default search action
Salman Salamatian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i19]Joy Qiping Yang, Salman Salamatian, Ziteng Sun, Ananda Theertha Suresh, Ahmad Beirami:
Asymptotics of Language Model Alignment. CoRR abs/2404.01730 (2024) - 2023
- [j9]Kathleen Yang, Salman Salamatian, Rafael G. L. D'Oliveira, Muriel Médard:
Wideband Time Frequency Coding. IEEE Trans. Veh. Technol. 72(8): 10561-10571 (2023) - 2022
- [j8]Hsiang Hsu, Salman Salamatian, Flávio P. Calmon:
Generalizing Correspondence Analysis for Applications in Machine Learning. IEEE Trans. Pattern Anal. Mach. Intell. 44(12): 9347-9362 (2022) - [i18]Kathleen Yang, Salman Salamatian, Rafael G. L. D'Oliveira, Muriel Médard:
Wideband Time Frequency Coding. CoRR abs/2205.15831 (2022) - 2021
- [j7]Alejandro Cohen, Rafael G. L. D'Oliveira, Salman Salamatian, Muriel Médard:
Network Coding-Based Post-Quantum Cryptography. IEEE J. Sel. Areas Inf. Theory 2(1): 49-64 (2021) - [j6]Rafael G. L. D'Oliveira, Salman Salamatian, Muriel Médard, Parastoo Sadeghi:
Low Influence, Utility, and Independence in Differential Privacy: A Curious Case of (3 2). IEEE J. Sel. Areas Inf. Theory 2(1): 240-252 (2021) - [j5]Alejandro Cohen, Nir Shlezinger, Salman Salamatian, Yonina C. Eldar, Muriel Médard:
Serial Quantization for Sparse Time Sequences. IEEE Trans. Signal Process. 69: 3299-3314 (2021) - [i17]Litian Liu, Amit Solomon, Salman Salamatian, Muriel Médard:
Neural Network Coding. CoRR abs/2101.03893 (2021) - 2020
- [j4]Salman Salamatian, Wasim Huleihel, Ahmad Beirami, Asaf Cohen, Muriel Médard:
Centralized vs Decentralized Targeted Brute-Force Attacks: Guessing With Side-Information. IEEE Trans. Inf. Forensics Secur. 15: 3749-3759 (2020) - [c18]Alejandro Cohen, Nir Shlezinger, Salman Salamatian, Yonina C. Eldar, Muriel Médard:
Distributed Quantization for Sparse Time Sequences. ICASSP 2020: 5580-5584 - [c17]Litian Liu, Amit Solomon, Salman Salamatian, Muriel Médard:
Neural Network Coding. ICC 2020: 1-6 - [c16]Salman Salamatian, Asaf Cohen, Muriel Médard:
Approximate Gács-Körner Common Information. ISIT 2020: 2234-2239 - [c15]Kathleen Yang, Rafael G. L. D'Oliveira, Salman Salamatian, Muriel Médard:
Wideband Time Frequency Coding. PIMRC 2020: 1-6 - [i16]Rafael G. L. D'Oliveira, Salman Salamatian, Muriel Médard, Parastoo Sadeghi:
Low Influence, Utility, and Independence in Differential Privacy: A Curious Case of (3 2). CoRR abs/2008.09702 (2020) - [i15]Salman Salamatian, Wasim Huleihel, Ahmad Beirami, Asaf Cohen, Muriel Médard:
Centralized vs Decentralized Targeted Brute-Force Attacks: Guessing with Side-Information. CoRR abs/2008.12823 (2020) - [i14]Alejandro Cohen, Rafael G. L. D'Oliveira, Salman Salamatian, Muriel Médard:
Network Coding-Based Post-Quantum Cryptography. CoRR abs/2009.01931 (2020)
2010 – 2019
- 2019
- [j3]Salman Salamatian, Wasim Huleihel, Ahmad Beirami, Asaf Cohen, Muriel Médard:
Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization. IEEE Trans. Inf. Forensics Secur. 14(9): 2288-2299 (2019) - [j2]Wasim Huleihel, Salman Salamatian, Neri Merhav, Muriel Médard:
Gaussian Intersymbol Interference Channels With Mismatch. IEEE Trans. Inf. Theory 65(7): 4499-4517 (2019) - [c14]Hsiang Hsu, Salman Salamatian, Flávio P. Calmon:
Correspondence Analysis Using Neural Networks. AISTATS 2019: 2671-2680 - [c13]Nir Shlezinger, Salman Salamatian, Yonina C. Eldar, Muriel Médard:
Joint Sampling and Recovery of Correlated Sources. ISIT 2019: 385-389 - [c12]Salman Salamatian, Nir Shlezinger, Yonina C. Eldar, Muriel Médard:
Task-Based Quantization for Recovering Quadratic Functions Using Principal Inertia Components. ISIT 2019: 390-394 - [c11]Diana Cristina González, Salman Salamatian, Muriel Médard, Michel Daoud Yacoub:
Capacity of Wideband Multipath Fading Networks with Physically Degraded Broadcast. ITW 2019: 1-5 - [c10]Salman Salamatian, Litian Liu, Ahmad Beirami, Muriel Médard:
Mismatched Guesswork and One-to-One Codes. ITW 2019: 1-5 - [i13]Hsiang Hsu, Salman Salamatian, Flávio P. Calmon:
Correspondence Analysis Using Neural Networks. CoRR abs/1902.07828 (2019) - [i12]Salman Salamatian, Litian Liu, Ahmad Beirami, Muriel Médard:
Mismatched Guesswork. CoRR abs/1907.00531 (2019) - [i11]Alejandro Cohen, Nir Shlezinger, Salman Salamatian, Yonina C. Eldar, Muriel Médard:
Distributed Quantization for Sparse Time Sequences. CoRR abs/1910.09519 (2019) - 2018
- [c9]Hsiang Hsu, Shahab Asoodeh, Salman Salamatian, Flávio P. Calmon:
Generalizing Bottleneck Problems. ISIT 2018: 531-535 - [i10]Hsiang Hsu, Shahab Asoodeh, Salman Salamatian, Flávio P. Calmon:
Generalizing Bottleneck Problems. CoRR abs/1802.05861 (2018) - [i9]Salman Salamatian, Wasim Huleihel, Ahmad Beirami, Asaf Cohen, Muriel Médard:
Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization. CoRR abs/1805.11666 (2018) - [i8]Hsiang Hsu, Salman Salamatian, Flávio P. Calmon:
Deep Orthogonal Representations: Fundamental Properties and Applications. CoRR abs/1806.08449 (2018) - [i7]Hsiang Hsu, Flávio P. Calmon, José Cândido Silveira Santos Filho, Andre P. Calmon, Salman Salamatian:
Correspondence Analysis of Government Expenditure Patterns. CoRR abs/1812.01105 (2018) - 2017
- [c8]Wasim Huleihel, Salman Salamatian, Muriel Médard:
Guessing with limited memory. ISIT 2017: 2253-2257 - [c7]Salman Salamatian, Ahmad Beirami, Asaf Cohen, Muriel Médard:
Centralized vs decentralized multi-agent guesswork. ISIT 2017: 2258-2262 - [c6]Wasim Huleihel, Salman Salamatian, Neri Merhav, Muriel Médard:
Gaussian ISI channels with mismatch. ISIT 2017: 2815-2819 - [i6]Salman Salamatian, Ahmad Beirami, Asaf Cohen, Muriel Médard:
Centralized vs Decentralized Multi-Agent Guesswork. CoRR abs/1705.09372 (2017) - [i5]Wasim Huleihel, Salman Salamatian, Neri Merhav, Muriel Médard:
Gaussian Intersymbol Interference Channels With Mismatch. CoRR abs/1706.05883 (2017) - 2016
- [c5]Salman Salamatian, Asaf Cohen, Muriel Médard:
Efficient coding for multi-source networks using Gács-Körner common information. ISITA 2016: 166-170 - [i4]Salman Salamatian, Asaf Cohen, Muriel Médard:
Efficient Coding for Multi-source Networks using Gács-Körner Common Information. CoRR abs/1601.06882 (2016) - [i3]Salman Salamatian, Asaf Cohen, Muriel Médard:
Maximum Entropy Functions: Approximate Gacs-Korner for Distributed Compression. CoRR abs/1604.03877 (2016) - 2015
- [j1]Salman Salamatian, Amy Zhang, Flávio du Pin Calmon, Sandilya Bhamidipati, Nadia Fawaz, Branislav Kveton, Pedro Oliveira, Nina Taft:
Managing Your Private and Public Data: Bringing Down Inference Attacks Against Your Privacy. IEEE J. Sel. Top. Signal Process. 9(7): 1240-1255 (2015) - [c4]Salman Salamatian, Muriel Médard, Emre Telatar:
A Successive Description property of Monotone-Chain Polar Codes for Slepian-Wolf coding. ISIT 2015: 1522-1526 - 2014
- [c3]Ali Makhdoumi, Salman Salamatian, Nadia Fawaz, Muriel Médard:
From the Information Bottleneck to the Privacy Funnel. ITW 2014: 501-505 - [c2]Salman Salamatian, Nadia Fawaz, Branislav Kveton, Nina Taft:
SPPM: Sparse Privacy Preserving Mappings. UAI 2014: 712-721 - [i2]Ali Makhdoumi, Salman Salamatian, Nadia Fawaz, Muriel Médard:
From the Information Bottleneck to the Privacy Funnel. CoRR abs/1402.1774 (2014) - [i1]Salman Salamatian, Amy Zhang, Flávio du Pin Calmon, Sandilya Bhamidipati, Nadia Fawaz, Branislav Kveton, Pedro Oliveira, Nina Taft:
Managing your Private and Public Data: Bringing down Inference Attacks against your Privacy. CoRR abs/1408.3698 (2014) - 2013
- [c1]Salman Salamatian, Amy Zhang, Flávio du Pin Calmon, Sandilya Bhamidipati, Nadia Fawaz, Branislav Kveton, Pedro Oliveira, Nina Taft:
How to hide the elephant- or the donkey- in the room: Practical privacy against statistical inference for large data. GlobalSIP 2013: 269-272
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint