Publications
Preprints
O. Bahwal, O. Kosut, and L. Sankar, "An Adversarial Approach to Evaluating the Robustness of Event Identification Models"
N. Taghipourbazargani, L. Sankar, and O. Kosut, "A Semi-Supervised Approach for Power System Event Identification," submitted to IEEE Transactions on Smart Grid, 2024
Journal Publications
A. Gilani, G. R. Kurri, O. Kosut and L. Sankar, "Unifying Privacy Measures via Maximal (α, β)-Leakage (MαbeL)," in IEEE Transactions on Information Theory, doi: 10.1109/TIT.2024.3384922.
R. Anguluri, O. Kosut and L. Sankar, "Identifying Edge Changes in Networks From Input and Output Covariance Data," in IEEE Control Systems Letters, doi: 10.1109/LCSYS.2024.3383370.
G. R. Kurri, L. Sankar, and O. Kosut, "An Operational Approach to Information Leakage via Generalized Gain Functions", in IEEE Transactions on Information Theory, vol. 70, no. 2, pp. 1349-1375, Feb. 2024, doi: 10.1109/TIT.2023.3341148.
A. Pinceti, L. Sankar, O. Kosut., "Generation of Synthetic Multi-resolution Time Series Load Data", IET Smart Grid, vol. 6, no. 5, pp. 492–502, 2023, doi: 10.1049/stg2.12116
R. Anguluri, L. Sankar, and O. Kosut, "Localization and Estimation of Unknown Forced Inputs: A Group LASSO Approach", in IEEE Transactions on Control of Network Systems, vol. 10, no. 4, pp. 1997–2009, Dec. 2023. doi: 10.1109/TCNS.2023.3258627
C. V. Lengerke, A. Hefele, J. A. Cabrera, O. Kosut, M. Reisslein and F. H. P. Fitzek, "Identification Codes: A Topical Review With Design Guidelines for Practical Systems," in IEEE Access, vol. 11, pp. 14961-14982, 2023, doi: 10.1109/ACCESS.2023.3244071.
N. T. Bazargani, G. Dasarathy, L. Sankar, and O. Kosut, "A Machine Learning Framework for Event Identification via Modal Analysis of PMU Data", in IEEE Transactions on Power Systems, vol. 38, no. 5, pp. 4165–4176, Sept. 2023, doi: 10.1109/TPWRS.2022.3212323
E. Graves, A. Beemer, J. Kliewer, O. Kosut, and P. Yu, "Keyless Authentication for AWGN Channels", in IEEE Transactions on Information Theory, vol. 69, no. 1, pp. 496-519, 2023, doi: 10.1109/TIT.2022.3205886
O. Kosut, "A Second-Order Converse Bound for the Multiple-Access Channel via Wringing Dependence", in IEEE Transactions on Information Theory, vol. 68, no. 6, pp. 3552-3584, June 2022, doi: 10.1109/TIT.2022.3151711
R. Anguluri, G. Dasarathy, O. Kosut and L. Sankar, "Grid Topology Identification With Hidden Nodes via Structured Norm Minimization," in IEEE Control Systems Letters, vol. 6, pp. 1244-1249, 2022
A. Pinceti, L. Sankar and O. Kosut, "Detection and Localization of Load Redistribution Attacks on Large-Scale Systems," in Journal of Modern Power Systems and Clean Energy, vol. 10, no. 2, pp. 361-370, March 2022
S. Asoodeh, J. Liao, F. P. Calmon, O. Kosut and L. Sankar, "Three Variants of Differential Privacy: Lossless Conversion and Applications," in IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 1, pp. 208-222, March 2021
Z. Chu, J. Zhang, O. Kosut, L. Sankar, "N−1 Reliability Makes It Difficult for False Data Injection Attacks to Cause Physical Consequences," IEEE Transactions on Power Systems, vol. 36, no 5, pp. 3897-3906, Feb. 2021
Z. Chu, O. Kosut, L. Sankar, "Detecting Load Redistribution Attacks via Support Vector Models," IET Smart Grid, vol. 3, no. 5, pp 551–560, Oct. 2020
J. Liao, O. Kosut, L. Sankar and F. du Pin Calmon, "Tunable Measures for Information Leakage and Applications to Privacy-Utility Tradeoffs," in IEEE Transactions on Information Theory, vol. 65, no. 12, pp. 8043-8066, Dec. 2019
N. Iri and O. Kosut, "Fine Asymptotics for Universal One-to-One Compression of Parametric Sources," in IEEE Transactions on Information Theory, vol. 65, no. 4, pp. 2442-2458, April 2019
O. Kosut and J. Kliewer, "Strong Converses are Just Edge Removal Properties," in IEEE Transactions on Information Theory, vol. 65, no. 6, pp. 3315-3339, June 2019
J. Zhang, Z. Chu, L. Sankar and O. Kosut, "Can Attackers With Limited Information Exploit Historical Data to Mount Successful False Data Injection Attacks on Power Systems?," in IEEE Transactions on Power Systems, vol. 33, no. 5, pp. 4775-4786, Sept. 2018
X. Fan, O. Kosut and A. B. Wagner, "Variable Packet-Error Coding," in IEEE Transactions on Information Theory, vol. 64, no. 3, pp. 1530-1547, March 2018
O. Kosut and J. Kliewer, "Equivalence for networks with adversarial state", IEEE Trans. on Information Theory, vol. 63, no. 7, pp. 4137–4154, May 2017
O. Kosut and L. Sankar, "Asymptotics and non-asymptotics for universal fixed-to-variable source coding", IEEE Trans. on Information Theory, vol. 63, no. 6, pp. 3757–3772, Mar. 2017
J. Liang, L. Sankar, and O. Kosut, "Vulnerability analysis and consequences of false data injection attack on power system state estimation", IEEE Trans. on Power Systems, vol. 31, no. 5, pp. 3864–3872, Sep. 2016
I. Esnaola, S. M. Perlaza, H. V. Poor, and O. Kosut, "Maximum distortion attacks in electricity grids", IEEE Trans. on Smart Grid, vol. 7, no. 4, pp. 2007–2015, Jul. 2016
Y. Liu, O. Kosut, and A. S. Willsky, "Sampling from Gaussian Markov random fields using stationary and non- stationary subgraph perturbations", IEEE Trans. on Signal Processing, vol. 63, no. 3, pp. 576–589, Feb. 2015
O. Kosut, L. Tong, and D. Tse, "Polytope Codes against adversaries in networks", IEEE Trans. on Information Theory, vol. 60, no. 6, pp. 3308–3344, Jun. 2014
V. Y. F. Tan and O. Kosut, "On the dispersions of three network information theory problems", IEEE Trans. on Information Theory, vol. 60, pp. 881-903, Feb. 2014
B. Hirst, P. Jonathan, F. González del Cueto, D. Randell, and O. Kosut, "Locating and quantifying gas emission sources using remotely obtained concentration data", Atmospheric Environment, vol. 74, pp. 141-158, Aug. 2013
O. Kosut, L. Jia, R. J. Thomas, L. Tong, "Malicious data attacks on the smart grid", IEEE Trans. on Smart Grid, vol. 2, pp. 645–658, Oct. 2011
O. Kosut and L. Tong, "Distributed source coding in the presence of Byzantine sensors", IEEE Trans. on Information Theory, vol. 54, pp. 2550–2565, June 2008
Conference Publications
O. Kosut, M. Effros, and M. Langberg, "Nobody Expects a Differential Equation: Minimum Energy-Per-Bit for the Gaussian Relay Channel with Rank-1 Linear Relaying," to appear at 2024 IEEE International Symposium on Information Theory (ISIT)
W. Alghamdi, S. Asoodeh, F. Calmon, O. Kosut, and L. Sankar, "Differential-Privacy Capacity," to appear at 2024 IEEE International Symposium on Information Theory (ISIT)
M. Bakshi, S. Ghasvarianjahromi, Y. Yakimenka, A. Beemer, O. Kosut, and J. Kliewer, "VALID: a Validated Algorithm for Learning in Decentralized Networks with Possible Adversarial Presence," to appear at 2024 IEEE International Symposium on Information Theory (ISIT)
R. Anguluri, N. Taghipourbazargani, O. Kosut and L. Sankar, “Source Localization in Linear Dynamical Systems using Subspace Model Identification,” 2023 IEEE Conference on Control Technology and Applications (CCTA), pp. 1016-1021, doi: 10.1109/CCTA54093.2023.10252510.
