A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
2-D-Bar-Codes (1) 5G (1) 5G mobile communication (1)
access control (1) ACM (1) Acoustic distortion (1)
acquisition time (1) ad hoc detectors (1) Ad hoc networks (1)
Adaptation models (1) adaptive (1) adaptive coding and modulation (1)
Adaptive Communications (1) adaptive filtering (1) adaptive IIR filters (16)
adaptive processing (1) adaptive signal processing (26) adversarial signal processing (9)
analogue-digital conversio (1) Analytical models (1) ANC (3)
anonymous communications (1) antenna arrays (2) Antennas (1)
Approximation methods (1) Artificial neural networks (1) Attenuation (1)
audio (1) authentication (1) Autocorrelation (1)
autoregressive modeling (1) autoregressive processes (1) avoidance (1)
B-frames (1) band-pass filters (1) Bandlimited signals. (1)
Bandwidth (1) bandwidth scaling limit (1) bar-codes (1)
basis expansion model (1) basis function approximations (1) benford (2)
benford's-law (2) biometrics (1) bit loading (1)
black-box (1) Blind Adaptation (1) blind equalization (2)
Blind estimation (1) blind identification (1) blind input estimation (1)
blind phase estimation (1) BOWS (1) Broadcast (1)
broadcasting (1) burst (3) calibration (1)
calibration errors (1) Camera Attribution (1) camera attribution forensic analyzer (1)
Camera Source Identification (1) cameras (3) Capacity (1)
capacity scaling laws (1) carrier offset (1) Carrier offset estimation (1)
Cellular networks (1) cellular radio (1) channel coefficient (1)
channel Doppler spectrum (1) channel equalization (2) channel estimation (2)
channel estimator (2) channel shortener (1) Channel shortening (1)
channel state information in the transmitter (1) channel variations (1) Closed box (1)
cloud (3) Codes (2) cognitive radio (48)
coherence spectrum (1) collusion (2) collusion channel (1)
compass (67) compressed sensing (9) compressive sampling (2)
computational complexity (3) connectivity graph (1) Constant Magnitude (1)
constant modulus (3) control (1) Convolutional Neural Networks (1)
cooperative communication (1) correlated sources (3) Correlation (1)
Cramér-Rao bound (CRB) (2) Cramer-Rao lower bound (1) cross-QAM constellations (1)
cryptography (3) CSIT (1) cyclic prefix (1)
cyclostationarity (2) data compression (1) data hiding (4)
Data security (1) data-hiding (80) DCT (1)
decision feedback equalization (1) decoupled parameters (1) Deep Learning (3)
defacto standard (1) Degradation (1) delay spread (1)
design methodology (1) desynchronization (1) detection diversity (1)
Digital Communications (33) digital data protection (1) digital image forensics (1)
digital media forensics (1) digital photo (1) Digital Television (2)
dirty paper (2) dirty paper coding (1) disclosure attacks (1)
discrete cosine transform (2) discrete cosine transforms (2) Distortion (1)
distortion correction (1) Distortion Optimization (1) distributed estimation (3)
distributed local Kalman filtering (1) distributed source coding (1) distributed tracking (1)
distributed tracking with consensus (1) dither modulation (1) DNA (1)
DNN watermarking (1) DOA estimation (1) Document image (1)
Doppler effect (1) Doppler frequencies (1) double compression detection (2)
Double JPEG compression (1) Doubly stochastic model (1) DS-SS (1)
DSL (2) Dual lattice (1) dummies (1)
DVB (1) DVB-S (3) dynacs (62)
dynamic spectrum access (2) dynamic spectrum leasing (2) dynamic spectrum sharing (1)
Effective SNR (2) Effective SNR metrics (1) EM (2)
empirical characterization (1) encrypted domain (1) energy detector (1)
equalization (19) equation error (1) error statistics (2)
estimation (3) Europe (1) Expectation-Maximization (1)
expectation-maximization algorithm (1) exponential matrix (1) face verification (1)
face-recognition (1) fading channels (1) false negative probabilities (2)
false positive probabilities (2) fast fading channels (1) fast-fading channel (1)
FER prediction (1) filter bank (1) filtering (1)
