Skip to main content

Showing 1–3 of 3 results for author: Ignatenko, T

.
  1. arXiv:2103.13192  [pdf, other

    cs.LG cs.AI cs.IT stat.ML

    On Preference Learning Based on Sequential Bayesian Optimization with Pairwise Comparison

    Authors: Tanya Ignatenko, Kirill Kondrashov, Marco Cox, Bert de Vries

    Abstract: User preference learning is generally a hard problem. Individual preferences are typically unknown even to users themselves, while the space of choices is infinite. Here we study user preference learning from information-theoretic perspective. We model preference learning as a system with two interacting sub-systems, one representing a user with his/her preferences and another one representing an… ▽ More

    Submitted 22 November, 2023; v1 submitted 24 March, 2021; originally announced March 2021.

    Comments: Preference learning, Bayesian inference, Intelligent agents; 29 pages, 5 figures (15 with subfigures)

  2. A Robust SRAM-PUF Key Generation Scheme Based on Polar Codes

    Authors: Bin Chen, Tanya Ignatenko, Frans M. J. Willems, Roel Maes, Erik van der Sluis, Georgios Selimis

    Abstract: Physical unclonable functions (PUFs) are relatively new security primitives used for device authentication and device-specific secret key generation. In this paper we focus on SRAM-PUFs. The SRAM-PUFs enjoy uniqueness and randomness properties stemming from the intrinsic randomness of SRAM memory cells, which is a result of manufacturing variations. This randomness can be translated into the crypt… ▽ More

    Submitted 27 July, 2017; v1 submitted 25 January, 2017; originally announced January 2017.

    Comments: 7pages, 5 figure, globecom2017

  3. arXiv:1205.5757  [pdf, other

    cs.CR

    Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption

    Authors: Muhammad Asim, Tanya Ignatenko, Milan Petkovic, Daniel Trivellato, Nicola Zannone

    Abstract: Virtual organizations are dynamic, inter-organizational collaborations that involve systems and services belonging to different security domains. Several solutions have been proposed to guarantee the enforcement of the access control policies protecting the information exchanged in a distributed system, but none of them addresses the dynamicity characterizing virtual organizations. In this paper w… ▽ More

    Submitted 25 May, 2012; originally announced May 2012.