Inference under information constraints I: Lower bounds from chi-square contraction J Acharya, CL Canonne, H Tyagi IEEE Transactions on Information Theory 66 (12), 7835-7855, 2020 | 116 | 2020 |
Estimating Renyi Entropy of Discrete Distributions J Acharya, A Orlitsky, AT Suresh, H Tyagi IEEE Transactions on Information Theory 63 (1), 38-56, 2017 | 87 | 2017 |
The complexity of estimating Rényi entropy J Acharya, A Orlitsky, AT Suresh, H Tyagi Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete …, 2014 | 82 | 2014 |
Converses for secret key agreement and secure computing H Tyagi, S Watanabe IEEE Transactions on Information Theory 61 (9), 4809-4827, 2015 | 72 | 2015 |
Common information and secret key capacity H Tyagi IEEE Transactions on Information Theory 59 (9), 5627-5640, 2013 | 72 | 2013 |
Test without trust: Optimal locally private distribution testing J Acharya, C Canonne, C Freitag, H Tyagi The 22nd International Conference on Artificial Intelligence and Statistics …, 2019 | 68 | 2019 |
Secret key agreement: General capacity and second-order asymptotics M Hayashi, H Tyagi, S Watanabe IEEE Transactions on Information Theory 62 (7), 3796-3810, 2016 | 64 | 2016 |
When is a function securely computable? H Tyagi, P Narayan, P Gupta IEEE Transactions on Information Theory 57 (10), 6337-6350, 2011 | 64 | 2011 |
Inference under information constraints II: Communication constraints and shared randomness J Acharya, CL Canonne, H Tyagi IEEE Transactions on Information Theory 66 (12), 7856-7877, 2020 | 60 | 2020 |
A simple criterion on degree sequences of graphs A Tripathi, H Tyagi Discrete Applied Mathematics 156 (18), 3513-3517, 2008 | 58 | 2008 |
A bound for multiparty secret key agreement and implications for a problem of secure computing H Tyagi, S Watanabe Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014 | 51 | 2014 |
Universal hashing for information-theoretic security H Tyagi, A Vardy Proceedings of the IEEE 103 (10), 1781-1795, 2015 | 50 | 2015 |
Interactive inference under information constraints J Acharya, CL Canonne, Y Liu, Z Sun, H Tyagi IEEE Transactions on Information Theory 68 (1), 502-516, 2021 | 45 | 2021 |
RATQ: A universal fixed-length quantizer for stochastic optimization P Mayekar, H Tyagi International Conference on Artificial Intelligence and Statistics, 1399-1409, 2020 | 45 | 2020 |
Optimal lossless source codes for timely updates P Mayekar, P Parag, H Tyagi 2018 IEEE International Symposium on Information Theory (ISIT), 1246-1250, 2018 | 42 | 2018 |
Strong converse using change of measure arguments H Tyagi, S Watanabe IEEE Transactions on Information Theory 66 (2), 689-703, 2019 | 41 | 2019 |
Multiterminal secrecy by public discussion P Narayan, H Tyagi Foundations and Trends® in Communications and Information Theory 13 (2-3 …, 2016 | 40 | 2016 |
Inference under information constraints III: Local privacy constraints J Acharya, CL Canonne, C Freitag, Z Sun, H Tyagi IEEE Journal on Selected Areas in Information Theory 2 (1), 253-267, 2021 | 39 | 2021 |
Explicit capacity-achieving coding scheme for the Gaussian wiretap channel H Tyagi, A Vardy 2014 IEEE International Symposium on Information Theory, 956-960, 2014 | 38 | 2014 |
Communication for generating correlation: A unifying survey M Sudan, H Tyagi, S Watanabe IEEE Transactions on Information Theory 66 (1), 5-37, 2019 | 36 | 2019 |