Suhas Diggavi
#150,389
Most Influential Person Now
Electrical engineer
Suhas Diggavi's AcademicInfluence.com Rankings
Suhas Diggaviengineering Degrees
Engineering
#6050
World Rank
#7346
Historical Rank
Electrical Engineering
#1754
World Rank
#1853
Historical Rank

Download Badge
Engineering
Suhas Diggavi's Degrees
- PhD Electrical Engineering Stanford University
- Masters Electrical Engineering Stanford University
Why Is Suhas Diggavi Influential?
(Suggest an Edit or Addition)According to Wikipedia, Suhas N. Diggavi from the University of California, Los Angeles was named Fellow of the Institute of Electrical and Electronics Engineers in 2013 for contributions to wireless networks and systems. He received a Guggenheim Fellowship in 2021.
Suhas Diggavi's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks (2012) (997)
- Wireless Network Information Flow: A Deterministic Approach (2009) (859)
- Intercarrier interference in MIMO OFDM (2002) (426)
- The worst additive noise under a covariance constraint (2001) (370)
- Great expectations: the value of spatial diversity in wireless networks (2004) (335)
- Hierarchical coded caching (2014) (294)
- A Deterministic Approach to Wireless Relay Networks (2007) (253)
- Qsparse-Local-SGD: Distributed SGD With Quantization, Sparsification, and Local Computations (2019) (252)
- A Field Guide to Federated Optimization (2021) (195)
- A blind adaptive transmit antenna algorithm for wireless communication (1995) (154)
- Wireless Network Information Flow (2007) (153)
- Even one-dimensional mobility increases ad hoc wireless capacity (2002) (137)
- Secure state-estimation for dynamical systems under active adversaries (2011) (125)
- PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks (2015) (125)
- Straggler Mitigation in Distributed Optimization Through Data Encoding (2017) (122)
- Coded Caching for Multi-level Popularity and Access (2014) (119)
- Transmission techniques for relay-interference networks (2008) (110)
- Differential space-time coding for frequency-selective channels (2002) (107)
- Secure State Estimation Against Sensor Attacks in the Presence of Noise (2015) (103)
- Characterization of fast fading vector channels for multi-antenna communication systems (1994) (103)
- Even One-Dimensional Mobility Increases the Capacity of Wireless Networks (2005) (102)
- Content caching and delivery over heterogeneous wireless networks (2014) (100)
- Approximate capacity of Gaussian relay networks (2008) (99)
- On information transmission over a finite buffer channel (2000) (93)
- Successive Refinement Via Broadcast: Optimizing Expected Distortion of a Gaussian Source Over a Gaussian Fading Channel (2008) (86)
- Approximately achieving Gaussian relay network capacity with lattice codes (2010) (83)
- Multi-level coded caching (2014) (81)
- Degrees of Freedom of Cache-Aided Wireless Interference Networks (2016) (80)
- Asymmetric multiple description lattice vector quantizers (2002) (77)
- Shuffled Model of Differential Privacy in Federated Learning (2021) (76)
- Secret-Key Generation Using Correlated Sources and Channels (2009) (71)
- Approximate Capacity of a Class of Gaussian Interference-Relay Networks (2011) (70)
- Secret-Key Agreement With Channel State Information at the Transmitter (2010) (62)
- On degrees-of-freedom of full-duplex uplink/downlink channel (2013) (61)
- Security for control systems under sensor and actuator attacks (2012) (59)
- On achievable performance of spatial diversity fading channels (1998) (59)
- Optimality and Approximate Optimality of Source-Channel Separation in Networks (2010) (59)
- Capacity Upper Bounds for the Deletion Channel (2007) (57)
- Diversity Embedded Space–Time Codes (2003) (52)
- Multistage successive refinement for Wyner-Ziv source coding with degraded side informations (2006) (51)
- Approximating the Gaussian Multiple Description Rate Region Under Symmetric Distortion Constraints (2008) (50)
- Prefiltered space-time M-BCJR equalizer for frequency-selective channels (2002) (49)
- The Achievable Distortion Region of Sending a Bivariate Gaussian Source on the Gaussian Broadcast Channel (2011) (48)
- Algebraic properties of space-time block codes in intersymbol interference multiple-access channels (2003) (46)
- Approximately Achieving Gaussian Relay Network Capacity With Lattice-Based QMF Codes (2010) (46)
- Redundancy Techniques for Straggler Mitigation in Distributed Optimization and Learning (2018) (45)
- Construction and analysis of a new quaternionic space-time code for 4 transmit antennas (2005) (44)
- Effect of number of users in multi-level coded caching (2015) (44)
- Secret-key generation with correlated sources and noisy channels (2008) (43)
- Encoded distributed optimization (2017) (43)
- On Cooperative Wireless Network Secrecy (2009) (43)
- Optimal Rate-Reliability-Delay Tradeoff in Networks with Composite Links (2007) (43)
- Side-Information Scalable Source Coding (2007) (42)
- Secure state estimation: Optimal guarantees against sensor attacks in the presence of noise (2015) (42)
- Subspace Properties of Randomized Network Coding (2007) (41)
- Approximate capacity of a class of Gaussian relay-interference networks (2009) (39)
- Coded Caching for Heterogeneous Wireless Networks with Multi-level Access (2014) (38)
- Lossy source coding for a cascade communication system with side-informations (2006) (37)
- Estimation of fast fading channels in OFDM (2002) (37)
- On the capacity of non-coherent network coding (2009) (37)
- Efficient Max-Norm Distance Computation for Reliable Voxelization (2003) (36)
- Analysis of multicarrier transmission in time-varying channels (1997) (36)
- On the Maximum Achievable Sum-Rate With Successive Decoding in Interference Channels (2012) (36)
- Noncoherent multisource network coding (2008) (35)
- SQuARM-SGD: Communication-Efficient Momentum SGD for Decentralized Optimization (2020) (35)
- Design of asymmetric multiple description lattice vector quantizers (2000) (35)
- On Locating Byzantine Attackers (2008) (35)
- On the Capacity of Noncoherent Network Coding (2011) (34)
- Fundamental limits of diversity-embedded codes over fading channels (2005) (33)
- Identity Aware Sensor Networks (2009) (31)
- Performance of multisensor adaptive MLSE in fading channels (1997) (31)
- On opportunistic codes and broadcast codes with degraded message sets (2006) (31)
- The Approximate Capacity of the Gaussian n-Relay Diamond Network (2010) (29)
- Secret message capacity of erasure broadcast channels with feedback (2011) (29)
- Group secret key generation over broadcast erasure channels (2010) (28)
- Bursty interference channel with feedback (2013) (28)
- Asymmetric Multilevel Diversity Coding and Asymmetric Gaussian Multiple Descriptions (2009) (28)
- Design and Analysis of Stability-Guaranteed PUFs (2017) (28)
- Bottleneck discovery and overlay management in network coded peer-to-peer systems (2007) (27)
- On Multistage Successive Refinement for Wyner–Ziv Source Coding With Degraded Side Informations (2006) (27)
- On Maximum Likelihood Reconstruction over Multiple Deletion Channels (2018) (27)
- Will Distributed Computing Revolutionize Peace? The Emergence of Battlefield IoT (2018) (27)
- Broadcasting private messages securely (2012) (27)
- Byzantine-Resilient SGD in High Dimensions on Heterogeneous Data (2020) (26)
- On transmission over deletion channels (2001) (26)
- On multiple description source coding with decoder side information (2004) (26)
- Toward an Internet of Battlefield Things: A Resilience Perspective (2018) (25)
- The Approximate Capacity of the Gaussian $N$-Relay Diamond Network (2013) (25)
- Multiuser DMT: a multiple access modulation scheme (1996) (25)
- Approximate Characterizations for the Gaussian Source Broadcast Distortion Region (2009) (25)
- Secret key agreement using asymmetry in channel state knowledge (2009) (25)
- A Deterministic Model for Wreless Relay Networks an its Capacity (2007) (24)
- Optimal Rate-Reliability-Delay Tradeoff in Networks with Composite Links (2009) (24)
- Models and information-theoretic bounds for nanopore sequencing (2017) (24)
- Diversity Embedding in Multiple Antenna Communications (2003) (24)
- Shuffled Model of Federated Learning: Privacy, Communication and Accuracy Trade-offs (2020) (23)
- Matched Multiuser Gaussian Source Channel Communications via Uncoded Schemes (2015) (23)
- Creating secrets out of erasures (2013) (23)
- An Approximation Approach to Network Information Theory (2015) (22)
- QuPeD: Quantized Personalization via Distillation with Applications to Federated Learning (2021) (22)
- SPARQ-SGD: Event-Triggered and Compressed Communication in Decentralized Optimization (2020) (22)
- The achievable distortion region of bivariate Gaussian source on Gaussian broadcast channel (2010) (21)
- Opportunistic scheduling for full-duplex uplink-downlink networks (2015) (21)
- Lossy source coding with Gaussian or erased side-information (2009) (21)
- On degrees-of-freedom of multi-user MIMO full-duplex network (2015) (21)
- Secure state estimation and control using multiple (insecure) observers (2014) (20)
- Nonintersecting subspaces based on finite alphabets (2003) (20)
- Byzantine-Resilient High-Dimensional SGD with Local Iterations on Heterogeneous Data (2020) (20)
- Quantize-map-forward (QMF) relaying: an experimental study (2013) (20)
- On noise insertion strategies for wireless network secrecy (2009) (20)
- Group testing for overlapping communities (2020) (19)
- SPARQ-SGD: Event-Triggered and Compressed Communication in Decentralized Stochastic Optimization (2019) (19)
- Broadcasting with Degraded Message Sets : A Deterministic Approach (2007) (19)
- Even one-dimensional mobility increases capacity of wireless adhoc networks (2002) (19)
- The Kaspi Rate-Distortion Problem with Encoder Side-Information: Binary Erasure Case (2006) (18)
- Group testing for connected communities (2021) (18)
- Randomized Algorithms for Comparison-based Search (2011) (17)
- Secret Communication Over Broadcast Erasure Channels With State-Feedback (2014) (17)
- On the Role of Encoder Side-Information in Source Coding for Multiple Decoders (2006) (17)
- Parallel scheduling problems in next generation wireless networks (2002) (17)
- Data Encoding for Byzantine-Resilient Distributed Gradient Descent (2018) (17)
- A frame-work for joint source-channel coding of images over time-varying wireless channels (1996) (17)
- Robust Geo-Routing on Embeddings of Dynamic Wireless Networks (2007) (17)
- Data Encoding for Byzantine-Resilient Distributed Optimization (2019) (17)
- Diversity Embedded Space-Time Codes (2008) (16)
- Computation over Mismatched Channels (2012) (16)
- Creating shared secrets out of thin air (2012) (16)
- On uplink/downlink full-duplex networks (2013) (16)
- Space-time signaling based on Kerdock and Delsafte-Goethals codes (2004) (16)
- On successive refinement of diversity (2004) (15)
- Exchanging pairwise secrets efficiently (2013) (15)
- Approximate Capacity of Gaussian Interference-Relay Networks with Weak Cross Links (2010) (15)
- Shuffled Model of Federated Learning: Privacy, Accuracy and Communication Trade-Offs (2021) (15)
- On the Rényi Differential Privacy of the Shuffle Model (2021) (15)
- A layered caching architecture for the interference channel (2016) (15)
- Opportunistic space-time block codes (2005) (15)
- When Are Dynamic Relaying Strategies Necessary in Half-Duplex Wireless Networks? (2014) (14)
- Securing state reconstruction under sensor and actuator attacks: Theory and design (2020) (14)
- Approximate characterizations for the Gaussian broadcasting distortion region (2009) (14)
- Enhancing Multiuser MIMO Through Opportunistic D2D Cooperation (2016) (14)
- Approximate Nearest Neighbor Search through Comparisons (2009) (14)
- Graph-based codes for Quantize-Map-and-Forward relaying (2011) (14)
- Symbolwise MAP for Multiple Deletion Channels (2019) (13)
- Community aware group testing (2020) (13)
- Sybil Attack Resilient Traffic Networks: A Physics-Based Trust Propagation Approach (2018) (13)
- LEDPUF: Stability-guaranteed physical unclonable functions through locally enhanced defectivity (2016) (13)
- Network Monitoring: it depends on your points of view (2007) (13)
- Secure Network Coding With Erasures and Feedback (2013) (13)
- The effect of bias on the guesswork of hash functions (2017) (12)
- The oblivious transfer capacity of the wiretapped binary erasure channel (2014) (12)
- Subspace Properties of Network Coding and Their Applications (2011) (12)