W. Alghamdi, S. Asoodeh, F. Calmon, J. F. Gomez, O. Kosut, and L. Sankar, “The Saddle-Point Method in Differential Privacy,” 2023 International Conference on Machine Learning.
W. Alghamdi, S. Asoodeh, F. Calmon, J. F. Gomez, O. Kosut, and L. Sankar, “Optimal Multidimensional Differentially Private Mechanisms in the Large-Composition Regime,” 2023 IEEE International Symposium on Information Theory (ISIT). doi: 10.1109/ISIT54713.2023.10206658.
W. Alghamdi, S. Asoodeh, F. Calmon, J. F. Gomez, O. Kosut, and L. Sankar, “Schrödinger Mechanisms: Optimal Differential Privacy Mechanisms for Small Sensitivity,” 2023 IEEE International Symposium on Information Theory (ISIT), pp. 2201-2206, doi: 10.1109/ISIT54713.2023.10206616.
O. Kosut, M. Effros, and M. Langberg, "Perfect vs. Independent Feedback in the Multiple-Access Channel," 2023 IEEE International Symposium on Information Theory (ISIT), 2023 IEEE International Symposium on Information Theory (ISIT), pp. 1502-1507, doi: 10.1109/ISIT54713.2023.10206861.
M. Bakshi and O. Kosut, "On Authentication Against a Myopic Adversary Using Stochastic Codes," 2023 IEEE International Symposium on Information Theory (ISIT), pp. 2422-2427, doi: 10.1109/ISIT54713.2023.10206518.
R. Anguluri, L. Sankar, and O. Kosut, "Parameter Estimation in Ill-conditioned Low-inertia Power Systems", 2022 IEEE North American Power Symposium (NAPS), doi: 10.1109/NAPS56150.2022.10012252
A. Gilani, G. R. Kurri, O. Kosut and L. Sankar, "An Alphabet of Leakage Measures," 2022 IEEE Information Theory Workshop (ITW), Mumbai, India, 2022, pp. 458-463, doi: 10.1109/ITW54588.2022.9965918.
R. Anguluri, N. Taghipourbazargani, O. Kosut, and L. Sankar, "A Complex-LASSO Approach for Localizing Forced Oscillations in Power Systems", 2022 IEEE Power & Energy Society General Meeting (PESGM), doi: 10.1109/PESGM48719.2022.9916993
O. Kosut, M. Effros and M. Langberg, "On the Benefit of Cooperation in Relay Networks," 2022 IEEE International Symposium on Information Theory (ISIT), pp. 1945-1950, doi: 10.1109/ISIT50566.2022.9834763
W. Alghamdi, S. Asoodeh, F. P. Calmon, O. Kosut, L. Sankar and F. Wei, "Cactus Mechanisms: Optimal Differential Privacy Mechanisms in the Large-Composition Regime," 2022 IEEE International Symposium on Information Theory (ISIT), pp. 1838-1843, doi: 10.1109/ISIT50566.2022.9834438
G. Kurri, O. Kosut and L. Sankar, "A Variational Formula for Infinity-Rényi Divergence with Applications to Information Leakage," 2022 IEEE International Symposium on Information Theory (ISIT), pp. 2493-2498, doi: 10.1109/ISIT50566.2022.9834358
F. Wei and O. Kosut, "A Wringing-Based Proof of a Second-Order Converse for the Multiple-Access Channel under Maximal Error Probability", 2021 IEEE International Symposium on Information Theory (ISIT)
O. Kosut, M. Effros, and M. Langberg, "Every Bit Counts: Second-Order Analysis of Cooperation in the Multiple-Access Channel", 2021 IEEE International Symposium on Information Theory (ISIT)
G. Kurri, O. Kosut, and L. Sankar, "Evaluating Multiple Guesses by an Adversary via a Tunable Loss Function", 2021 IEEE International Symposium on Information Theory (ISIT)
A. Pinceti, L. Sankar, and O. Kosut, "Synthetic Time-Series Load Data via Conditional Generative Adversarial Networks", Power & Energy Society General Meeting (PESGM), 2021.
