{"id":1027,"date":"2021-06-17T16:42:30","date_gmt":"2021-06-17T16:42:30","guid":{"rendered":"https:\/\/faculty.engineering.ucdavis.edu\/lai-new\/?page_id=1027"},"modified":"2021-06-17T18:47:23","modified_gmt":"2021-06-17T18:47:23","slug":"talks","status":"publish","type":"page","link":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/research\/talks\/","title":{"rendered":"Talks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1027\" class=\"elementor elementor-1027\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-669a109 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"669a109\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-328e8324\" data-id=\"328e8324\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61958787 elementor-widget elementor-widget-page-title\" data-id=\"61958787\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"page-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\n\t\t<div class=\"hfe-page-title hfe-page-title-wrapper elementor-widget-heading\">\n\n\t\t\t\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\n\t\t\t\t\t\t\t\t\n\t\t\t\tTalks  \n\t\t\t<\/h2 > \n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-195ba21c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"195ba21c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c8fdc54 elementor-widget elementor-widget-text-editor\" data-id=\"6c8fdc54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Plenary and Keynote Address<\/h3><ul><li>IEEE Conference on Communications and Network Security, Workshop on Physical-Layer Methods for Wireless Security, Las Vegas, NV, Oct. 2017.<\/li><li>EAI International Conference on Mobile Multimedia Communications, Chongqin, China, July 2017.<\/li><\/ul><h3>Recent Non-Interview Invited Talks<\/h3><ul><li>\u201cDistributed Statistical Inference with Compressed Data,\u201d Harvard University, Boston, MA, May 2019.<\/li><li>\u201cDistributed Statistical Inference with Compressed Data,\u201d Statistics Department, University of California, Davis, Nov. 2018.<\/li><li>\u201cStatistical Inference over Time Varying High-Dimensional Models,\u201d American Mathematical Society Sectional Meeting, San Francisco, CA. Oct. 2018.<\/li><li>\u201cQuick Best Action Identification in Linear Bandit Problems,\u201d Asilomar Conference on Signals, Systems, and Computers, Pacic Grove, CA, Oct. 2018.<\/li><li>\u201cDistributed Statistical Inference with Compressed Data,\u201d Beijing Institute of Technology, Beijing, China, Sept. 2018.<\/li><li>\u201cCommunication Efficient Distributed Learning with Feature Partitioned Data,\u201d Conference on Information Sciences and Systems (CISS), Princeton, NJ, Mar. 2018.<\/li><li>\u201cInference Task Oblivious Data Reduction\u201d, UCSD Information Theory and Applications Workshop (ITA), San Diego, CA, Feb. 2018.<\/li><li>\u201cDistributed Statistical Inference with Compressed Data,\u201d Zhejiang University, Hangzhou, China, July 2017.<\/li><li>\u201cOn the Sum-Rate Capacity of Poisson MISO Multiple Access Channels,\u201d IEEE International Conference on Communication Systems (ICCS), Shenzhen, China, Dec. 2016.<\/li><li>\u201cDistributed Statistical Inference with Compressed Data,\u201d Shenzhen University, Shenzhen, China, Dec. 2016.<\/li><li>\u201cDistributed Statistical Inference with Compressed Data,\u201d University of California, Berkeley, CA, Oct. 2016.<\/li><li>\u201cCommunications and Inference: Secrecy and Efficiency Perspectives,\u201d Tongji University, Shanghai, China, Mar. 2016.<\/li><li>\u201cOn the Authenticated Channel Capacity,\u201d UCSD Information Theory and Applications Workshop (ITA), San Diego, CA, Feb. 2016.<\/li><li>\u201cDistributed Statistical Inference with Compressed Data,\u201d Georgia Institute of Technology, Atlanta, GA, Oct. 2015.<\/li><li>\u201cDistributed Statistical Inference with Compressed Data,\u201d Purdue University, West Lafayette, IN, Sept. 2015.<\/li><li>\u201cDetecting Changes in High-Dimensional Regression Models,\u201d University of Michigan, Ann Arbor, MI, May. 2015.<\/li><li>\u201cOn the Simulatability Condition in Key Generation Over a Non-authenticated Public Channel,\u201d UCSD Information Theory and Applications Workshop (ITA), San Diego, CA, Feb. 2015.<\/li><li>\u201cStatistical Inference over Time-Varying High-Dimensional Models,\u201d Temple University, Philadelphia, PA, Oct. 2014.<\/li><li>\u201cStatistical Inference over Time-Varying High-Dimensional Models,\u201d Shanghai Jiaotong University, Shanghai, China, Aug. 2014.<\/li><li>\u201cStatistical Inference over Time-Varying High-Dimensional Models,\u201d Zhejiang University, Hangzhou, China, Aug. 2014.<\/li><li>\u201cStatistical Inference over Time-Varying High-Dimensional Models,\u201d Peking University, Beijing, China, Aug. 2014.<\/li><li>\u201cStatistical Inference over Time-Varying High-Dimensional Models,\u201d Air Force Research Lab, Rome, NY, July 2014.