- Exchanging Secrets without Using Cryptography (2011) (12)
- Multiple Description Coding for Stationary Gaussian Sources (2009) (12)
- Capacity of deterministic Z-chain relay-interference network (2009) (12)
- Code construction for multiple sources network coding (2009) (12)
- Group secret key agreement over state-dependent wireless broadcast channels (2011) (11)
- Privacy-Utility Trade-off of Linear Regression under Random Projections and Additive Noise (2018) (11)
- Expected Distortion for Gaussian Source with a Broadcast Transmission Strategy over a Fading Channel (2007) (11)
- Joint structured channel and data estimation over time-varying channels (1997) (11)
- The Kaspi Rate-Distortion Problem with Encoder Side-Information: Gaussian Case (2005) (11)
- Capacity Results for Multicasting Nested Message Sets Over Combination Networks (2014) (11)
- Data Encoding Methods for Byzantine-Resilient Distributed Optimization (2019) (11)
- Exploiting common randomness: A resource for network secrecy (2013) (11)
- On the capacity of multisource non-coherent network coding (2009) (11)
- System identification in the presence of adversarial outputs (2016) (11)
- The Interference-Multiple-Access Channel (2009) (11)
- On cooperative secrecy for discrete memoryless relay networks (2010) (11)
- Guard sequence optimization for block transmission over linear frequency-selective channels (2002) (10)
- Rate splitting is approximately optimal for fading Gaussian interference channels (2015) (10)
- On degraded two message set broadcasting (2009) (10)
- QUILT: A Decode/Quantize-Interleave-Transmit approach to cooperative relaying (2014) (10)
- Triangle network secrecy (2014) (10)
- On source transmission over deterministic relay networks (2010) (10)
- On Distributed Quantization for Classification (2019) (10)
- Gaussian Interference Channel With Intermittent Feedback (2014) (10)
- Hierarchical routing over dynamic wireless networks (2008) (9)
- Differentially Private Federated Learning with Shuffling and Client Self-Sampling (2021) (9)
- Multiple Description Coding for Stationary and Ergodic Sources (2007) (9)
- Convex optimization for precoder design in MIMO interference networks (2012) (9)
- Dynamic group testing to control and monitor disease progression in a population (2021) (9)
- Harnessing Bursty Interference in Multicarrier Systems With Output Feedback (2017) (9)
- A remark on secret-key generation over correlated fading channels (2011) (9)
- Network Resource Allocation for Competing Multiple Description Transmissions (2008) (9)
- An SMT-based approach to secure state estimation under sensor and actuator attacks (2017) (9)
- Coding with encoding uncertainty (2013) (9)
- An interference suppression scheme with joint channel-data estimation (1999) (9)
- Quantization of Distributed Data for Learning (2021) (8)
- Diversity in Communication: From source coding to wireless networks (2006) (8)
- Blind estimation of multiple co-channel digital signals in vector FIR channels (1995) (8)
- Convergence models for Rosenblatt's perceptron learning algorithm (1995) (8)
- Bounds on the capacity of deletion channels (2002) (8)
- Towards integrating Quantize-Map-Forward relaying into LTE (2012) (8)
- Asymmetric Gaussian multiple descriptions and asymmetric multilevel diversity coding (2008) (8)
- Opportunistic interference management for multicarrier systems (2013) (8)
- A Calculation of the Heegard-Berger Rate-distortion Function for a Binary Source (2006) (8)
- QAlign: Aligning nanopore reads accurately using current-level modeling (2019) (7)
- Diversity Embedded Codes: Theory and Practice (2008) (7)
- Multiuser Successive Refinement and Multiple Description Coding (2006) (7)
- Asymmetric Multi-level Diversity Coding (2008) (7)
- Rate and delay for coded caching with carrier aggregation (2016) (7)
- Byzantine-Tolerant Distributed Coordinate Descent (2019) (7)
- Blind Adaptive Transmit Beamforming For Mobile Radio With Arbitrary and Unknown Antenna Array Geometries (1995) (7)
- On the sum-capacity with successive decoding in interference channels (2011) (7)
- An entropy reduction approach to continual testing (2021) (7)
- Information transmission over a finite buffer channel (2000) (7)
- Attack Resilience and Recovery using Physical Challenge Response Authentication for Active Sensors Under Integrity Attacks (2016) (7)
- Renyi Differential Privacy of the Subsampled Shuffle Model in Distributed Learning (2021) (7)
- Using feedback for secrecy over graphs (2013) (7)
- Is maximum entropy noise the worst? (1997) (6)
- Efficient string matching algorithms for combinatorial universal denoising (2005) (6)
- Multi-Party Secret Key Agreement Over State-Dependent Wireless Broadcast Channels (2017) (6)
- SLATE: A Secure Lightweight Entity Authentication Hardware Primitive (2020) (6)
- Feedback through overhearing (2014) (6)
- On scalable source coding for multiple decoders with side-information (2006) (6)
- Approximate Characterization of Capacity in Gaussian Relay Networks (2008) (6)
- Interference channels with bursty traffic and delayed feedback (2013) (6)
- Embedded Rank Distance Codes for ISI Channels (2007) (6)
- Signal detection for time-varying vector channels (1995) (6)
- On embedded diversity codes (2005) (6)
- Inter-carrier interference for MIMO OFDM (2002) (6)
- On capacity of noncoherent MIMO with asymmetric link strengths (2017) (6)
- Joint identity-message coding (2010) (6)
- Construction and analysis of a new 4 x 4 orthogonal space-time block code (2004) (6)
- On the Symmetric Gaussian Multiple Description Rate-Distortion Function (2008) (6)
- Direction-of-arrival estimation for a lens-based array (1994) (6)
- Secure network coding with erasures and feedback (2015) (6)
- On the parallel relay wire-tap network (2011) (6)
- Information flow over compound wireless relay networks (2008) (5)
- Energy-Efficiency Gains of Caching for Interference Channels (2018) (5)
- LHP: an end-to-end reliable transport protocol over wireless data networks (2003) (5)
- Joint channel-data estimation with interference suppression (1998) (5)
- Cross Layer Utility of Diversity Embedded Codes (2006) (5)
- Protecting the Privacy of Networked Multi-Agent Systems Controlled over the Cloud (2018) (5)
- Maximum throughput loss of noisy ISI channels due to narrow-band interference (2001) (5)
- Noncoherent multi-source network coding (2008) (5)
- Facebrowsing: Search and navigation through comparisons (2010) (5)
- Differentially Private Consensus-Based Distributed Optimization (2019) (5)
- On the oblivious transfer capacity region of the binary erasure broadcast channel (2014) (5)
- A multiple access approach for the compound wiretap channel (2009) (5)
- Linear diversity-embedding STBC: design issues and applications (2009) (4)
- On source-channel separation in networks (2010) (4)
- Successive refinement of diversity for fading ISI MISO channels (2008) (4)
- Wireless Network Security: Building on Erasures (2015) (4)
- Network coding for undirected information exchange (2009) (4)
- On interference cancellation and high-rate space-time codes (2003) (4)
- A distortion based approach for protecting inferences (2017) (4)
- Caching With Partial Adaptive Matching (2017) (4)
- On degrees of freedom of layered two unicast networks with delayed CSIT (2012) (4)
- Distorting an Adversary's View in Cyber-Physical Systems (2018) (4)
- Securing broadcast against dishonest receivers (2013) (4)
- Algorithms for Reconstruction Over Single and Multiple Deletion Channels (2020) (3)
- Secure State-Reconstruction Over Networks Subject to Attacks (2021) (3)
- Dynamic QMF for half-duplex relay networks (2012) (3)
- Internet Traffic and Multiresolution Analysis (2008) (3)
- QuPeL: Quantized Personalization with Applications to Federated Learning (2021) (3)
- On the convergence behavior of Rosenblatt's perceptron learning algorithm (1992) (3)
- On multicasting nested message sets over combination networks (2012) (3)
- Caching with partial matching under Zipf demands (2017) (3)
- Interference channel with intermittent feedback (2013) (3)
- Diversity embedded multiple antenna communications (2004) (3)
- Implementation of stable PUFs using gate oxide breakdown (2017) (3)
- Multiuser joint equalization and decoding of space-time codes (2003) (3)
- Harnessing bursty interference in multicarrier systems with feedback (2014) (3)