Fingerprint (1) Fingerprint recognition (2) Fingerprinting (2)
fingerprints (2) fixed point implementation (1) forensics (8)
forensics investigators (1) frame error rate (1) frequency division multiple access (2)
Frequency estimation (2) Frequency estimator (1) Fridrich-Goljan self-embedding authentication method (2)
full duplex (13) full-duplex (10) FuRLMS (1)
Gabor (1) Gabor coefficients (1) gain estimation (1)
game theory (2) generalized Gaussian (2) generalized likelihood ratio (1)
generalized likelihood ratio test (1) generalized likelihood ratio test (GLRT) (1) Generalized Spatial Modulation (1)
Genomic Privacy (1) GOP size estimation (2) GPU (2)
graph topology (1) Graphics processing units (2) Hadamard ratio (1)
hash bit errors (2) hidden services (2) Hierarchical OFDM (2)
higher-order statistics (2) History (1) homomorphic encryption (3)
homomorphic encryption systems (1) homomorphic processing (2) hybrid beamforming (1)
Hybrid Terrestrial- Satellite (1) hypothesis testing (1) IIR (3)
IIR notchfilter (1) image authentication method (2) Image block-variance (1)
image coding (3) Image Denoising (1) Image Encryption (1)
Image forensics (6) Image processing (1) image sensors (1)
image source identification (1) imperfect channel prediction information (1) Index Modulation (1)
Index Modulations (1) Information processing (1) Information security (1)
information theory (3) Intellectual property (1) interpolation (6)
Invariant features (1) inversion (1) iterative decoding (1)
iterative equalization (1) iterative protocol (1) JPEG compression (1)
Kalman filter (1) Kalman filters (2) keyless security (1)
Kruskal rank (1) L-Band (1) Laguerre systems (1)
large-scale analysis (1) Lattice (1) lattice cryptography (4)
lattice estimation (1) lattice filters (7) Lattice-Based Cryptography (2)
lattice-based cryptosystems (1) Leakage (1) least mean squares algorithm (1)
least mean squares methods (1) Least squares (1) Lenses (1)
linear algebra (1) linear filtering (1) linear minimum mean square error receivers (1)
link adaptation (8) log normal distribution (1) Log-stable distribution (1)
Logarithmic watermarking (1) Lognormal distribution (1) lognormal shadowing (1)
low complexity estimator (1) low-complexity channel prediction (1) low-complexity channel predictor (1)
low-complexity video coding (1) LPTV (1) Machine Learning (6)
Magnitude (1) Massive MIMO (1) matrix algebra (1)
mayte (2) Membership inference (1) message authentication (2)
MFNN (1) microphone arrays (4) millimeter wave bands (1)
millimetre wave antenna arrays (1) millimetre wave communication (1) MIMO-OFDM (1)
ML (2) mmWave (30) mobile communications (1)
mobile OFDMA (1) mobile radio (2) mobile satellite (1)
mobile stations (2) mobile wireless channels (1) Model-based (1)
modem (1) Moments-based estimation (1) MPEG-2 (1)
multi-beam satellite (1) multiantenna detection (1) multiantenna sensors (1)
multiaxial vibration (1) multiband sparse signal (1) multibeam satellites (2)
multibeam satellites. (1) multicarrier communications (2) multichannel (1)
Multicoset sampling (1) Multidimensional Signal Processing (1) multihop protocol (1)
Multilayer Feedforward Neural Network (1) multimedia forensics (1) Multimedia security (7)
multimodulus (1) Multiobjective evolutionary algorithms (1) multiparty computation (1)
multiple-channel signal detection (1) multirate sampling (1) multirate systems (1)
Multiuser detection (3) Multiuser MIMO-OFDM (1) Mutual Information (1)
myrada (4) narrow-band filters (1) nearly-flat spectral characteristics (1)
network theory (graphs) (1) neural networks (2) next generation networks (1)
next-generation cellular networks (1) Neyman-Pearson (1) Node localization (1)
noisy communications links (1) noisy estimation (1) noisy time-varying graphs (1)
Non-uniformly spaced arrays (1) non-white Gaussian hosts (1) nonlinear channels (7)
nonlinear filters (1) nonstationary processes (3) Number Theoretic Transforms (1)
