Publications

2018

  • Wide Compression: Tensor Ring Nets 
    W. Wang, Yifan Sun, Brian Eriksson, V. Aggarwal
    Proceedings of CVPR 2018
    Salt Lake City, June 2018
  • Global Optimality in Inductive Matrix Completion
    Mohsen Ghassemi, A. Sarwate, Naveen Goela
    Proceedings of ICASSP 2018
    Calgary, Canada, April 2018
  • A Sparse Topic Model for Extracting Aspect-Specific Summaries from Online Reviews
    V Rakesh, Weicong Ding, A Ahuja, Nikhil Rao, Yifan Sun, CK Reddy
    Proceedings of the 2018 World Wide Web Conference on World Wide Web, 1573-1582
    4/10/2018
  • Dynamic Word Embeddings for Evolving Semantic Discovery
    Z Yao, Yifan Sun, Weicong Ding, Nikhil Rao, H Xiong
    Proceedings of the 11th ACM International Conference on Web Search & Data Mining, 673-681
    02/02/2018
  • Discrete Wasserstein GANs (Generative Adversarial Networks)
    Rizal Fathony, Naveen Goela
    IEEE Information Theory and Applications Workshop (ITA) 2018
    San Diego, CA. February 2018

2017

  • Straggler Mitigation in Distributed Optimization Through Data Encoding
    Can Karakus, Yifan Sun, S. Diggavi, W. Yin
    Proceedings of NIPS 2018
    Montreal, Canada, Dec 2017
  • A Compressed Sensing Based Decomposition of Electrodermal Activity Signals
    Swayambhoo Jain, U Oswal, KS Xu, Brian Eriksson, Jarvis Haupt
    IEEE Transactions on Biomedical Engineering 64 (9), 2142-2151
    09/2017
  • Inverse Covariance Estimation with Structured Groups 
    Shaozhe Tao, Yifan Sun, Daniel Boley
    Proceedings of IJCAI 2017
    Melbourne, Australia. August 2017
  • From VFX Project Management to Predictive Forecasting 
    Hannes Rickles, Stefan Puschendorf, Sandilya Bhamidipati, Brian Eriksson, Akshay Pushparaja
    Proceedings of ACM SIGGRAPH 2017 (Talks Track)
    Los Angeles, CA. August 2017
  • Node Embedding via Word Embedding for Network Community Discovery
    C Lin, P Ishwar, Weicong Ding
    Acoustics, Speech and Signal Processing (ICASSP)
    7/24/2017
  • SoundTrak: Continuous 3D Tracking of a Finger Using Active Acoustics 
    Cheng Zhang, Qiuyue Xue, Anandghan Waghmare, Sumeet Jain, Yiming Pu, Jordan Conant, Sinan Hersek, Kent Lyons, Kenneth A. Cunefare, Omer T. Inan, Gregory D. Abowd
    Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
    Volume 1, Issue 2, June 2017
  • Encoded Distributed Optimization
    Can Karakus, Yifan Sun, Suhas Diggavi
    IEEE International Symposium on Information Theory (ISIT) 2017
    Aachen, Germany. June 2017
  • Noisy Tensor Completion For Tensors With A Sparse Canonical Polyadic Factor
    Swayambhoo Jain, A. Gutierrez, and J. Haupt
    IEEE International Symposium on Information Theory (ISIT) 2017
    Aachen, Germany. June 2017
  • Noisy Inductive Matrix Completion Under Sparse Factor Models
    A. Soni, T. Chevalier, and Swayambhoo Jain
    IEEE International Symposium on Information Theory (ISIT) 2017
    Aachen, Germany. June 2017
  • Infrastructure-less Indoor Localization using High-Frequency Light Fingerprints
    Shahab Rad-Hamidi, Kent Lyons, Naveen Goela
    Proceedings of IEEE ICASSP 2017
    New Orleans, LA. March 2017
  • On Convolutional Approximations to Linear Dimensionality Reduction Operators
    Swayambhoo Jain, Jarvis Haupt
    IEEE International Conference on Acoustics, Speech and Signal Processing(ICASSP)
    New Orleans, March 2017
  • Advances in DNA Storage
    Naveen Goela, Jean Bolot
    IEEE Info. Theory & Applications Workshop (ITA) 2017
    San Diego, CA. February 2017

2016

  • Structured Sparse Regression via Greedy Hard Thresholding 
    Prateek Jain, Nikhil Rao, and Inderjit Dhillon
    Proceedings of NIPS 2016
    Barcelona, Spain. December 2016
  • Submatrix-constrained Inverse Covariance Estimation
    Shaozhe Tao, Yifan Sun, Daniel Boley
    NIPS 2016
    Barcelona, Spain. December 2016
  • 2D Input for Virtual Reality Enclosures with Magnetic Field Sensing 
    Kent Lyons
    Proceedings of ISWC 2016
    Heidelberg, Germany. September 2016
  • The Structure of Polarized Channels via Explicit Parameters.
    Naveen Goela
    IEEE Allerton Conference on Communication, Control, and Computing
    Urbana, IL. September 2016
  • Exploring the Design Space of Touch-based Vibrotactile Interactions for Smartwatches 
    Hasti Sefi and Kent Lyons
    Proceedings of ISWC 2016
    Heidelberg, Germany. September 2016
  • Visual Parameters Impacting Reaction Times on Smartwatches 
    Kent Lyons
    Proceedings of MobileHCI 2016
    Florence, Italy. September 2016
  • Just One More: Modeling Binge Watching Behavior
    William Trouleau, Azin Ashkan, Weicong Ding, Brian Eriksson
    Proceedings of ACM SIGKDD 2016
    San Francisco, CA. August 2016
  • Goal Directed Inductive Matrix Completion
    Si Si, Kai Yang Chiang, Cho Jui Hsieh, Nikhil Rao, and Inderjit Dhillon
    Proceedings of ACM SIGKDD 2016
    San Francisco, CA. August 2016
  • Detecting Divisions of the Autonomic Nervous System Using Wearables.
    Annamalai Natarajan, Kevin Xu, and Brian Eriksson.
    IEEE Engineering in Medicine and Biology Conference 2016
    Orlando, FL. July 2016
  • Smartwatch Innovation: Exploring a Watch-First Model 
    Kent Lyons
    IEEE Pervasive Computing Volume 15(1), pp. 10–13, 2016.
  • Computation in Multicast Networks: Function Alignment and Converse Theorems.
    Changho Suh, Naveen Goela, and Michael Gastpar
    IEEE Transactions on Information Theory
    Volume 62, no. 4, pp. 1866-1877, April, 2016.
  • Encoding Movies and Data in DNA Storage.
    Naveen Goela and Jean Bolot
    IEEE Information Theory and Applications Workshop (ITA)
    San Diego, CA. February 2016

2015

Alumni Publications

2016 Alumni Publications

2015 Alumni Publications

2014 Alumni Publications

  • Recent advances in ID-based encryption PDF
    Marc Joye
    In W. Meier and D. Mukhopadhyay, Eds., Progress in Cryptology – INDOCRYPT 2014, vol. 8885 of Lecture Notes in Computer Science, p. XXI, Springer, 2014
  • Concise multi-challenge CCA-secure encryption and signatures with almost tight security PDF
    Benoît Libert, Marc Joye, Moti Yung, and Thomas Peters
    In P. Sarkar and T. Iwata, Eds., Advances in Cryptology – ASIACRYPT 2014, Part II, vol. 8874 of Lecture Notes in Computer Science, pp. 1-21, Springer, 2014
  • Sequential relevance maximization with binary feedback PDF
    Vijay Kamble, Nadia Fawaz, and Fernando Silveira
    In Neural Information Processing Systems Workshop (NIPS 2014), Montréal, Canada, December 13, 2014
  • From the information bottleneck to the privacy funnel PDF
    Ali Makhdoumi, Salman Salamatian, Nadia Fawaz, and Muriel Médard
    In 2014 IEEE Information Theory Workshop (ITW 2014), pp. 501-505, IEEE Press, 2014
  • Recommending with an agenda: Active learning of private attributes using matrix factorization PDF
    Smriti Bhagat, Udi Weinsberg, Stratis Ioannidis, and Nina Taft
    In A. Kobsa et al., Eds., 8th ACM Conference on Recommender Systems (RecSys 2014), pp. 65-72, ACM Press, 2014
  • Diversified utility maximization for recommendations PDF
    Azin Ashkan, Branislav Kveton, Shlomo Berkovsky, and Zheng Wen
    In RecSys Posters 2014, 8th ACM Conference on Recommender Systems, Foster City, CA, USA, October 6-10, 2014
  • Optimal recommendations under attraction, aversion, and social influence PDF
    Wei Lu, Stratis Ioannidis, Smriti Bhagat, and Laks V. S. Lakshmanan
    In S. A. Macskassy et al., Eds., 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2014), pp. 811-820, ACM Press, 2014
  • Large-scale optimistic adaptive submodularity PDF
    Victor Gabillon, Branislav Kveton, Zheng Wen, Brian Eriksson, and S. Muthukrishnan
    In 28th AAAI Conference on Artificial Intelligence (AAAI-14), pp. 1816-1823, AAAI, 2014
  • Spectral bandits for smooth graph functions with applications in recommender systems PDF
    Tomáš Kocák, Michal Valko, Rémi Munos, Branislav Kveton, and Shipra Agrawal
    In Workshop on Sequential Decision Making with Big Data, 28th AAAI Conference on Artificial Intelligence (AAAI-14), pp. 10-14, AAAI, 2014
  • Matroid bandits: Practical large-scale combinatorial bandits PDF
    Branislav Kveton, Zheng Wen, Azin Ashkan, and Hoda Eydgahi
    In Workshop on Sequential Decision Making with Big Data, 28th AAAI Conference on Artificial Intelligence (AAAI-14), pp. 15-18, AAAI, 2014
  • Matroid bandits: Fast combinatorial optimization with learning PDF
    Branislav Kveton, Zheng Wen, Azin Ashkan, Hoda Eydgahi, and Brian Eriksson
    In N. L. Zhang and J. Tian, Eds., 30th Conference on Uncertainty in Artificial Intelligence (UAI 2014), pp. 420-429, AUAI Press, 2014
  • SSPM: Sparse privacy preserving mappings PDF
    Salman Salamatian, Nadia Fawaz, Branislav Kveton, and Nina Taft
    In 30th Conference on Uncertainty in Artificial Intelligence (UAI 2014), Quebec City, Canada, July 23-27, 2014
  • Privacy auctions for recommender systems PDF
    Pranav Dandekar, Nadia Fawaz, and Stratis Ioannidis
    ACM Transactions on Economics and Computation2(3), article no. 12, 2014
  • Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares PDF
    Benoît Libert, Marc Joye, and Moti Yung
    In S. Dolev, Ed., 2014 ACM Symposium on Principles of Distributed Computing (PODC 2014), pp. 303-312, ACM Press, 2014
  • Spectral bandits for smooth graph functions PDF
    Michal Valko, Rémi Munos, Branislav Kveton, and Tomáš Kocák
    In 31st International Conference on Machine Learning (ICML 2014), pp. 46–54, JMLR, 2014
  • Modeling correlated arrival events with latent semi-Markov processes PDF
    Wenzhao Lian, Vinayak Rao, Brian Eriksson, and Lawrence Carin
    In 31st International Conference on Machine Learning (ICML 2014), pp. 396–404, JMLR, 2014
  • Learning mixtures of linear classifiers PDF
    Yuekai Sun, Stratis Ioannidis, and Andrea Montanari
    In 31st International Conference on Machine Learning (ICML 2014), pp. 721–729, JMLR, 2014
  • Learning latent variable Gaussian graphical models PDF
    Zhaoshi Meng, Brian Eriksson, and Alfred O. Hero III
    In 31st International Conference on Machine Learning (ICML 2014), pp. 1269–1277, JMLR, 2014
  • Privacy tradeoffs in predictive analytics PDF
    Stratis Ioannidis, Andrea Montanari, Udi Weinsberg, Smriti Bhagat, Nadia Fawaz, and Nina Taft
    In S. Sanghavi et al., Eds., 2014 International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS 2014), pp. 57-69, ACM Press, 2014
  • Non-malleability from malleability: Simulation-sound quasi-adaptive NIZK proofs and CCA2-secure encryption from homomorphic signatures PDF
    Benoît Libert, Thomas Peters, Marc Joye, and Moti Yung
    In P. Q. Nguyen and E. Oswald, Eds., Advances in Cryptology – EUROCRYPT 2014, vol. 8441 of Lecture Notes in Computer Science, pp. 514-532, Springer, 2014
  • PriView: Media consumption and recommendation meet privacy against inference attacks PDF
    Amy Zhang, Sandilya Bhamidipati, Nadia Fawaz, and Branislav Kveton
    In Web 2.0 Security & Privacy 2014, San Jose, CA, USA, May 18, 2014
  • Addition with blinded operands PDF
    Mohamed Karroumi, Benjamin Richard, and Marc Joye
    In E. Prouff, Ed., Constructive Side-Channel Analysis and Secure Design (COSADE 2014), vol. 8622 of Lecture Notes in Computer Science, pp. 41-55, Springer, 2014
  • Budget feasible mechanisms for experimental design PDF
    Thibaut Horel, Stratis Ioannidis, and S. Muthukrishnan
    In A. Pardo and A. Viola, Eds., LATIN 2014: Theoretical Informatics, vol. 8392 of Lecture Notes in Computer Science, pp. 719-730, Springer, 2014
  • Traceable group encryption PDF
    Benoît Libert, Moti Yung, Marc Joye, and Thomas Peters
    In H. Krawczyk, Ed., Public Key Cryptography – PKC 2014, vol. 8383 of Lecture Notes in Computer Science, pp. 592-610, Springer, 2014
  • Group signatures with message-dependent opening in the standard model PDF
    Benoît Libert and Marc Joye
    In J. Benaloh, Ed., Topics in Cryptology – CT-RSA 2014, vol. 8366 of Lecture Notes in Computer Science, pp. 286-306, Springer, 2014
  • From differential privacy to divergence privacy
    Nadia Fawaz, Flávio du Pin Calmon, Ali Makhdoumi, and Salman Salamatian
    In Information Theory and Applications Workshop (ITA 2014), San Diego, CA, USA, February 9-14, 2014

2013 Alumni Publications

2012 Alumni Publications

  • Distributed caching over heterogeneous mobile networks PDF
    Stratis Ioannidis, Laurent Massoulié, and Augustin Chaintreau
    Queueing Systems – Theory and Applications72(3/4):279-309, 2012
  • Privacy auctions for recommender systems PDF
    Pranav Dandekar, Nadia Fawaz, and Stratis Ioannidis
    In P. W. Goldberg, Ed., Internet and Network Economics (WINE 2012), vol. 7695 of Lecture Notes in Computer Science, pp. 309-322, Springer, 2012
  • Learning to discover: A Bayesian approach PDF
    Zheng Wen, Branislav Kveton, and Sandilya Bhamidipati
    In NIPS Workshop on Bayesian Optimization and Decision Making, Lake Tahoe, NV, USA, December 7, 2012
  • Orchestrating massively distributed CDNs PDF
    Wenjie Jiang, Stratis Ioannidis, Laurent Massoulié, and Fabio Picconi
    In C. Barakat et al., Eds., 8th COnference on emerging Networking EXperiments and Technologies (CoNEXT 2012), pp. 133-144, ACM Press, 2012
  • Privacy against statistical inference PDF
    Flávio du Pin Calmon and Nadia Fawaz
    In 50th Annual Allerton Conference on Communication, Control, and Computing, pp. 1401-1408, IEEE Press, 2012
  • CARE: Content aware redundancy elimination for challenged networks PDF
    Udi Weinsberg, Qingxi Li, Nina Taft, Athula Balachandran, Vyas Sekar, Gianluca Iannaccone, and Srinivasan Seshan
    In 11th ACM Workshop on Hot Topics in Networks (HotNets-XI), pp. 127-132, ACM Press, 2012
  • BlurMe: Inferring and obfuscating user gender based on ratings PDF
    Udi Weinsberg, Smriti Bhagat, Stratis Ioannidis, and Nina Taft
    In P. Cunningham et al., Eds., 6th ACM Conference on Recommender Systems (RecSys 2012), pp. 195-202, ACM Press, 2012
  • Finding a needle in a haystack of reviews: Cold start context-based hotel recommender system PDF
    Asher Levi, Osnat Mokryn, Christophe Diot, and Nina Taft
    In 6th ACM Conference on Recommender Systems (RecSys 2012), Demonstration, Dublin, Ireland, September 9-13, 2012
  • Learning in a large function space: Privacy-preserving mechanisms for SVM learning PDF
    Ben Rubinstein, Peter Bartlett, Ling Huang, and Nina Taft
    Journal of Privacy and Confidentiality4(1):65-100, 2012
  • Incorporating metadata into dynamic topic analysis PDF
    Tianxi Li, Branislav Kveton, Yu Wu, and Ashwin Kashyap
    UAI 9th Bayesian Modeling Applications Workshop, Catalina Island, CA, USA, August 18, 2012
  • Guess who rated this movie: Identifying users through subspace clustering PDF
    Amy Zhang, Nadia Fawaz, Stratis Ioannidis, and Andrea Montanari
    In 28th Conference on Uncertainty in Artificial Intelligence (UAI 2012), Catalina Island, CA, USA, August 14-18, 2012
  • Leveraging side observations in stochastic bandits PDF
    Stéphane Caron, Branislav Kveton, Marc Lelarge, and Smriti Bhagat
    In 28th Conference on Uncertainty in Artificial Intelligence (UAI 2012), Catalina Island, CA, USA, August 14-18, 2012
  • Kernel-based reinforcement learning on representative states PDF
    Branislav Kveton and Georgios Theocharous
    In 26th AAAI Conference on Artificial Intelligence (AAAI-12), pp. 977-983, AAAI, 2012
  • Are call detail records biased for sampling human mobility? PDF
    Gyan Ranjan, Hui Zang, Zhi-Li Zhang, and Jean Bolot
    Mobile Computing and Communications Review16(3):33-44, 2012
  • Reducibility of joint relay positioning and flow optimization problem PDF
    Mohit Thakur, Nadia Fawaz, and Muriel Médard
    In 2012 IEEE International Symposium on Information Theory (ISIT 2012), pp. 11171-1121, IEEE Press, 2012
  • Comparison-based learning with rank nets PDF
    Amin Karbasi, Stratis Ioannidis, and Laurent Massoulié
    In 29th International Conference on Machine Learning (ICML 2012), icml.cc / Omnipress, 2012
  • Topological trends of Internet content providers PDF
    Yuval Shavitt and Udi Weinsberg
    In 4th Annual Workshop on Simplifying Complex Networks for Practitioners (Simplex 2012), pp. 13-18, ACM Press, 2012
  • Characterizing end-host application performance across multiple networking environments PDF
    Diana Joumblatt, Oana Goga, Renata Teixeira, Jaideep Chandrashekar, and Nina Taft
    In 2012 IEEE International Conference on Computer Communications (INFOCOM 2012), pp. 2536-2540, IEEE Press, 2012
  • Passive and Active Measurement PDF
    Nina Taft and Fabio Ricciato, Eds.
    Lecture Notes in Computer Science, volume 7192, Springer, 2012
  • Private linear maps under decaying privacy
    Nadia Fawaz, S. Muthukrishnan, and Aleksandar Nikolov
    In Information Theory and Applications Workshop (ITA 2012), San Diego, CA, USA, February 5-10, 2012
  • Predicting packet loss statistics with hidden Markov models for FEC control PDF
    Fernando Silveira and Edmundo de Souza e Silva
    Computer Networks56(2):628-641, 2012
  • Hot or not: Interactive content search using comparisons PDF
    Amin Karbasi, Stratis Ioannidis, and Laurent Massoulié
    In Information Theory and Applications Workshop (ITA 2012), San Diego, CA, USA, February 5-10, 2012