- Joint Identity-Message Coding for Sensor Networks (2008) (3)
- Approximately achieving the feedback interference channel capacity with point-to-point codes (2016) (3)
- Compound Gaussian multiple access channels with noisy feedback (2008) (3)
- On Scalable Source Coding With Decoder Side Informations (2007) (3)
- Secure system identification (2016) (3)
- Erased Secrets: Practical Information-Theoretic Group Secrecy (2010) (3)
- A novel full-rate full-diversity STBC with application to WiMAX (2005) (2)
- Nested trellis codes and shaping for the transmitter side-information problem (2003) (2)
- Group Testing for Community Infections (2021) (2)
- Robust Routing for Dynamic Wireless Networks Based on Stable Embeddings (2007) (2)
- Using mm-Waves for Secret Key Establishment (2018) (2)
- Password Cracking: The Effect of Bias on the Average Guesswork of Hash Functions (2016) (2)
- On Successive Refinement of Diversity for Fading ISI Channels (2007) (2)
- Successive Refinement of Privacy (2020) (2)
- On interactive message secrecy over erasure networks (2012) (2)
- Diversity order of space-time block codes in inter-symbol interference multiple-access channels (2003) (2)
- Generalized Degrees Freedom of Noncoherent MIMO Channels With Asymmetric Link Strengths (2017) (2)
- Scaling Laws for Energy-constrained Wireless Networks (2005) (2)
- Quantizing Signals for Linear Classification (2019) (2)
- Non-coherent hierarchical cooperation (2010) (2)
- Leveraging mm-Wave Communication for Security (2018) (2)
- Coded caching with partial adaptive matching (2017) (2)
- Introduction to the Issue on MIMO-Optimized Transmission Systems for Delivering Data and Rich Content (2008) (2)
- Generalized Degrees Freedom of Noncoherent MIMO with Asymmetric Links (2017) (2)
- Coded Caching for Heterogeneous Wireless Networks (2020) (2)
- Rank Distance Codes for ISI channels (2007) (2)
- Gaussian diamond network with adversarial jammer (2010) (2)
- Approximate Capacity of Fast Fading Interference Channels With no Instantaneous CSIT (2017) (2)
- Secure Capacity Region for Erasure Broadcast Channels with Feedback (2011) (2)
- Distortion-Based Lightweight Security for Cyber-Physical Systems (2020) (1)
- Wireless network secrecy with public feedback (2008) (1)
- On the oblivious transfer capacity of the degraded wiretapped binary erasure channel (2015) (1)
- On achievable performance over spatial diversity fading channels (1998) (1)
- Downlink Scheduling for Multirate Wireless Networks (2005) (1)
- Network resource allocation for competing multiple description transmissions (2010) (1)
- Wiretapped Oblivious Transfer (2016) (1)
- Successive refinement of ISI channels with single degree of freedom (2008) (1)
- Password Cracking: The Effect of Hash Function Bias on the Average Guesswork (2016) (1)
- Coded Estimation: Design of Backscatter Array Codes for 3D Orientation Estimation (2021) (1)
- Broadcasting Nested Message Sets (2012) (1)
- On achievable rates on time-varying frequency-selective channels (2002) (1)
- Consistency in the face of change: an adaptive approach to physical layer cooperation (2016) (1)
- On multiple access communications using spatial diversity (1999) (1)
- On interactive secrecy over erasure networks (2012) (1)
- Gaussian Diamond Network with Adversarial Jammer Soheil Mohajer (2010) (1)
- Decentralized Multi-Task Stochastic Optimization With Compressed Communications (2021) (1)
- Models and Information-Theoretic Bounds for Nanopore Sequencing (2017) (1)
- "Wireless Paint": Code Design for 3D Orientation Estimation with Backscatter Arrays (2020) (1)
- Communication-Efficient Distributed Learning: An Overview (2023) (1)
- Topology inferene using network coding (2006) (1)
- Equivalence of ML decoding to a continuous optimization problem (2020) (1)
- Quantizing data for distributed learning (2020) (1)
- On degraded two message set broadcast (2009) (1)
- Worst-case narrow-band interference over noisy dispersive channels (2000) (1)
- A block Markov encoding scheme for broadcasting nested message sets (2013) (1)
- On Leave-One-Out Conditional Mutual Information For Generalization (2022) (1)
- An achievable rate region for Gaussian interference channel with intermittent feedback (2013) (1)
