What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
H. Vincent Poor
Google Scholar
ORCID:
0000-0002-2062-131X
38
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Differentially Private Online Community Detection for Censored Block Models: Algorithms and Fundamental Limits.
Mohamed Seif
Liyan Xie
Andrea J. Goldsmith
H. Vincent Poor
2024
journals/tifs
Data-Agnostic Model Poisoning Against Federated Learning: A Graph Autoencoder Approach.
Kai Li
Jingjing Zheng
Xin Yuan
Wei Ni
Özgür B. Akan
H. Vincent Poor
2023
journals/tifs
Personalized Federated Learning With Differential Privacy and Convergence Guarantee.
Kang Wei
Jun Li
Chuan Ma
Ming Ding
Wen Chen
Jun Wu
Meixia Tao
H. Vincent Poor
2023
journals/tifs
Amplitude-Varying Perturbation for Balancing Privacy and Utility in Federated Learning.
Xin Yuan
Wei Ni
Ming Ding
Kang Wei
Jun Li
H. Vincent Poor
2023
journals/tifs
Secure and Private Distributed Source Coding With Private Keys and Decoder Side Information.
Onur Günlü
Rafael F. Schaefer
Holger Boche
H. Vincent Poor
2023
journals/tifs
Quantized RIS-Aided Multi-User Secure Beamforming Against Multiple Eavesdroppers.
Hoang Duong Tuan
Ali A. Nasir
Yufeng Chen
Eryk Dutkiewicz
H. Vincent Poor
2023
journals/tifs
A Smart Digital Twin Enabled Security Framework for Vehicle-to-Grid Cyber-Physical Systems.
Mansoor Ali
Georges Kaddoum
Wen-Tai Li
Chau Yuen
Muhammad Tariq
H. Vincent Poor
2022
journals/tifs
Secure Active and Passive Beamforming in IRS-Aided MIMO Systems.
Saba Asaad
Yifei Wu
Ali Bereyhi
Ralf R. Müller
Rafael F. Schaefer
H. Vincent Poor
2021
journals/tifs
Optimal Adversarial Policies in the Multiplicative Learning System With a Malicious Expert.
S. Rasoul Etesami
Negar Kiyavash
Vincent Léon
H. Vincent Poor
2021
journals/tifs
On Privacy of Dynamical Systems: An Optimal Probabilistic Mapping Approach.
Carlos Murguia
Iman Shames
Farhad Farokhi
Dragan Nesic
H. Vincent Poor
2021
journals/tifs
Physical Layer Security Aided Wireless Interference Networks in the Presence of Strong Eavesdropper Channels.
Zhichao Sheng
Hoang Duong Tuan
Ali Arshad Nasir
H. Vincent Poor
Eryk Dutkiewicz
2020
journals/tifs
Secure Communication and Identification Systems - Effective Performance Evaluation on Turing Machines.
Holger Boche
Rafael F. Schaefer
H. Vincent Poor
2020
journals/tifs
Federated Learning With Differential Privacy: Algorithms and Performance Analysis.
Kang Wei
Jun Li
Ming Ding
Chuan Ma
Howard H. Yang
Farhad Farokhi
Shi Jin
Tony Q. S. Quek
H. Vincent Poor
2020
journals/tifs
Secure Storage Capacity Under Rate Constraints - Continuity and Super Activation.
Sebastian Baur
Holger Boche
Rafael F. Schaefer
H. Vincent Poor
2020
journals/tifs
Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted Scenarios.
Ahmed Arafa
Wonjae Shin
Mojtaba Vaezi
H. Vincent Poor
2019
journals/tifs
Peer Prediction-Based Trustworthiness Evaluation and Trustworthy Service Rating in Social Networks.
Jun Du
Erol Gelenbe
Chunxiao Jiang
Haijun Zhang
Yong Ren
H. Vincent Poor
2018
journals/tifs
A Secure Mobile Crowdsensing Game With Deep Reinforcement Learning.
Liang Xiao
Yanda Li
Guoan Han
Huaiyu Dai
H. Vincent Poor
2018
journals/tifs
Smart Meter Privacy With Renewable Energy and an Energy Storage Device.
Giulio Giaconi
Deniz Gündüz
H. Vincent Poor
2018
journals/tifs
Community-Structured Evolutionary Game for Privacy Protection in Social Networks.
Jun Du
Chunxiao Jiang
Kwang-Cheng Chen
Yong Ren
H. Vincent Poor
2018
journals/tifs
Secret-Key Generation and Convexity of the Rate Region Using Infinite Compound Sources.
Nima Tavangaran
Rafael F. Schaefer
H. Vincent Poor
Holger Boche
2018
conf/ccs
MVG Mechanism: Differential Privacy under Matrix-Valued Query.
Thee Chanyaswad
Alex Dytso
H. Vincent Poor
Prateek Mittal
2018
conf/uss
BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid.
Saleh Soltan
Prateek Mittal
H. Vincent Poor
2017
journals/tifs
On Simultaneously Generating Multiple Keys in a Joint Source-Channel Model.
Wenwen Tu
Mario Goldenbaum
Lifeng Lai
H. Vincent Poor
2016
conf/cns
Multiple key generation with restricted public discussion structure.
Wenwen Tu
Mario Goldenbaum
Lifeng Lai
H. Vincent Poor
2015
journals/tifs
User-Centric View of Jamming Games in Cognitive Radio Networks.
Liang Xiao
Jinliang Liu
Qiangda Li
Narayan B. Mandayam
H. Vincent Poor
2015
journals/tifs
On the Continuity of the Secrecy Capacity of Compound and Arbitrarily Varying Wiretap Channels.
Holger Boche
Rafael F. Schaefer
H. Vincent Poor
2015
journals/tifs
Security Enhancement of Cooperative Single Carrier Systems.
Lifeng Wang
Kyeong Jin Kim
Trung Quang Duong
Maged Elkashlan
H. Vincent Poor
2015
conf/cns
An I-MMSE based graphical representation of rate and equivocation for the Gaussian broadcast channel.
Ronit Bustin
Rafael F. Schaefer
H. Vincent Poor
Shlomo Shamai
2014
journals/tifs
Incorporating Attack-Type Uncertainty Into Network Protection.
Andrey Garnaev
Melike Baykal-Gursoy
H. Vincent Poor
2014
conf/cns
On secure communication over multiple access wiretap channels under channel uncertainty.
Rafael F. Schaefer
H. Vincent Poor
2013
journals/tifs
Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach.
Lalitha Sankar
S. Raj Rajagopalan
H. Vincent Poor
2013
journals/tifs
On Energy-Secrecy Trade-Offs for Gaussian Wiretap Channels.
Cristina Comaniciu
H. Vincent Poor
2012
journals/tifs
Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels.
Francesco Renna
Nicola Laurenti
H. Vincent Poor
2012
journals/tifs
A Unified Framework for Key Agreement Over Wireless Fading Channels.
Lifeng Lai
Yingbin Liang
H. Vincent Poor
2011
journals/tifs
Secure Communications Over Wireless Broadcast Networks: Stability and Utility Maximization.
Yingbin Liang
H. Vincent Poor
Lei Ying
2011
journals/tifs
Privacy-Security Trade-Offs in Biometric Security Systems - Part I: Single Use Case.
Lifeng Lai
Siu-Wai Ho
H. Vincent Poor
2011
journals/tifs
Privacy-Security Trade-Offs in Biometric Security Systems - Part II: Multiple Use Case.
Lifeng Lai
Siu-Wai Ho
H. Vincent Poor
2011
journals/tifs
Guest Editorial Special Issue on Using the Physical Layer for Securing the Next Generation of Communication Systems.
Wade Trappe
H. Vincent Poor
Hisato Iwai
Aylin Yener
Paul R. Prucnal
João Barros
Coauthors
Ahmed Arafa
(1)
Alex Dytso
(1)
Ali A. Nasir
(1)
Ali Arshad Nasir
(1)
Ali Bereyhi
(1)
Andrea J. Goldsmith
(1)
Andrey Garnaev
(1)
Aylin Yener
(1)
Carlos Murguia
(1)
Chau Yuen
(1)
Chuan Ma
(2)
Chunxiao Jiang
(2)
Cristina Comaniciu
(1)
Deniz Gündüz
(1)
Dragan Nesic
(1)
Erol Gelenbe
(1)
Eryk Dutkiewicz
(2)
Farhad Farokhi
(2)
Francesco Renna
(1)
Georges Kaddoum
(1)
Giulio Giaconi
(1)
Guoan Han
(1)
H. Vincent Poor
(38)
Haijun Zhang
(1)
Hisato Iwai
(1)
Hoang Duong Tuan
(2)
Holger Boche
(5)
Howard H. Yang
(1)
Huaiyu Dai
(1)
Iman Shames
(1)
Jingjing Zheng
(1)
Jinliang Liu
(1)
João Barros
(1)
Jun Du
(2)
Jun Li
(3)
Jun Wu
(1)
Kai Li
(1)
Kang Wei
(3)
Kwang-Cheng Chen
(1)
Kyeong Jin Kim
(1)
Lalitha Sankar
(1)
Lei Ying
(1)
Liang Xiao
(2)
Lifeng Lai
(5)
Lifeng Wang
(1)
Liyan Xie
(1)
Maged Elkashlan
(1)
Mansoor Ali
(1)
Mario Goldenbaum
(2)
Meixia Tao
(1)
Melike Baykal-Gürsoy
(1)
Ming Ding
(3)
Mohamed Seif
(1)
Mojtaba Vaezi
(1)
Muhammad Tariq
(1)
Narayan B. Mandayam
(1)
Negar Kiyavash
(1)
Nicola Laurenti
(1)
Nima Tavangaran
(1)
Onur Günlü
(1)
Özgür B. Akan
(1)
Paul R. Prucnal
(1)
Prateek Mittal
(2)
Qiangda Li
(1)
Rafael F. Schaefer
(8)
Ralf R. Müller
(1)
Ronit Bustin
(1)
S. Raj Rajagopalan
(1)
S. Rasoul Etesami
(1)
Saba Asaad
(1)
Saleh Soltan
(1)
Sebastian Baur
(1)
Shi Jin
(1)
Shlomo Shamai
(1)
Siu-Wai Ho
(2)
Thee Chanyaswad
(1)
Tony Q. S. Quek
(1)
Trung Quang Duong
(1)
Vincent Léon
(1)
Wade Trappe
(1)
Wei Ni
(2)
Wen Chen
(1)
Wen-Tai Li
(1)
Wenwen Tu
(2)
Wonjae Shin
(1)
Xin Yuan
(2)
Yanda Li
(1)
Yifei Wu
(1)
Yingbin Liang
(2)
Yong Ren
(2)
Yufeng Chen
(1)
Zhichao Sheng
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to