Follow
Stark Draper
Title
Cited by
Cited by
Year
Exploiting channel diversity in secret key generation from multipath fading randomness
Y Liu, SC Draper, AM Sayeed
IEEE Transactions on information forensics and security 7 (5), 1484-1497, 2012
1762012
Using distributed source coding to secure fingerprint biometrics
SC Draper, A Khisti, E Martinian, A Vetro, JS Yedidia
2007 IEEE International Conference on Acoustics, Speech and Signal …, 2007
1382007
Side information aware coding strategies for sensor networks
SC Draper, GW Wornell
IEEE Journal on Selected Areas in Communications 22 (6), 966-976, 2004
1322004
Decomposition methods for large scale LP decoding
S Barman, X Liu, SC Draper, B Recht
IEEE Transactions on Information Theory 59 (12), 7870-7886, 2013
1312013
Biometric based user authentication and data encryption
SC Draper, A Khisti, E Martinian, A Vetro, JS Yedidia
US Patent 7,779,268, 2010
1302010
Construction of high-girth QC-LDPC codes
Y Wang, JS Yedidia, SC Draper
2008 5th International Symposium on Turbo Codes and Related Topics, 180-185, 2008
1172008
Secure biometrics: Concepts, authentication architectures, and challenges
S Rane, Y Wang, SC Draper, P Ishwar
IEEE Signal Processing Magazine 30 (5), 51-64, 2013
1052013
Toward compression of encrypted images and video sequences
D Schonberg, SC Draper, C Yeo, K Ramchandran
IEEE Transactions on Information Forensics and Security 3 (4), 749-762, 2008
902008
Feature extraction for a Slepian-Wolf biometric system using LDPC codes
Y Sutcu, S Rane, JS Yedidia, SC Draper, A Vetro
2008 IEEE International Symposium on Information Theory, 2297-2301, 2008
862008
Exploitation of stragglers in coded computation
S Kiani, N Ferdinand, SC Draper
2018 IEEE International Symposium on Information Theory (ISIT), 1988-1992, 2018
832018
On blind compression of encrypted data approaching the source entropy rate
D Schonberg, SC Draper, K Ramchandran
2005 13th European Signal Processing Conference, 1-4, 2005
822005
Hierarchical coded computation
N Ferdinand, SC Draper
2018 IEEE International Symposium on Information Theory (ISIT), 1620-1624, 2018
772018
Sleepscale: Runtime joint speed scaling and sleep states management for power efficient data centers
Y Liu, SC Draper, NS Kim
2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA …, 2014
732014
Notary: Hardware techniques to enhance signatures
L Yen, SC Draper, MD Hill
2008 41st IEEE/ACM International Symposium on Microarchitecture, 234-245, 2008
732008
On Compression of Encrypted Images.
D Schonberg, SC Draper, K Ramchandran
ICIP, 269-272, 2006
732006
The ADMM penalized decoder for LDPC codes
X Liu, SC Draper
IEEE Transactions on Information Theory 62 (6), 2966-2984, 2016
642016
Hierarchical and high-girth QC LDPC codes
Y Wang, SC Draper, JS Yedidia
IEEE transactions on information theory 59 (7), 4553-4583, 2013
632013
On rateless coding over fading channels with delay constraints
J Castura, Y Mao, S Draper
2006 IEEE International Symposium on Information Theory, 1124-1128, 2006
632006
The conceptualization of an Albanian nation
S Draper
Ethnic and Racial Studies 20 (1), 123-144, 1997
631997
A theoretical analysis of authentication, privacy, and reusability across secure biometric systems
Y Wang, S Rane, SC Draper, P Ishwar
IEEE Transactions on Information Forensics and Security 7 (6), 1825-1840, 2012
622012
The system can't perform the operation now. Try again later.
Articles 1–20