<\/li><li>\u201cDetecting Changes in Regression Models via Sparse Group Lasso,\u201d UCSD Information Theory and Applications Workshop (ITA), San Diego, CA, Feb. 2014.<\/li><li>\u201cQuickest Change Point Detection with Stochastic Energy Constraints,\u201d Rutgers University, North Brunswick, NJ, Aug. 2013.<\/li><li>\u201cQuickest Change Point Detection with Stochastic Energy Constraints,\u201d International Workshop in Sequential Methodologies, University of Georgia, Athens, Georgia, July 2013.<\/li><li>\u201cQuickest Change Point Detection with Stochastic Energy Constraints,\u201d Air Force Research Lab, Rome, NY, June 2013.<\/li><li>\u201cQuickest Change Point Detection with Stochastic Energy Constraints,\u201d Syracuse University, Syracuse, NY, June 2013.<\/li><li>\u201cGenerating Keys in Pairwise Independent Networks,\u201d UCSD Information Theory and Applications Workshop (ITA), San Diego, CA, Feb. 2013.<\/li><li>\u201cDistributed Quickest Change Point Detection and Identification,\u201d MIT Lincoln Laboratory, Lexington, MA, Feb. 2013.<\/li><li>\u201cGenerating Keys From Wireless Fading Channels,\u201d University of Massachusetts, Amherst, MA, Nov.2012.<\/li><li>\u201cGenerating Keys From Wireless Fading Channels,\u201d University of Connecticut, Storrs, CT, Nov. 2012.<\/li><li>\u201cGenerating Keys From Wireless Fading Channels,\u201d Embry-Riddle Aeronautical University, Daytona Beach, FL, Oct. 2012.<\/li><li>\u201cGenerating Keys From Wireless Fading Channels,\u201d University of Massachusetts at Dartmouth, Dartmouth, MA, Oct. 2012.<\/li><li>\u201cGenerating Keys From Wireless Fading Channels,\u201d University of Iowa, Iowa City, IA, Oct. 2012.<\/li><li>\u201cSimultaneously Generating Multiple Keys for Secure Communications and Smart Grid,\u201d Air Force Research Lab, Rome, NY, July. 2012.<\/li><li>\u201cOptimal Sequential Detection with Stochastic Energy Constraint,\u201d IEEE International Conference on Mobile Ad-hoc and Sensor Networks (MSN), Workshop on Optimization for Green Wireless Communication Networks, Beijing, China, Dec. 2011.<\/li><li>\u201cCooperative Key Generation in Wireless Networks,\u201d INFORMS Midwestern Conference on Analytics for Competitive Advantage, Columbus, OH, Aug. 2011.<\/li><li>\u201cA Unified Framework for Key Agreement over Wireless Fading Channels,\u201d University of South Australia, Adelaide, Australia, Oct. 2010.<\/li><li>\u201cA Unified Framework for Key Agreement over Wireless Fading Channels,\u201d University of New South Wales, Sydney, Australia, Oct. 2010.<\/li><li>\u201cQuickest Sequential Opportunity Search in Multichannel Systems,\u201d International Workshop on Applied Probability (IWAP), Madrid, Spain, July 2010.<\/li><li>\u201cCapacity Bounds for the Poisson Interference Channel,\u201d UCSD Information Theory and Applications Workshop (ITA), San Diego, CA, Feb. 2010.<\/li><li>\u201cInformation Security: An Information Theoretic Approach,\u201d University of Tennessee, Knoxville, TN, Nov. 2009.<\/li><li>\u201cPrivacy-Security Tradeoffs in Biometric Security Systems,\u201d Worcester Polytechnic Institute,Worcester, MA, Dec. 2008.<\/li><li>\u201cWireless Network Security and Biometric Security: An Information Theoretic Perspective,\u201d Mitsubishi Electric Research Labs (MERL), Cambridge, MA, Dec. 2008.<\/li><li>\u201cPrivacy-Security Tradeoffs in Biometric Security Systems,\u201d New Jersey Institute of Technology, Newark, NJ, Nov. 2008.<\/li><li>\u201cOn the Design of Secure and Efficient Wireless Networks,\u201d Stanford University, Stanford, CA, Aug. 2008.<\/li><li>\u201cCognitive Medium Access: An Optimal Learning Approach,\u201d Rutgers University, North Brunswick, NJ, Feb. 2008.<\/li><li>\u201cSecure Wireless Communications: A Physical Layer Approach,\u201d Columbia University, New York City, NY, Nov. 2007<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Talks Plenary and Keynote Address IEEE Conference on Communications and Network Security, Workshop on Physical-Layer Methods for Wireless Security, Las Vegas, NV, Oct. 2017. EAI International Conference on Mobile Multimedia Communications, Chongqin, China, July 2017. Recent Non-Interview Invited Talks \u201cDistributed Statistical Inference with Compressed Data,\u201d Harvard University, Boston, MA, May 2019. \u201cDistributed Statistical Inference with [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":35,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-1027","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/pages\/1027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/comments?post=1027"}],"version-history":[{"count":7,"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/pages\/1027\/revisions"}],"predecessor-version":[{"id":1129,"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/pages\/1027\/revisions\/1129"}],"up":[{"embeddable":true,"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/pages\/35"}],"wp:attachment":[{"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/media?parent=1027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}