• 6923 Citations
  • 33 h-Index
1962 …2018

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2018
1 Citation (Scopus)
2017

Error exponents for sparse communication

Farkas, L., Kói, T. & Csiszár, I., aug. 9 2017, 2017 IEEE International Symposium on Information Theory, ISIT 2017. Institute of Electrical and Electronics Engineers Inc., p. 3145-3149 5 p. 8007109

Research output: Conference contribution

2 Citations (Scopus)
2016

Convergence of generalized entropy minimizers in sequences of convex problems

Csiszar, I. & Matus, F., aug. 10 2016, Proceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory. Institute of Electrical and Electronics Engineers Inc., p. 2609-2613 5 p. 7541771. (IEEE International Symposium on Information Theory - Proceedings; vol. 2016-August).

Research output: Conference contribution

Measuring distribution model risk

Breuer, T. & Csiszár, I., ápr. 1 2016, In : Mathematical Finance. 26, 2, p. 395-411 17 p.

Research output: Article

24 Citations (Scopus)
2015

An information geometry problem in mathematical finance

Csiszár, I. & Breuer, T., 2015, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9389. p. 435-443 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9389).

Research output: Conference contribution

3 Citations (Scopus)
2013

Generalized minimizers of convex integral functionals and Pythagorean identities

Csiszár, I. & Matúš, F., okt. 8 2013, Geometric Science of Information - First International Conference, GSI 2013, Proceedings. p. 302-307 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8085 LNCS).

Research output: Conference contribution

Information geometry in mathematical finance: Model risk, worst and almost worst scenarios

Breuer, T. & Csiszar, I., dec. 19 2013, 2013 IEEE International Symposium on Information Theory, ISIT 2013. p. 404-408 5 p. 6620257. (IEEE International Symposium on Information Theory - Proceedings).

Research output: Conference contribution

2 Citations (Scopus)

On oblivious transfer capacity

Ahlswede, R. & Csiszár, I., ápr. 15 2013, Information Theory, Combinatorics, and Search Theory: In Memory of Rudolf Ahlswede. Aydinian, H., Deppe, C. & Cicalese, F. (eds.). p. 145-166 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7777).

Research output: Conference contribution

18 Citations (Scopus)

Secrecy generation for multiaccess channel models

Csiszár, I. & Narayan, P., jan. 7 2013, In : IEEE Transactions on Information Theory. 59, 1, p. 17-31 15 p., 6290395.

Research output: Article

13 Citations (Scopus)

Systematic stress tests with entropic plausibility constraints

Breuer, T. & Csiszár, I., máj. 1 2013, In : Journal of Banking and Finance. 37, 5, p. 1552-1559 8 p.

Research output: Article

35 Citations (Scopus)
2012

Generalized minimizers of convex integral functionals, bregman distance, pythagorean identities

Csiszár, I. & Matúš, F., szept. 14 2012, In : Kybernetika. 48, 4, p. 637-689 53 p.

Research output: Article

13 Citations (Scopus)

Minimization of entropy functionals revisited

Csiszár, I. & Matúš, F., okt. 22 2012, 2012 IEEE International Symposium on Information Theory Proceedings, ISIT 2012. p. 150-154 5 p. 6283516. (IEEE International Symposium on Information Theory - Proceedings).

Research output: Conference contribution

2 Citations (Scopus)
2011
758 Citations (Scopus)

On information theoretic security: Mathematical models and techniques(Invited Talk)

Csiszár, I., máj. 26 2011, Information Theoretic Security - 5th International Conference, ICITS 2011, Proceedings. p. 73-75 3 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6673 LNCS).

Research output: Conference contribution

2010

Capacity of a shared secret key

Csiszár, I. & Narayan, P., aug. 23 2010, 2010 IEEE International Symposium on Information Theory, ISIT 2010 - Proceedings. p. 2593-2596 4 p. 5513769. (IEEE International Symposium on Information Theory - Proceedings).

Research output: Conference contribution

2 Citations (Scopus)

On convergence rates of finite memory estimators of infinite memory processes

Csiszár, I. & Talata, Z., júl. 27 2010, IEEE Information Theory Workshop 2010, ITW 2010. 5503181. (IEEE Information Theory Workshop 2010, ITW 2010).

Research output: Conference contribution

On rate of convergence of statistical estimation of stationary ergodic processes

Csiszár, I. & Talata, Z., aug. 1 2010, In : IEEE Transactions on Information Theory. 56, 8, p. 3637-3641 5 p., 5508630.

Research output: Article

9 Citations (Scopus)
2009

On minimization of multivariate entropy functionals

Csiszár, I. & Matúš, F., dec. 1 2009, Proceedings - 2009 IEEE Information Theory Workshop on Networking and Information Theory, ITW 2009. p. 96-100 5 p. 5158549. (Proceedings - 2009 IEEE Information Theory Workshop on Networking and Information Theory, ITW 2009).

Research output: Conference contribution

6 Citations (Scopus)

On oblivious transfer capacity

Ahlswede, R. & Csiszár, I., dec. 1 2009, Proceedings - 2009 IEEE Information Theory Workshop on Networking and Information Theory, ITW 2009. p. 1-3 3 p. 5158528. (Proceedings - 2009 IEEE Information Theory Workshop on Networking and Information Theory, ITW 2009).

Research output: Conference contribution

4 Citations (Scopus)

Secrecy generation for multiple input multiple output channel models

Csiszár, I. & Narayan, P., nov. 19 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 2447-2451 5 p. 5206054. (IEEE International Symposium on Information Theory - Proceedings).

Research output: Conference contribution

11 Citations (Scopus)
2008

Axiomatic characterizations of information measures

Csiszár, I., szept. 2008, In : Entropy. 10, 3, p. 261-273 13 p.

Research output: Article

130 Citations (Scopus)

Generalized maximum likelihood estimates for exponential families

Csiszár, I. & Matúš, F., máj. 1 2008, In : Probability Theory and Related Fields. 141, 1-2, p. 213-246 34 p.

Research output: Article

20 Citations (Scopus)

On minimization of entropy functionals under moment constraints

Csiszár, I. & Matúš, P., szept. 29 2008, Proceedings - 2008 IEEE International Symposium on Information Theory, ISIT 2008. p. 2101-2105 5 p. 4595360. (IEEE International Symposium on Information Theory - Proceedings).

Research output: Conference contribution

6 Citations (Scopus)

Secrecy capacities for multiterminal channel models

Csiszar, I. & Narayan, P., jún. 1 2008, In : IEEE Transactions on Information Theory. 54, 6, p. 2437-2452 16 p.

Research output: Article

110 Citations (Scopus)
2007
4 Citations (Scopus)

Multiterminal secrecy capacities

Csiszár, I. & Narayan, P., jan. 1 2007, 45th Annual Allerton Conference on Communication, Control, and Computing 2007. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, p. 144-149 6 p. (45th Annual Allerton Conference on Communication, Control, and Computing 2007; vol. 1).

Research output: Conference contribution

On multiterminal secrecy capacities

Csiszár, I. & Narayan, P., dec. 1 2007, Proceedings - 2007 IEEE International Symposium on Information Theory, ISIT 2007. p. 2051-2055 5 p. 4557158. (IEEE International Symposium on Information Theory - Proceedings).

Research output: Conference contribution

On oblivious transfer capacity

Ahlswede, R. & Csiszár, I., dec. 1 2007, Proceedings - 2007 IEEE International Symposium on Information Theory, ISIT 2007. p. 2061-2064 4 p. 4557524. (IEEE International Symposium on Information Theory - Proceedings).

Research output: Conference contribution

20 Citations (Scopus)
2006

A simple proof of Sanov's theorem

Csiszár, I., dec. 1 2006, In : Bulletin of the Brazilian Mathematical Society. 37, 4, p. 453-459 7 p.