Z. Chu, J. Zhang, O. Kosut and L. Sankar, "Vulnerability Assessment of Large-scale Power Systems to False Data Injection Attacks," 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Tempe, AZ, USA, 2020, pp. 1-6
S. Asoodeh, J. Liao, F. P. Calmon, O. Kosut, and L. Sankar, "A Better Bound Gives a Hundred Rounds: Enhanced Privacy Guarantees via f-Divergences," 2020 IEEE International Symposium on Information Theory (ISIT)
A. Beemer, E. Graves, J. Kliewer, O. Kosut, and P. Yu, "Authentication with Mildly Myopic Adversaries,"2020 IEEE International Symposium on Information Theory (ISIT)
F. Hosseinigoki, O. Kosut, "Capacity Region of the Gaussian Arbitrarily-Varying Broadcast Channel," 2020 IEEE International Symposium on Information Theory (ISIT)
A. Beemer, E. Graves, J. Kliewer, O. Kosut and P. Yu, "Authentication and Partial Message Correction over Adversarial Multiple-Access Channels," 2020 IEEE Conference on Communications and Network Security (CNS), Avignon, France, 2020, pp. 1-6.
J. Liao, L. Sankar, O. Kosut and F. P. Calmon, "Maximal α-Leakage and its Properties," 2020 IEEE Conference on Communications and Network Security (CNS), Avignon, France, 2020, pp. 1-6.
A. Pinceti, O. Kosut and L. Sankar, "Data-Driven Generation of Synthetic Load Datasets Preserving Spatio-Temporal Features," 2019 IEEE Power & Energy Society General Meeting (PESGM), Atlanta, GA, USA, 2019, pp. 1-5.
Z. Chu, A. Pinceti, R. S. Biswas, O. Kosut, A. Pal and L. Sankar, "Can Predictive Filters Detect Gradually Ramping False Data Injection Attacks Against PMUs?," 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Beijing, China, 2019, pp. 1-6.
A. Beemer, O. Kosut, J. Kliewer, E. Graves and P. Yu, "Structured Coding for Authentication in the Presence of a Malicious Adversary," 2019 IEEE International Symposium on Information Theory (ISIT), Paris, France, 2019, pp. 617-621.
J. Liao, L. Sankar, O. Kosut and F. P. Calmon, "Robustness of Maximal α-Leakage to Side Information," 2019 IEEE International Symposium on Information Theory (ISIT), Paris, France, 2019, pp. 642-646.
A. Beemer, O. Kosut, J. Kliewer, E. Graves and P. Yu, "Authentication Against a Myopic Adversary," 2019 IEEE Conference on Communications and Network Security (CNS), Washington DC, DC, USA, 2019, pp. 1-5.
F. Hosseinigoki and O. Kosut, "Capacity of Gaussian Arbitrarily-Varying Fading Channels," 2019 53rd Annual Conference on Information Sciences and Systems (CISS), Baltimore, MD, USA, 2019, pp. 1-6.
O. Kosut and J. Kliewer, "Authentication Capacity of Adversarial Channels," 2018 IEEE Information Theory Workshop (ITW), Guangzhou, 2018, pp. 1-5.
J. Liao, O. Kosut, L. Sankar and F. P. Calmon, "Privacy Under Hard Distortion Constraints," 2018 IEEE Information Theory Workshop (ITW), Guangzhou, 2018, pp. 1-5.
Z. Chu, J. Zhang, O. Kosut and L. Sankar, "Unobservable False Data Injection Attacks against PMUs: Feasible Conditions and Multiplicative Attacks," 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Aalborg, 2018, pp. 1-6.
A. Pinceti, L. Sankar and O. Kosut, "Load Redistribution Attack Detection using Machine Learning: A Data-Driven Approach," 2018 IEEE Power & Energy Society General Meeting (PESGM), Portland, OR, 2018, pp. 1-5.