- Differentially Private Stochastic Linear Bandits: (Almost) for Free (2022) (1)
- A Generative Framework for Personalized Learning and Estimation: Theory, Algorithms, and Privacy (2022) (0)
- Hiding Identities: Estimation Under Local Differential Privacy (2020) (0)
- On the Gaussian K-description problem under symmetric distortion constraints (2008) (0)
- Routing in Mobile Wireless Networks (2008) (0)
- Solutions : Homework Set # 1 Principles of Wireless Networks (2009) (0)
- Triangle Network Converse Proof (2014) (0)
- 3D Orientation Estimation With Configurable Backscatter Arrays (2022) (0)
- Guest Editorial Communication-Efficient Distributed Learning Over Networks (2023) (0)
- Securing State Estimation Under Sensor and Actuator Attacks: Theory and Design (2019) (0)
- Can we break the dependency in distributed detection? (2022) (0)
- Joint Source Channel Coding for Fading Channel : The Broadcast Approach-Expected Distortion , Gaussian Source and Channel (2008) (0)
- Rebuttal to “ Sampling Race : Bypassing Timing-based Analog Active Sensor Spoofing Detection on Analog-digital Systems ” (2016) (0)
- Linear Diversity-Embedding STBC : Systems Issues and Applications (2007) (0)
- A Coding Theoretic View of Secure State Reconstruction (2020) (0)
- A deterministic approach to wireless network error correction (2009) (0)
- HQAlign: Aligning nanopore reads for SV detection using current-level modeling (2023) (0)
- Data Encoding for Byzantine-Resilient Distributed Optimization ∗ Deepesh Data (2019) (0)
- Diversity-embedded space-time codes (2003) (0)
- Byzantine-Resilient High-Dimensional Federated Learning (2020) (0)
- SQuARM-SGD: Communication-Efficient Momentum SGD for Decentralized Optimization (2021) (0)
- On the Generalized Degrees of Freedom of the Noncoherent Interference Channel (2018) (0)
- Space–Time Coding and Application in WiMAX (2009) (0)
- Coded Caching: Global vs Local Content Popularity (2019) (0)
- Fe b 20 19 Privacy-Utility Trade-off of Linear Regression under Random Projections and Additive Noise (2019) (0)
- On Capacity of Non-Coherent Diamond Networks (2018) (0)
- SPARQ-SGD: Event-Triggered and Compressed Communication in Decentralized Optimization (2023) (0)
- Leveraging Millimeter Waves for Security (2018) (0)
- Decentralized Learning Robust to Data Poisoning Attacks (2022) (0)
- Homework Set # 5 Principles of Wireless Networks (2009) (0)
- Maximum Throughput Loss of Noisy ISI Channels Due to Narrowband (2010) (0)
- Hierarchical Routing in Dynamic α-Doubling Networks (2007) (0)
- Hierarchical Routing in Dynamic $\alpha$-Doubling Networks (2007) (0)
- Log-likelihood ratio (LLR) estimations for Turbo decoders with Quantize-Map-Forward (QMF) Relaying (2012) (0)
- Joy Thomas: Legacy, Foundation and the IT Society (2021) (0)
- Guard sequence optimization for block transmission over linear dispersive channels (2000) (0)
- Multi-Message Shuffled Privacy in Federated Learning (2023) (0)
- Electronic Theses and Dissertations Title On Interactive Computation over a Noisy Channel (2014) (0)
- An LP Characterization of the Secret-message Capacity of Three Erasure Networks With Feedback (2016) (0)
- Distributed User-Level Private Mean Estimation (2022) (0)
- Implementation and Analysis of Stable PUFs Using Gate Oxide Breakdown (2018) (0)
- Approximate capacity of Fading Gaussian Interference Channels with Point-to-Point codes (2017) (0)
- Solution to Final Exam , Problem 1 (2008) (0)
- On the Parallel Relay Wiretap Network (2011) (0)
- Maximum Rank Distance (MRD) Codes for ISI channels (2006) (0)
- Caching for interference networks: a separation architecture (2021) (0)
- Approximate Capacity of Fast Fading Interference Channels with No CSIT (2017) (0)
- On Byzantine-Resilient High-Dimensional Stochastic Gradient Descent (2020) (0)
- Improving Group Testing via Gradient Descent (2022) (0)
- HQAlign: Aligning nanopore reads for SV detection using current-level modeling (2023) (0)
This paper list is powered by the following services:
Other Resources About Suhas Diggavi
What Schools Are Affiliated With Suhas Diggavi?
Suhas Diggavi is affiliated with the following schools: