Ann Smiley:
Artificial Intelligence Meets Kinesthetic Intelligence: Mouse-based User Authentication based on Hybrid Human-Machine Learning. AsiaCCS 2022: 1034-1048 - [c30]Abiola Osho, Shuangqing Wei, George T. Amariucai:
Heuristic Gradient Optimization Approach to Controlling Susceptibility to Manipulation in Online Social Networks. CSoNet 2022: 167-178 - [c29]Bishwas Mandal, George T. Amariucai, Shuangqing Wei:
Uncertainty-Autoencoder-Based Privacy and Utility Preserving Data Type Conscious Transformation. IJCNN 2022: 1-8 - [i17]Bishwas Mandal, George T. Amariucai, Shuangqing Wei:
Uncertainty-Autoencoder-Based Privacy and Utility Preserving Data Type Conscious Transformation. CoRR abs/2205.01950 (2022) - [i16]Chandra Sharma, George T. Amariucai, Shuangqing Wei:
The Economics of Privacy and Utility: Investment Strategies. CoRR abs/2208.10253 (2022) - 2021
- [j8]Chandra Sharma, Samuel Moylan, Eugene Y. Vasserman, George T. Amariucai:
Review of the Security of Backward-Compatible Automotive Inter-ECU Communication. IEEE Access 9: 114854-114869 (2021) - [c28]Shahnewaz Karim Sakib, George T. Amariucai, Yong Guan:
Information Leakage Metrics for Adversaries with Incomplete Information: Binary Privacy Mechanism. ICC 2021: 1-7 - [c27]Chandra Sharma, Bishwas Mandal, George T. Amariucai:
A Practical Approach to Navigating the Tradeoff Between Privacy and Precise Utility. ICC 2021: 1-6 - 2020
- [c26]Abiola Osho, Caden Waters, George T. Amariucai:
An Implicit Crowdsourcing Approach to Rumor Identification in Online Social Networks. ASONAM 2020: 174-182 - [c25]Shen Fu, Dong Qin, Daji Qiao, George T. Amariucai:
RUMBA-Mouse: Rapid User Mouse-Behavior Authentication Using a CNN-RNN Approach. CNS 2020: 1-9 - [c24]Abiola Osho, Colin Goodman, George T. Amariucai:
MIDMod-OSN: A Microscopic-Level Information Diffusion Model for Online Social Networks. CSoNet 2020: 437-450 - [c23]Chandra Sharma, Nathan Miller, George T. Amariucai:
Neutralizing manipulation of critical data by enforcing data-instruction dependency. HotSoS 2020: 9:1-9:11 - [c22]Dong Qin, Shen Fu, George T. Amariucai, Daji Qiao, Yong Guan:
MAUSPAD: Mouse-based Authentication Using Segmentation-based, Progress-Adjusted DTW. TrustCom 2020: 425-433 - [i15]Abiola Osho, Colin Goodman, George T. Amariucai:
MIDMod-OSN: A Microscopic-level Information Diffusion Model for Online Social Networks. CoRR abs/2002.10522 (2020) - [i14]Abiola Osho, Caden Waters, George T. Amariucai:
An Information Diffusion Approach to Rumor Propagation and Identification on Twitter. CoRR abs/2002.11104 (2020) - [i13]Chandra Sharma, George T. Amariucai:
A Practical Approach to Navigating the Tradeoff Between Privacy and Precise Utility. CoRR abs/2003.04916 (2020) - [i12]Abhishek Jana, Md. Kamruzzaman Sarker, Monireh Ebrahimi, Pascal Hitzler, George T. Amariucai:
Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication. CoRR abs/2003.08433 (2020) - [i11]Abiola Osho, Ethan Tucker, George T. Amariucai:
Implicit Crowdsourcing for Identifying Abusive Behavior in Online Social Networks. CoRR abs/2006.11456 (2020)
2010 – 2019
- 2019
- [j7]Mohammad Reza Khalili Shoja, George T. Amariucai, Zhengdao Wang, Shuangqing Wei, Jing Deng:
On the Secret Key Capacity of Sibling Hidden Markov Models. IEEE Trans. Inf. Forensics Secur. 14(2): 514-524 (2019) - [i10]Chandra Sharma, Samuel Moylan, George T. Amariucai, Eugene Y. Vasserman:
An Extended Survey on Vehicle Security. CoRR abs/1910.04150 (2019) - 2018
- [c21]Yanmao Man, Jing Deng, George T. Amariucai, Shuangqing Wei:
HQuad: Statistics of Hamiltonian Cycles in Wireless Rechargeable Sensor Networks. ICT 2018: 549-553 - [c20]George T. Amariucai, Sanchita Barman, Yong Guan:
An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol. WISEC 2018: 144-153 - 2017
- [j6]Gang Xu, George T. Amariucai, Yong Guan:
Delegation of Computation with Verification Outsourcing: Curious Verifiers. IEEE Trans. Parallel Distributed Syst. 28(3): 717-730 (2017) - [c19]Zhonghao Liao, George T. Amariucai, Raymond K. W. Wong, Yong Guan:
The impact of discharge inversion effect on learning SRAM power-up statistics. AsianHOST 2017: 31-36 - [c18]Mohammad Reza Khalili Shoja, George Traian Amariucai, Zhengdao Wang, Shuangqing Wei, Jing Deng:
Asymptotic converse bound for secret key capacity in hidden Markov model. ISIT 2017: 1968-1972 - [c17]Ali Moharrer, Shuangqing Wei, George T. Amariucai, Jing Deng:
Successive synthesis of latent Gaussian trees. MILCOM 2017: 315-320 - [i9]Ali Moharrer, Shuangqing Wei, George T. Amariucai, Jing Deng:
Successive Synthesis of Latent Gaussian Trees. CoRR abs/1701.04873 (2017) - 2016
- [j5]Mohammad Reza Khalili Shoja, George Traian Amariucai, Shuangqing Wei, Jing Deng:
Secret Common Randomness From Routing Metadata in Ad Hoc Networks. IEEE Trans. Inf. Forensics Secur. 11(8): 1674-1684 (2016) - [j4]Ali Moharrer, Shuangqing Wei, George T. Amariucai, Jing Deng:
Extractable Common Randomness From Gaussian Trees: Topological and Algebraic Perspectives. IEEE Trans. Inf. Forensics Secur. 11(10): 2312-2321 (2016) - [c16]Ali Moharrer, Shuangqing Wei, George T. Amariucai, Jing Deng:
Synthesis of Gaussian trees with correlation sign ambiguity: An information theoretic approach. Allerton 2016: 378-384 - [i8]Ali Moharrer, Shuangqing Wei, George T. Amariucai, Jing Deng:
Synthesis of Gaussian Trees with Correlation Sign Ambiguity: An Information Theoretic Approach. CoRR abs/1601.06403 (2016) - [i7]Ali Moharrer, Shuangqing Wei, George T. Amariucai, Jing Deng:
Layered Synthesis of Latent Gaussian Trees. CoRR abs/1608.04484 (2016) - 2015
- [c15]Gang Xu, George T. Amariucai, Yong Guan:
Block Programs: Improving Efficiency of Verifiable Computation for Circuits with Repeated Substructures. AsiaCCS 2015: 405-416 - [c14]Ali Moharrer, Shuangqing Wei, George T. Amariucai, Jing Deng:
Topological and Algebraic Properties for Classifying Unrooted Gaussian Trees under Privacy Constraints. GLOBECOM 2015: 1-6 - [c13]Junjun Ruan, Jing Deng, George T. Amariucai, Shuangqing Wei:
Efficient Link Cuts in Online Social Networks. GLOBECOM 2015: 1-6 - [c12]Ali Moharrer, Shuangqing Wei, George T. Amariucai, Jing Deng:
Evaluation of security robustness against information leakage in Gaussian polytree graphical models. WCNC 2015: 1404-1409 - [i6]Ali Moharrer, Shuangqing Wei, George T. Amariucai, Jing Deng:
Classifying Unrooted Gaussian Trees under Privacy Constraints. CoRR abs/1504.02530 (2015) - [i5]Mohammad Reza Khalili Shoja, George Traian Amariucai, Shuangqing Wei, Jing Deng:
KERMAN: A Key Establishment Algorithm based on Harvesting Randomness in MANETs. CoRR abs/1504.03744 (2015) - 2014
- [c11]Gang Xu, George T. Amariucai, Yong Guan:
Verifiable Computation with Reduced Informational Costs and Computational Costs. ESORICS (1) 2014: 292-309 - [c10]Gang Xu, George T. Amariucai, Yong Guan:
Delegation of Computation with Verification Outsourcing Using GENI Infrastructure. GREE 2014: 49-52 - 2013
- [c9]Gang Xu, George T. Amariucai, Yong Guan:
A lightweight argument system with efficient verifier. CNS 2013: 163-171 - [c8]Gang Xu, George T. Amariucai, Yong Guan:
Delegation of computation with verification outsourcing: curious verifiers. PODC 2013: 393-402 - 2012
- [j3]George T. Amariucai, Shuangqing Wei:
Half-Duplex Active Eavesdropping in Fast-Fading Channels: A Block-Markov Wyner Secrecy Encoding Scheme. IEEE Trans. Inf. Theory 58(7): 4660-4677 (2012) - [j2]George T. Amariucai, Shuangqing Wei:
Feedback-Based Collaborative Secrecy Encoding Over Binary Symmetric Channels. IEEE Trans. Inf. Theory 58(8): 5248-5266 (2012) - 2011
- [c7]George T. Amariucai, Clifford Bergman, Yong Guan:
An Automatic, Time-Based, Secure Pairing Protocol for Passive RFID. RFIDSec 2011: 108-126 - 2010
- [c6]George T. Amariucai, Shuangqing Wei:
Active eavesdropping in fast fading channels: A Block-Markov Wyner secrecy encoding scheme. ISIT 2010: 2508-2512 - [i4]George T. Amariucai, Shuangqing Wei:
Half-Duplex Active Eavesdropping in Fast Fading Channels: A Block-Markov Wyner Secrecy Encoding Scheme. CoRR abs/1002.1313 (2010)
2000 – 2009
- 2009
- [c5]George T. Amariucai, Shuangqing Wei:
Mixed anti-jamming strategies in fixed-rate wireless systems over fast fading channels. ISIT 2009: 2522-2526 - [i3]George T. Amariucai, Shuangqing Wei:
Feedback-Based Collaborative Secrecy Encoding over Binary Symmetric Channels. CoRR abs/0909.5120 (2009) - 2008
- [j1]George T. Amariucai, Shuangqing Wei:
Jamming games in fast-fading wireless channels. Int. J. Auton. Adapt. Commun. Syst. 1(4): 411-424 (2008) - [c4]George T. Amariucai, Shuangqing Wei:
Secrecy rates of binary wiretapper channels using feedback schemes. CISS 2008: 624-629 - [c3]George T. Amariucai, Shuangqing Wei:
Jamming Games in Fast-Fading Wireless Channels. GLOBECOM 2008: 4725-4729 - [i2]George T. Amariucai, Shuangqing Wei, Rajgopal Kannan:
Jamming in Fixed-Rate Wireless Systems with Power Constraints - Part II: Parallel Slow Fading Channels. CoRR abs/0808.3418 (2008) - [i1]George T. Amariucai, Shuangqing Wei:
Jamming in Fixed-Rate Wireless Systems with Power Constraints - Part I: Fast Fading Channels. CoRR abs/0808.3431 (2008) - 2007
- [c2]George T. Amariucai, Shuangqing Wei, Rajgopal Kannan:
Minimax and Maxmin Solutions to Gaussian Jamming in Block-Fading Channels under Long Term Power Constraints. CISS 2007: 312-317 - [c1]George T. Amariucai, Shuangqing Wei, Rajgopal Kannan:
Gaussian Jamming in Block-Fading Channels under Long Term Power Constraints. ISIT 2007: 1001-1005
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 20:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint