default search action
Ibrahim Issa
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Elena Ghazi, Ibrahim Issa:
Total Variation Meets Differential Privacy. IEEE J. Sel. Areas Inf. Theory 5: 207-220 (2024) - [j6]Benjamin Wu, Aaron B. Wagner, Ibrahim Issa, G. Edward Suh:
Strong Asymptotic Composition Theorems for Mutual Information Measures. IEEE Trans. Inf. Theory 70(5): 3049-3058 (2024) - [c18]Serge Sarkis, Ibrahim Issa, Dany Abou Jaoude, Salma Talhouk:
Leveraging Deep Learning for the Reconstruction of Plant Hyperspectral Data from RGB Images. IGARSS 2024: 8058-8063 - [c17]Amedeo Roberto Esposito, Michael Gastpar, Ibrahim Issa:
Variational Characterizations of Sibson's α-Mutual Information. ISIT 2024: 2110-2115 - [c16]Robinson D. H. Cung, Yanina Y. Shkel, Ibrahim Issa:
Binary Maximal Leakage. ISIT 2024: 2748-2753 - [i15]Amedeo Roberto Esposito, Michael Gastpar, Ibrahim Issa:
Sibson's α-Mutual Information and its Variational Representations. CoRR abs/2405.08352 (2024) - [i14]Jihad Fahs, Ibrahim C. Abou-Faycal, Ibrahim Issa:
Testing the Isotropic Cauchy Hypothesis. CoRR abs/2408.06269 (2024) - 2023
- [c15]Ibrahim Issa, Amedeo Roberto Esposito, Michael Gastpar:
Asymptotically Optimal Generalization Error Bounds for Noisy, Iterative Algorithms. COLT 2023: 4952-4976 - [c14]Elena Ghazi, Ibrahim Issa:
Total Variation with Differential Privacy: Tighter Composition and Asymptotic Bounds. ISIT 2023: 1806-1811 - [i13]Ibrahim Issa, Amedeo Roberto Esposito, Michael Gastpar:
Asymptotically Optimal Generalization Error Bounds for Noisy, Iterative Algorithms. CoRR abs/2302.14518 (2023) - [i12]Elena Ghazi, Ibrahim Issa:
Total Variation Meets Differential Privacy. CoRR abs/2311.01553 (2023) - 2022
- [c13]Ibrahim Issa, Aaron B. Wagner:
An Adaptive Composition Theorem for Maximal Leakage for Binary Inputs. ISIT 2022: 2851-2855 - [c12]Rajai Nasser, Ibrahim Issa, Ibrahim C. Abou-Faycal:
Age Distribution in Arbitrary Preemptive Memoryless Networks. ISIT 2022: 3198-3203 - [i11]Rajai Nasser, Ibrahim Issa, Ibrahim C. Abou-Faycal:
Age Distribution in Arbitrary Preemptive Memoryless Networks. CoRR abs/2202.01297 (2022) - 2021
- [j5]Amedeo Roberto Esposito, Michael Gastpar, Ibrahim Issa:
Generalization Error Bounds via Rényi-, f-Divergences and Maximal Leakage. IEEE Trans. Inf. Theory 67(8): 4986-5004 (2021) - 2020
- [j4]Jayadev Acharya, Ibrahim Issa, Nirmal V. Shende, Aaron B. Wagner:
Estimating Quantum Entropy. IEEE J. Sel. Areas Inf. Theory 1(2): 454-468 (2020) - [j3]Ibrahim Issa, Aaron B. Wagner, Sudeep Kamath:
An Operational Approach to Information Leakage. IEEE Trans. Inf. Theory 66(3): 1625-1657 (2020) - [c11]Benjamin Wu, Aaron B. Wagner, G. Edward Suh, Ibrahim Issa:
Strong Asymptotic Composition Theorems for Sibson Mutual Information. ISIT 2020: 2222-2227 - [c10]Amedeo Roberto Esposito, Michael Gastpar, Ibrahim Issa:
Robust Generalization via f-Mutual Information. ISIT 2020: 2723-2728 - [i10]Amedeo Roberto Esposito, Michael Gastpar, Ibrahim Issa:
Robust Generalization via $α$-Mutual Information. CoRR abs/2001.06399 (2020) - [i9]Benjamin Wu, Aaron B. Wagner, G. Edward Suh, Ibrahim Issa:
Strong Asymptotic Composition Theorems for Sibson Mutual Information. CoRR abs/2005.06033 (2020)
2010 – 2019
- 2019
- [c9]Ibrahim Issa, Amedeo Roberto Esposito, Michael Gastpar:
Strengthened Information-theoretic Bounds on the Generalization Error. ISIT 2019: 582-586 - [c8]Jayadev Acharya, Ibrahim Issa, Nirmal V. Shende, Aaron B. Wagner:
Measuring Quantum Entropy. ISIT 2019: 3012-3016 - [c7]Amedeo Roberto Esposito, Michael Gastpar, Ibrahim Issa:
Learning and Adaptive Data Analysis via Maximal Leakage. ITW 2019: 1-5 - [i8]Amedeo Roberto Esposito, Michael Gastpar, Ibrahim Issa:
A New Approach to Adaptive Data Analysis and Learning via Maximal Leakage. CoRR abs/1903.01777 (2019) - [i7]Ibrahim Issa, Amedeo Roberto Esposito, Michael Gastpar:
Strengthened Information-theoretic Bounds on the Generalization Error. CoRR abs/1903.03787 (2019) - [i6]Amedeo Roberto Esposito, Michael Gastpar, Ibrahim Issa:
Generalization Error Bounds Via Rényi-, f-Divergences and Maximal Leakage. CoRR abs/1912.01439 (2019) - 2018
- [c6]Ibrahim Issa, Michael Gastpar:
Computable Bounds on the Exploration Bias. ISIT 2018: 576-580 - [i5]Ibrahim Issa, Aaron B. Wagner, Sudeep Kamath:
An Operational Approach to Information Leakage. CoRR abs/1807.07878 (2018) - 2017
- [j2]Ibrahim Issa, Aaron B. Wagner:
Measuring Secrecy by the Probability of a Successful Guess. IEEE Trans. Inf. Theory 63(6): 3783-3803 (2017) - [c5]Ibrahim Issa, Aaron B. Wagner:
Operational definitions for some common information leakage metrics. ISIT 2017: 769-773 - [i4]Jayadev Acharya, Ibrahim Issa, Nirmal V. Shende, Aaron B. Wagner:
Measuring Quantum Entropy. CoRR abs/1711.00814 (2017) - 2016
- [c4]Ibrahim Issa, Sudeep Kamath, Aaron B. Wagner:
An operational measure of information leakage. CISS 2016: 234-239 - [c3]Ibrahim Issa, Sudeep Kamath, Aaron B. Wagner:
Maximal leakage minimization for the Shannon cipher system. ISIT 2016: 520-524 - 2015
- [j1]Ibrahim Issa, Silas L. Fong, Amir Salman Avestimehr:
Two-Hop Interference Channels: Impact of Linear Schemes. IEEE Trans. Inf. Theory 61(10): 5463-5489 (2015) - [c2]Ibrahim Issa, Aaron B. Wagner:
Measuring secrecy by the probability of a successful guess. Allerton 2015: 980-987 - [i3]Ibrahim Issa, Aaron B. Wagner:
Measuring Secrecy by the Probability of a Successful Guess. CoRR abs/1507.02342 (2015) - 2013
- [c1]Ibrahim Issa, Silas L. Fong, Amir Salman Avestimehr:
Two-hop interference channels: Impact of linear time-varying schemes. ISIT 2013: 2309-2313 - [i2]Ibrahim Issa, Silas L. Fong, Amir Salman Avestimehr:
Two-Hop Interference Channels: Impact of Linear Time-Varying Schemes. CoRR abs/1305.3969 (2013) - [i1]Ibrahim Issa, Silas L. Fong, Amir Salman Avestimehr:
Two-Hop Interference Channels: Impact of Linear Schemes. CoRR abs/1309.0898 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-13 17:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint