The dependence on training data of the Gibbs algorithm (GA) is analytica...
The effect of the relative entropy asymmetry is analyzed in the empirica...
The empirical risk minimization (ERM) problem with relative entropy
regu...
The optimality and sensitivity of the empirical risk minimization proble...
Information-theoretic stealth attacks are data injection attacks that
mi...
Smart meters enable improvements in electricity distribution system
effi...
The learning data requirements are analyzed for the construction of stea...
Random attacks that jointly minimize the amount of information acquired ...