2011 Alumni Publications

  • Snooze: Energy management in 802.11n WLANs PDF
    Ki-Young Jang, Shuai Hao, Anmol Sheth, and Ramesh Govindan
    In 7th COnference on emerging Networking EXperiments and Technologies (CoNEXT 2011), Article no. 12, ACM Press, 2011
  • YouProve: Authenticity and fidelity in mobile sensing PDF
    Peter Gilbert, Jaeyeon Jung, Kyungmin Lee, Henry Qin, Daniel Sharkey, Anmol Sheth, and Landon P. Cox
    In J. Liu, P. Levis, K. Römer, Eds., 9th International Conference on Embedded Networked Sensor Systems (SenSys 2011), pp. 176-189, ACM Press, 2011
  • Distributed rating prediction in user generated content streams PDF
    Sibren Isaacman, Stratis Ioannidis, Augustin Chaintreau, and Margaret Martonosi
    In B. Mobasher et al., Eds., 2011 ACM Conference on Recommender Systems (RecSys 2011), pp. 69-76, ACM Press, 2011
  • Identifying users from their rating patterns PDF
    José Bento, Nadia Fawaz, Andrea Montanari, and Stratis Ioannidis
    In Challenge on Context-aware Movie Recommendation (CAMRa 2011), 2011 ACM Recommender Systems Conference, Chicago, IL, USA, October 27, 2011
  • Distributed collaborative filtering over social networks PDF
    Sibren Isaacman, Stratis Ioannidis, Augustin Chaintreau, and Margaret Martonosi
    In 49th Annual Allerton Conference on Communication, Control, and Computing, pp. 1136-1142, IEEE Press, 2011
  • Anonymization of location data does not work: A large-scale measurement study PDF
    Hui Zang and Jean Bolot
    In P. Ramanathan, T. Nandagopal, and B. N. Levine, Eds., 17th Annual International Conference on Mobile Computing and Networking (MOBICOM 2011), pp. 145-156, ACM Press, 2011
  • Performance of networked applications: The challenges in capturing the user’s perception PDF
    Diana Joumblatt, Renata Teixeira, Jaideep Chandrashekar, and Nina Taft
    In Workshop on Measurements Up the STack (W-MUST), ACM SIGCOMM 2011 Workshop, pp. 37-42, ACM Press, 2011
  • Uplink traffic control in home 802.11 wireless networks PDF
    Yanlin Li, Konstantina Papagiannaki, and Anmol Sheth
    In HomeNets 2011, ACM SIGCOMM 2011 Workshop, pp. 55-60, ACM Press, 2011
  • Automatic identity inference for smart TVs PDF
    Avneesh Saluja, Frank Mokaya, Mariano Phielipp, and Branislav Kveton
    In Workshop on Lifelong Learning, 25th AAAI Conference on Artificial Intelligence (AAAI-11), pp. 31-37, AAAI, 2011
  • On the geometry of wireless network multicast in 2-D PDF
    Mohit Thakur, Nadia Fawaz, and Muriel Médard
    In 2011 IEEE International Symposium on Information Theory (ISIT 2011), pp. 1628-1632, IEEE Press, 2011
  • Content search through comparisons PDF
    Amin Karbasi, Stratis Ioannidis, and Laurent Massoulié
    In L. Aceto, M. Henzinger, and J. Sgall, Eds., Automata, Languages and Programming (ICALP 2011), vol. 6756 of Lecture Notes in Computer Science, pp. 601-612, Springer, 2011
  • Mining and modeling large scale cell phone data PDF
    Jean Bolot
    In A. Chaintreau and D. R. Kowalski, Eds., 7th ACM SIGACT/SIGMOBILE International Workshop on Foundations of Mobile Computing (FOMC 2011), pp. 1-3, ACM Press, 2011
  • On the stability and optimality of universal swarms PDF
    Xia Zhou, Stratis Ioannidis, and Laurent Massoulié
    In A. Merchant, K. Keeton, and D. Rubenstein, Eds., 2011 International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS 2011), pp. 341-352, ACM Press, 2011
  • Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd PDF
    Gjergji Zyba, Geoffrey M. Voelker, Stratis Ioannidis, and Christophe Diot
    In 30th IEEE International Conference on Computer Communications (INFOCOM 2011), pp. 1179-1187, IEEE Press, 2011
  • Probing for loss: The case against probe trains PDF
    François Baccelli, Sridhar Machiraju, Darryl Veitch, and Jean Bolot
    IEEE Communications Letters15(5):590-592, 2011