Research output: Article

7 Citations (Scopus)

Consistent estimation of the basic neighborhood of markov random fields

Csiszár, I. & Talata, Z., febr. 1 2006, In : Annals of Statistics. 34, 1, p. 123-145 23 p.

Research output: Article

33 Citations (Scopus)
90 Citations (Scopus)

Generalized maximum likelihood estimates for exponential families

Csiszár, I. & Matúš, F., dec. 1 2006, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006. p. 1939-1943 5 p. 4036306. (IEEE International Symposium on Information Theory - Proceedings).

Research output: Conference contribution

2005

Closures of exponential families

Csiszár, I. & Matúš, F., márc. 1 2005, In : Annals of Probability. 33, 2, p. 582-600 19 p.

Research output: Article

22 Citations (Scopus)

Secrecy capacities for multiterminal channel models

Csiszár, I. & Narayan, P., dec. 1 2005, Proceedings of the 2005 IEEE International Symposium on Information Theory, ISIT 05. p. 2138-2141 4 p. 1523724. (IEEE International Symposium on Information Theory - Proceedings; vol. 2005).

Research output: Conference contribution

6 Citations (Scopus)
2004
2 Citations (Scopus)

On information closures of exponential families: A counterexample

Csiszár, I. & Matúš, F., máj. 1 2004, In : IEEE Transactions on Information Theory. 50, 5, p. 922-924 3 p.

Research output: Letter

7 Citations (Scopus)

Secrecy capacities for multiple terminals

Csiszár, I. & Narayan, P., dec. 1 2004, In : IEEE Transactions on Information Theory. 50, 12, p. 3047-3061 15 p.

Research output: Article

278 Citations (Scopus)
2003

Information projections revisited

Csiszár, I. & Matúš, F., jún. 1 2003, In : IEEE Transactions on Information Theory. 49, 6, p. 1474-1490 17 p.

Research output: Article

79 Citations (Scopus)
2 Citations (Scopus)
2002

Convex cores of measures on ℝd

Csiszár, I. & Matúš, F., dec. 1 2002, In : Studia Scientiarum Mathematicarum Hungarica. 38, 1-4, p. 177-190 14 p.

Research output: Article

15 Citations (Scopus)
48 Citations (Scopus)
1 Citation (Scopus)

The secret key capacity for multiple terminals

Csiszár, I. & Narayan, P., jan. 1 2002, Proceedings of the 2002 IEEE Information Theory Workshop, ITW 2002. Institute of Electrical and Electronics Engineers Inc., p. 8-10 3 p. 1115401. (Proceedings of the 2002 IEEE Information Theory Workshop, ITW 2002).

Research output: Conference contribution

1 Citation (Scopus)
2001

Divergence minimization under prior inequality constraints

Csiszár, I., Tusnády, G., Ispány, M., Verdes, E., Michaletzky, G. & Rudas, T., jan. 1 2001, In : IEEE International Symposium on Information Theory - Proceedings. 1 p.

Research output: Article

1 Citation (Scopus)
2000

Common randomness and secret key generation with a helper

Csiszár, I. & Narayan, P., jan. 1 2000, In : IEEE Transactions on Information Theory. 46, 2, p. 344-366 23 p.

Research output: Article

197 Citations (Scopus)
5 Citations (Scopus)
1999

Consistency of the BIC order estimator

Csiszár, I. & Shields, P. C., okt. 19 1999, In : Electronic Research Announcements of the American Mathematical Society. 5, 17, p. 123-127 5 p.

Research output: Article

2 Citations (Scopus)

MEM pixel correlated solutions for generalized moment and interpolation problems

Csiszár, I., Gamboa, F. & Gassiat, E., dec. 1 1999, In : IEEE Transactions on Information Theory. 45, 7, p. 2253-2270 18 p.

Research output: Article

18 Citations (Scopus)
1998
156 Citations (Scopus)