Paul W. Cuff – Research Output
Journal Publications
- Exact Exponent for Soft Covering
S. Yagli, P. Cuff — submitted to IEEE Trans. on Information Theory, September, 2018.
- Key and Message Semantic-Security over State-Dependent Channels
A. Bunin, Z. Goldfeld, H. Permuter, S. Shamai, P. Cuff, P. Piantanida — accepted to IEEE Trans. on Information Forensics and Security, June, 2018.
- Smoothing Brascamp-Lieb Inequalities and Strong Converses of Coding Theorems
J. Liu, T. Courtade, P. Cuff, S. Verdú — submitted to IEEE Trans. on Information Theory, April, 2017.
- Wiretap Channels with Random States Non-Causally Available at the Encoder
Z. Goldfeld, P. Cuff, H. Permuter — submitted to IEEE Trans. on Information Theory, August, 2016.
- Puzzles in Memory of Solomon Golomb
J. Buhler, P. Cuff, A. Hales, R. Stong — IEEE Trans. on Information Theory, 64(4), April, 2018.
- Common Randomness and Key Generation with Limited Interaction
J. Liu, P. Cuff, S. Verdú — IEEE Trans. on Information Theory, 63(11):7358-81, November, 2017.
- E-gamma Resolvability
J. Liu, P. Cuff, S. Verdú — IEEE Trans. on Information Theory, 63(5):2629-58, May, 2017.
- An EEG Acquisition and Biomarker-Extraction System Using Low-Noise-Amplifier and Compressive-Sensing Circuits Based on Flexible, Thin-Film Electronics
T. Moy, L. Huang, W. Rieutort-Louis, C. Wu, P. Cuff, S. Wagner, J. Sturm, N. Verma — IEEE Journal of Solid State Circuits, 52(1):309-21, January, 2017.
- Strong Secrecy for Cooperative Broadcast Channels
Z. Goldfeld, G. Kramer, H. Permuter, P. Cuff — IEEE Trans. on Information Theory, 63(1):469-95, January, 2017.
- Arbitrarily Varying Wiretap Channels with Type Constrained States
Z. Goldfeld, P. Cuff, H. Permuter — IEEE Trans. on Information Theory, 62(12):7216-44, December, 2016.
- Secure Cascade Channel Synthesis
S. Satpathy, P. Cuff — IEEE Trans. on Information Theory, 62(11):6081-94, November, 2016.
- Semantic-Security Capacity for Wiretap Channels of Type II
Z. Goldfeld, P. Cuff, H. Permuter — IEEE Trans. on Information Theory, 62(7):3863-79, July, 2016.
- The Henchman Problem: Measuring Secrecy by the Minimum Distortion in a List
C. Schieler, P. Cuff — IEEE Trans. on Information Theory, 62(6):3436-50, June, 2016.
- The Likelihood Encoder for Lossy Compression
E. Song, P. Cuff, V. Poor — IEEE Trans. on Information Theory, 62(4):1836-49, April, 2016.
- Key Capacity for Product Sources with Application to Stationary Gaussian Processes
J. Liu, P. Cuff, S. Verdú — IEEE Trans. on Information Theory, 62(2):984-1005, February, 2016.
- An Upper Bound on the Convergence Time for Quantized Consensus of Arbitrary Static Graphs (longer version)
S. Shang, P. Cuff, P. Hui, S. Kulkarni — IEEE Trans. on Automatic Control, 60(4):1127-32, April, 2015.
- Rate-Distortion Theory for Secrecy Systems
C. Schieler, P. Cuff — IEEE Trans. on Information Theory, 60(12):7584-605, December, 2014.
- Rate-Distortion-Based Physical Layer Secrecy in Multimode Fiber
E. Song, E. Soljanin, P. Cuff, V. Poor, K. Guan — IEEE Trans. on Communications, 62(3):1080-90, March, 2014.
- Distributed Channel Synthesis
P. Cuff — IEEE Trans. on Information Theory, 59(11):7071-96, November, 2013.
- Glauber Dynamics for the mean-field Potts Model
P. Cuff, J. Ding, O. Louidor, E. Lubetzky, Y. Peres, A. Sly — Journal of Statistical Physics, 149(3):432-477, November, 2012.
- On the Role of the Refinement Layer in Multiple Description Coding and Scalable Coding (arXiv)
J. Wang, J. Chen, L. Zhao, P. Cuff, H. Permuter — IEEE Trans. on Information Theory, 57(3):1443-56, March, 2011.
- Coordination Capacity
P. Cuff, H. Permuter, T. Cover — IEEE Trans. on Information Theory, 56(9):4181-206, September, 2010.
- Capacity of the Trapdoor Channel with Feedback
H. Permuter, P. Cuff, B. Van Roy, T. Weissman — IEEE Trans. on Information Theory, 54(7):3150-65, July, 2008.
Book Chapter
- Secure Source Coding
P. Cuff, C. Schieler — Chapter 3 of Information Theoretic Security and Privacy of Information Systems, Cambridge University Press, 2017.
Dissertation
- Communication in Networks for Coordinating Behavior
P. Cuff — Ph.D. Dissertation, Stanford University, August, 2009.
Conference Proceedings
- Differentially Private Oblivious RAM
S. Wagh, P. Mittal, P. Cuff — PETS, July, 2018.
- Exact Soft-Covering Exponent
S. Yagli, P. Cuff — ISIT, June, 2018.
- Key-Message Security over State-Dependent Wiretap Channels
A. Bunin, Z. Goldfeld, H. Permuter, S. Shamai, P. Cuff, P. Piantanida — ISIT, June, 2018.
- The Shannon Cipher System with a Guessing Eavesdropper
L. Yu, P. Cuff — ISIT, June, 2017.
- The Gelfand-Pinsker wiretap channel: Higher secrecy rates via a novel superposition code
Z. Goldfeld, P. Cuff, H. Permuter — ISIT, June, 2017.
- Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters
A. Bunin, Z. Goldfeld, H. Permuter, S. Shamai, P. Cuff, P. Piantanida — Eurocrypt, Workshop on Comm. Security (WCS), April, 2017.
- Arbitrarily Varying Wiretap Channels with Type Constrained States
Z. Goldfeld, P. Cuff, H. Permuter — Globecom, December, 2016.
- Wiretap Channels with Random States Non-Causally Available at the Encoder
Z. Goldfeld, P. Cuff, H. Permuter — ICSEE, November, 2016.
- Differential Privacy as a Mutual Information Constraint
P. Cuff, L. Yu — CCS, October, 2016.
- Semantic-Security Capacity for Wiretap Channels of Type II
Z. Goldfeld, P. Cuff, H. Permuter — ISIT, July, 2016.
- Soft Covering with High Probability
P. Cuff — ISIT, July, 2016.
- Key Generation with Limited Interaction
J. Liu, P. Cuff, S. Verdú — ISIT, July, 2016.
- Brascamp-Lieb Inequality and Its Reverse: An Information Theoretic View
J. Liu, T. Courtade, P. Cuff, S. Verdú — ISIT, July, 2016.
- Smoothing Brascamp-Lieb Inequalities and Strong Converses for Common Randomness Generation
J. Liu, T. Courtade, P. Cuff, S. Verdú — ISIT, July, 2016.
- Semantic-Security Capacity for the Physical Layer via Information Theory
Z. Goldfeld, P. Cuff, H. Permuter — SwSTE, June, 2016.
- Strong Secrecy for Cooperative Broadcast Channels
Z. Goldfeld, G. Kramer, H. Permuter, P. Cuff — Int'l. Zurich Seminar on Communications, March, 2016.
- A Stronger Soft-Covering Lemma and Applications
P. Cuff — CNS Workshop on Physical-layer Methods for Wireless Security, September, 2015.
- Gaussian Secure Source Coding and Wyner's Common Information
S. Satpathy, P. Cuff — ISIT, June, 2015.
- One-Shot Mutual Covering Lemma and Marton's Inner Bound with a Common Message
J. Liu, P. Cuff, S. Verdú — ISIT, June, 2015 (semi-plenary).
- Secret Key Generation with One Communicator and a One-Shot Converse via Hypercontractivity
J. Liu, P. Cuff, S. Verdú — ISIT, June, 2015.
- Resolvability in E-gamma with Applications to Lossy Compression and Wiretap Channels
J. Liu, P. Cuff, S. Verdú — ISIT, June, 2015.
- Joint Source-Channel Secrecy Using Hybrid Coding
E. Song, P. Cuff, V. Poor — ISIT, June, 2015.
- A Rate-Distortion Based Secrecy System with Side Information at the Decoders
E. Song, P. Cuff, V. Poor — Allerton, October, 2014.
- Secure Coordination with a Two-Sided Helper
S. Satpathy, P. Cuff — ISIT, July, 2014.
- The Likelihood Encoder for Lossy Source Compression
E. Song, P. Cuff, V. Poor — ISIT, July, 2014.
- The Henchman Problem: Measuring Secrecy by the Minimum Distortion in a List
C. Schieler, P. Cuff — ISIT, July, 2014.
- Key Capacity with Limited One-Way Communication for Product Sources
J. Liu, P. Cuff, S. Verdú — ISIT, July, 2014.
- The Application of Differential Privacy for Rank Aggregation: Privacy and Accuracy
S. Shang, T. Wang, P. Cuff, S. Kulkarni — Fusion, July, 2014.
- Beyond Personalization and Anonymity: Toward a Group-Based Recommender System
S. Shang, Y. Hui, P. Hui, P. Cuff, S. Kulkarni — Symp. on Applied Computing (SAC), March, 2014.
- A Connection between Good Rate-distortion Codes and Backward DMCs
C. Schieler, P. Cuff — ITW, September, 2013.
- The Likelihood Encoder for Source Coding
P. Cuff, E. Song — ITW, September, 2013.
- Secrecy in Cascade Networks
P. Cuff — ITW, September, 2013.
- Secure Cascade Channel Synthesis
S. Satpathy, P. Cuff — ISIT, July, 2013.
- A Bit of Secrecy for Gaussian Source Compression
E. Song, P. Cuff, V. Poor — ISIT, July, 2013.
- Rate-Distortion Theory for Secrecy Systems
C. Schieler, P. Cuff — ISIT, July, 2013.
- An Upper Bound on the Convergence Time for Quantized Consensus (full version)
S. Shang, P. Cuff, P. Hui, S. Kulkarni — Infocom, April, 2013.
- Optimal Equivocation in Secrecy Systems - A Special Case of Distortion-based Characterization
P. Cuff — ITA, February, 2013 (Invited).
- Source-Channel Secrecy with Causal Disclosure
C. Schieler, E. Song, P. Cuff, V. Poor — Allerton, October, 2012.
- Condorcet Voting Methods Avoid the Paradoxes of Voting Theory
T. Wang, J. Sturm, P. Cuff, S. Kulkarni — Allerton, October, 2012 (Invited).
- A Random Walk Based Model Incorporating Social Information for Recommendations
S. Shang, S. Kulkarni , P. Cuff, P. Hui — MLSP, September, 2012.
- Iterative collaborative filtering for recommender systems with sparse data
Z. Zhang, P. Cuff, S. Kulkarni — MLSP, September, 2012.
- Secrecy is Cheap if the Adversary Must Reconstruct
C. Schieler, P. Cuff — ISIT, July, 2012.
- An Upper Bound on the Convergence Time for Distributed Binary Consensus
S. Shang, P. Cuff, S. Kulkarni, P. Hui — Fusion, July, 2012.
- Cooperative Caching based on File Popularity Ranking in Delay Tolerant Networks
T. Wang, P. Hui, S. Kulkarni, P. Cuff — ExtremeCom, March, 2012.
- The Source Coding Side of Secrecy
P. Cuff — Zurich Seminar on Comm. (IZS), February, 2012 (Invited).
- A Class of Log-optimal Utility Functions
P. Cuff — ITA, February, 2012 (Invited).
- Wisdom of the Crowd: Incorporating Social Influence in Recommendation Models
S. Shang, P. Hui, S. Kulkarni, P. Cuff — ICPADS, HotPOST Workshop, December, 2011 (Best Paper Award).
- Coordination using Implicit Communication
P. Cuff and L. Zhao — ITW, October, 2011.
- Hybrid Codes Needed for Coordination over the Point-to-Point Channel
P. Cuff and C. Schieler — Allerton, September, 2011 (Invited).
- A Lattice of Gambles
P. Cuff, T. Cover, G. Kumar, and L. Zhao — ISIT, August, 2011.
- Mutual Information Scheduling for Ranking
H. Aftab, N. Raj, P. Cuff, and S. Kulkarni — Fusion, July, 2011.
- A Framework for Partial Secrecy
P. Cuff — Globecom, December, 2010.
- Using a Secret Key to Foil an Eavesdropper
P. Cuff — Allerton, September, 2010 (Invited).
- State Information in Bayesian Games
P. Cuff — Presented at Allerton, October, 2009 (Invited).
- Cascade Multiterminal Source Coding
P. Cuff, H.-I. Su, and A. El Gamal — ISIT, July, 2009.
- Consolidating Achievable Regions of Multiple Descriptions
L. Zhao, P. Cuff, H. Permuter — ISIT, July, 2009.
- Communication Requirements for Generating Correlated Random Variables
P. Cuff — ISIT, July, 2008 (Best Student Paper Award).
- Capacity and Zero-Error Capacity of the Chemical Channel with Feedback
H. Permuter, P. Cuff, B. Van Roy, and T. Weissman — ISIT, July, 2007.
Talks (slides)
ITA 2019 — Soft Covering Exponent
Stanford 2019 — Soft Covering Exponent [video]
MIT 2017 — Distribution Approximation Techniques for Security, Differential Privacy, and Learning
ITA 2017 — Differential Privacy as a Mutual Information Constraint
U. of Maryland, U. of Michigan 2016 — Part 1: Wiretap Channels with Random States; Part 2: Differential Privacy as a Mutual Information Constraint
Stanford Information Theory Forum 2016 — Part 1: Wiretap Channels with Random States; Part 2: Differential Privacy as a Mutual Information Constraint
Penn State 2016 — Secure Communication through Wiretap Channels
CISS 2016 — Panel - The Next 50 Years
Zurich Seminar on Communications 2016 — Semantic Security using a Stronger Soft-Covering Lemma
ITA 2016 — Estimation of Smoothed Entropy
Science of Information, Caltech, Stanford, USC, UC Irvine, UC Berkeley 2015 — Semantic Security using a Stronger Soft-Covering Lemma
CNS Workshop on Physical-layer Methods for Wireless Security 2015 (Keynote Talk) — Semantic Security using a Stronger Soft-Covering Lemma
ISIT 2015 — Gaussian Secure Source Coding and Wyner's Common Information
CTW 2015 — Embedded Coordination for Signals
ITW 2015 — Zero-Delay Distortion-Inducing Secure Source Coding
ITW 2015 — The Third Way
ITA 2015 — Secret Key Agreement with Rate-Limited Communication Among Three Nodes
Allerton 2014 — Secure Rate-Limited Feedback for Control
Edgestream Partners 2014 — Source Coding (secrecy and embedding)
SPCOM Tutorial 2014 — Rate-Distortion Theory for Secrecy Systems
Cornell, BYU 2013 — Rate-distortion Theory for Secrecy Systems
Yale 2013 — Rate-distortion Theory for Communication in Games
ITW 2013 — The Likelihood Encoder for Source Coding
ITW 2013 — Secrecy in Cascade Networks
UIUC, NIKSUN WWSMC, PDT 2013 — Rate-Distortion Theory for Secrecy Systems
ITA 2013 — Equivocation - A Special Case of Distortion-based Characterization
NIPS Workshop on Social Choice Theory 2012 — Requirements for Fair and Robust Voting Systems
Stanford ISL Colloquium, UC Berkeley Seminar, Bell Labs Mathematics Colloquium 2012 — Secure Communication of Signals
CISS 2012 — Toward a Secure Data-rate Theorem
Zurich Seminar on Communications 2012 — The Source Coding Side of Secrecy
ITA 2012 — A Class of Log-optimal Utility Functions
Allerton 2011 — Hybrid Codes Needed for Coordination over the Point-to-Point Channel
Fusion 2011 — Mutual Information Scheduling for Ranking
Princeton Stats Symposium 2011 — Information Theory - Aggregating Information
ITA 2011 — Causal Secrecy: An Informed Eavesdropper
Globecom 2010 — A Framework for Partial Secrecy
MIT - HP Seminar, UIUC 2010-11 — Secure Communication for Distributed Systems
BYU 2010 — Information Theory for Secrecy and Control
Princeton Staff Lunch Lecture 2010 — A Bit About Bits
Princeton, ISS 2009 — Efficient Communication for Control in Games and Networks
Allerton 2009 — State Information in Bayesian Games
Stanford University PhD Oral Exam — Communication in Networks for Coordinating Behavior (video)
ISIT 2009 — Cascade Multiterminal Source Coding
ITA (UCSD) 2009 — Investigating the Fundamental Communication Burden of Cooperation
MIT - LIDS 2008 — The Golden Ratio in Communication - Blackwell's Trapdoor Channel and Task Assignment
Allerton 2008 — Coordination via Communication
ISIT 2008 — Communication Requirement for Generating Correlated Random Variables
School of Information Theory 2008 — Coordination via Communication
BIRS 2007 — Entropy Rates of Hidden Markov Processes emerge from Blackwell's Trapdoor Channel
ISIT 2007 — Capacity and Zero-Error Capacity of the Chemical Channel with Feedback
|