Search

Your search keyword '"Esnaola, Inaki"' showing total 138 results

Search Constraints

Start Over You searched for: Author "Esnaola, Inaki" Remove constraint Author: "Esnaola, Inaki"
138 results on '"Esnaola, Inaki"'

Search Results

1. Stealth Attacks Against Moving Target Defense for Smart Grid

2. Asymmetry of the Relative Entropy in the Regularization of Empirical Risk Minimization

3. Submodularity of Mutual Information for Multivariate Gaussian Sources with Additive Noise

4. Equivalence of the Empirical Risk Minimization to Regularization on the Family of f-Divergences

5. Generalization Analysis of Machine Learning Algorithms via the Worst-Case Data-Generating Probability Measure

6. On the Validation of Gibbs Algorithms: Training Datasets, Test Datasets and their Aggregation

7. Analysis of the Relative Entropy Asymmetry in the Regularization of Empirical Risk Minimization

8. Empirical Risk Minimization with Relative Entropy Regularization

9. An information theoretic vulnerability metric for data integrity attacks on smart grids

11. Power Injection Measurements are more Vulnerable to Data Integrity Attacks than Power Flow Measurements

12. Empirical Risk Minimization with Relative Entropy Regularization: Optimality and Sensitivity Analysis

13. Stealth Data Injection Attacks with Sparsity Constraints

14. Asymptotic Learning Requirements for Stealth Attacks on Linearized State Estimation

15. Data-Injection Attacks

16. Covariance Estimation from Compressive Data Partitions using a Projected Gradient-based Algorithm

17. Information Theoretic Data Injection Attacks with Sparsity Constraints

18. Optimal Model-Based Sensor Placement & Adaptive Monitoring Of An Oil Spill

19. Denial of Service Attacks on Control Systems with Packet Loss

20. Optimal Control over Multiple Input Lossy Channels

21. A combined ocean and oil model for model-based adaptive monitoring

22. Recovery of Missing Data in Correlated Smart Grid Datasets

23. Universal Mutual Information Privacy Guarantees for Smart Meters

24. Learning requirements for stealth attacks

26. Stealth Attacks on the Smart Grid

27. Information-Theoretic Attacks in the Smart Grid

28. Smart Meter Privacy via the Trapdoor Channel

29. Robust Recovery of Missing Data in Electricity Distribution Systems

30. Compressed Sensing Algorithms for OFDM Channel Estimation

31. Approximate Capacity Region of the Two-User Gaussian Interference Channel with Noisy Channel-Output Feedback

32. Approximate Capacity of the Two-User Gaussian Interference Channel with Noisy Channel-Output Feedback

33. Approximate Capacity of the Gaussian Interference Channel with Noisy Channel-Output Feedback

34. Machine Learning Methods for Attack Detection in the Smart Grid

35. Sparse Attack Construction and State Estimation in the Smart Grid: Centralized and Distributed Models

38. Power Allocation Strategies in Energy Harvesting Wireless Cooperative Networks

39. When Does Channel-Output Feedback Enlarge the Capacity Region of the Two-User Linear Deterministic Interference Channel?

42. Empirical Risk Minimization With Relative Entropy Regularization

Catalog

Books, media, physical & digital resources