J. Liao, O. Kosut, L. Sankar and F. P. Calmon, "A Tunable Measure for Information Leakage," 2018 IEEE International Symposium on Information Theory (ISIT), Vail, CO, 2018, pp. 701-705.
F. Hosseinigoki and O. Kosut, "Capacity of the Gaussian Arbitrarily-Varying Channel with List Decoding," 2018 IEEE International Symposium on Information Theory (ISIT), Vail, CO, 2018, pp. 471-475.
O. Kosut and J. Kliewer, "Finite Blocklength and Dispersion Bounds for the Arbitrarily-Varying Channel," 2018 IEEE International Symposium on Information Theory (ISIT), Vail, CO, 2018, pp. 2007-2011.
J. Zhang, Z. Chu, L. Sankar and O. Kosut, "False data injection attacks on phasor measurements that bypass low-rank decomposition," 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm), Dresden, 2017, pp. 96-101.
J. Liang, L. Sankar and O. Kosut, "Vulnerability analysis and consequences of false data injection attack on power system state estimation," 2017 IEEE Power & Energy Society General Meeting, Chicago, IL, 2017.
N. Iri and O. Kosut, "Fundamental limits of universal variable-to-fixed length coding of parametric sources," 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, 2017, pp. 31-37.
K. Kalantari, L. Sankar, and O. Kosut, "On information-theoretic privacy with general distortion cost functions", in IEEE International Symposium on Information Theory (ISIT), Jun. 2017, pp. 2875–2879
O. Kosut and J. Kliewer, "Dispersion of the discrete arbitrarily-varying channel with limited shared randomness", in IEEE International Symposium on Information Theory (ISIT), Jun. 2017, pp. 1237–1241
N. Iri and O. Kosut, "Universal coding with point type classes", in Conference on Information Sciences and Systems (CISS), Mar. 2017
Z. Chu, J. Zhang, O. Kosut, and L. Sankar, "Evaluating power system vulnerability to false data injection attacks via scalable optimization", in IEEE International Conference on Smart Grid Communications (SmartGridComm), Nov. 2016, pp. 260–265
O. Kosut and J. Kliewer, "Network equivalence for a joint compound-arbitrarily-varying network model", in IEEE Information Theory Workshop (ITW), Sep. 2016, pp. 141–145.
F. Hosseinigoki and O. Kosut, "The Gaussian interference channel in the presence of a malicious jammer", in Allerton Conference on Communication, Control, and Computing, Sep. 2016, pp. 679–686
K. Kalantari, O. Kosut, and L. Sankar, "On the fine asymptotics of information theoretic privacy", in Allerton Conference on Communication, Control, and Computing, Sep. 2016, pp. 532–539
N. Iri and O. Kosut, "A new type size code for universal one-to-one compression of parametric sources", in IEEE International Symposium on Information Theory (ISIT), Jul. 2016, pp. 1227–1231
P. Tian, S. Jaggi, M. Bakshi, and O. Kosut, "Arbitrarily varying networks: Capacity-achieving computationally efficient codes", in IEEE International Symposium on Information Theory (ISIT), Jul. 2016, pp. 2139–2143
O. Kosut and J. Kliewer, "On the relationship between edge removal and strong converses", in IEEE International Symposium on Information Theory (ISIT), Jul. 2016, pp. 1779–1783
J. Zhang, Z. Chu, L. Sankar, and O. Kosut, "False data injection attacks on power system state estimation with limited information", in IEEE Power and Energy Society General Meeting (PESGM), Jul. 2016, pp. 1–5
I. Esnaola, S. M. Perlaza, H. V. Poor, and O. Kosut, "Decentralized MMSE attacks in electricity grids", in IEEE Statistical Signal Processing Workshop (SSP), June 2016, pp. 1–5
N. Iri and O. Kosut, "Third-order coding rate for universal compression of Markov sources", in IEEE International Symposium on Information Theory (ISIT), Jun. 2015, pp. 1996–2000
O. Kosut, "Boosting output distributions in finite blocklength channel coding converse bounds", in IEEE Information Theory Workshop (ITW), Apr. 2015, pp. 1–5
O. Kosut and L.-W. Kao, "On generalized active attacks by causal adversaries in networks", in IEEE Information Theory Workshop (ITW), Nov. 2014, pp. 247–251
J. Liang, O. Kosut, and L. Sankar, "Cyber attacks on AC state estimation: Unobservability and physical consequences", in IEEE Power and Energy Society General Meeting (PESGM), Jul. 2014, pp. 1–5
O. Kosut and L. Sankar, "New results on third-order coding rate for universal fixed-to-variable source coding", in IEEE International Symposium on Information Theory (ISIT), Jun. 2014, pp. 2689–2693
O. Kosut and J. Kliewer, “Equivalence for networks with adversarial state”, in IEEE International Symposium on Information Theory (ISIT), Jun. 2014, pp. 2401–2405
O. Kosut, "Max-flow min-cut for power system security index computation", in IEEE Sensor Array and Multichannel Signal Processing Workshop (SAM), Jun. 2014, pp. 61–64
O. Kosut, "Malicious data attacks against dynamic state estimation in the presence of random noise", in Global Conference on Signal and Information Processing, Dec. 2013
Y. Liu, O. Kosut, "Sampling from Gaussian graphical models using subgraph perturbations", in IEEE International Symposium on Information Theory, July 2013
O. Kosut, "Polytope codes for distributed storage in the presence of an active omniscient adversary", in IEEE International Symposium on Information Theory, July 2013
O. Kosut, L. Sankar, "Universal fixed-to-variable source coding in the finite blocklength regime", in IEEE International Symposium on Information Theory, July 2013
V. Y. F. Tan, O. Kosut, "The dispersion of Slepian-Wolf coding", in IEEE International Symposium on Information Theory, July 2012
V. Y. F. Tan, O. Kosut, "On the dispersions of three network information theory problems", in Conference on Information Sciences and Systems, March 2012
O. Kosut, L. Jia, R. J. Thomas, L. Tong, "Malicious data attacks on smart grid state estimation: attack strategies and countermeasures", in First International Conference on Smart Grid Communications, Oct. 2010
O. Kosut, L. Jia, R. J. Thomas, L. Tong, "On malicious data attacks on power system state estimation", in of 45th International Universities Power Engineering Conference, Aug.–Sep. 2010
O. Kosut, L. Tong, and D. Tse, "Polytope codes against adversaries in networks", in IEEE International Symposium on Information Theory, June 2010
Finalist for Student Paper Award
O. Kosut, L. Jia, R. Thomas, and L. Tong, "Limiting false data attacks on power system state estimation", in Conference on Information Sciences and Systems, Mar. 2010
O. Kosut, L. Tong, and D. Tse, "Nonlinear network coding is necessary to combat general Byzantine attacks", in 47th Annual Allerton Conference on Communication, Control, and Computing, Oct. 2009
O. Kosut and L. Tong, "The quadratic Gaussian CEO problem with Byzantine agents" in IEEE International Symposium on Information Theory, June–July 2009
Finalist for Student Paper Award
O. Kosut and L. Tong, "A characterization of the error exponent for the Byzantine CEO problem", in 46th Allerton Conference on Communication, Control and Computing, Sep. 2008
O. Kosut and L. Tong, "The Byzantine CEO problem", in IEEE International Symposium on Information Theory, July 2008
O. Kosut and L. Tong, "The nose of a bloodhound: target chasing aided by a static sensor network", in Asilomar Conference on Signals, Systems, and Computers, Nov. 2007
O. Kosut, A. Turovsky, J. Sun, M. Ezovski, G. Whipps, and L. Tong, "Integrated mobile and static sensing for target tracking", in Military Communications Conference, June 2007
O. Kosut and L. Tong, "Variable-rate distributed source coding in the presence of Byzantine sensors", in IEEE International Symposium on Information Theory, June 2007
Finalist for Student Paper Award
O. Kosut and L. Tong, "Capacity of cooperative fusion in the presence of Byzantine sensors", in 44th Annual Allerton Conf. on Commununication, Control and Computation, Sep. 2006
Dissertation
"Adversaries in Networks"
Cornell University Ph.D. dissertation