OFDM (2) OFDM modulation (3) OFDM systems (1)
OFDMA downlink (1) oracle (1) order overestimation (1)
orthogonal frequency division multiple access (1) orthogonal frequency division multiple access downlink (1) Overlay (1)
oversampling (1) passband filters (1) PCE (1)
Perceptually shaped watermarks (1) perfect channel state information (1) performance analysis (3)
Performance evaluation (1) perspective distortion correction (1) phase estimation (2)
photo response non-uniformity (1) photo response nonuniformity (1) Photoresponse Non-Uniformity (1)
PHY abstraction (1) PLC (4) PLL (3)
Polarized Modulation (2) polyphase filters (1) power control (1)
precoding (4) prediction error (1) prediction error characterization (1)
prediction error filters (3) prediction residue analysis (1) prediction-based RA strategies (1)
prediction-based resource allocation (1) prediction-based resource allocation algorithm (1) prefiltering (1)
print-&-scan (1) privacy (12) Privacy Protection (1)
PRNU (4) PRNU compression (1) probability (1)
projection matrices (1) protocols (1) PSK modulation (1)
public image dataset (1) Quantization (1) radial correction (1)
Radial Distortion Correction (1) radio maps (1) radio spectrum management (1)
radio transmitters (1) Rain (1) rain fading (1)
random vibration (3) Range measurements (1) Rare event (1)
rate distortion optimization (1) rational dither modulation (1) Rayleigh (3)
Rayleigh fading (1) Real sinusoid (1) recursive formulation (1)
region duplication (1) relay (1) relay networks (telecommunication) (1)
Reliability (1) resampling detection (2) resampling estimation (1)
resampling factor estimation (1) return link (1) Rice (2)
Ricean fading (1) rights management (1) robust (8)
robust hashing (2) rodin (12) RPHD estimator (1)
SAM (1) satcom (27) satellite communications (11)
Satellite OFDM (1) Satellites (1) SDR (1)
second-order statistics (12) secure adaptive filtering (1) Secure Embedding (1)
Secure Signal Processing (2) security (24) sensitivity (4)
sensor network (3) SIFT (2) signal privacy preservation (1)
Signal processing (2) Signal Processing in the Encrypted Domain (1) signal shaping (1)
Signal to noise ratio (2) Signal-to-noise ratio (SNR) (1) silicon sensor imperfections (1)
Single Frequency Network (3) Single sinusoid (1) Sinusoid detection (1)
Slepian-Wolf coding (1) Smart phones (1) SNR (2)
SNR estimation (3) Software (1) Somewhat Homomorphic Encryption (1)
Source heterogeneity (1) source attribution (1) Space-Time Coding (1)
Spatial Modulation (3) spatial transformation (1) specific camera sensor (1)
Spectral estimation (1) spectrum sensing (16) spectrum shaping (15)
SPED (5) SPED techniques (1) speed estimation (4)
SPR (13) stability (3) staggered modulation (1)
Statistical Model (1) steady-state Kalman filter (1) Steganalysis (1)
steganography (1) Stochastic optimization (1) strengthened (1)
subband adaptive filters (1) sum-of-sinusoids channel predictors (1) superimposed pilots (1)
Surveillance (1) SVD (1) symbol rate (1)
synchronization (7) system identification (15) systems of linear equations (1)
tampering detection (1) Tardos (2) Tardos code (2)
Tardos codes (1) telecommunication links (1) telecommunication network topology (1)
Terrestrial (2) time domain equalizer (1) time-varying channels (3)
time-varying network topology (1) time-varying secondary system (1) time-varying systems (1)
timestamps (2) timing channel (2) Tomlinson-Harashima precoding (1)
tor network (2) traffic monitoring (4) Training (1)
training symbols (1) Traitor tracing (5) Two-dimensional-modulations (1)
unit-norm (1) universal pattern (1) vehicular communications (1)
vibration synthesis (1) video forensics (2) Video Source Identification (1)
Video Stabilization (1) videosurveillance (1) visible-encryption (2)
Visualization (1) watermark detection (1) watermark embedding (1)
watermarking (111) weak multiplicative noise (1) Weber's law (1)
white-box (1) Wideband regime (1) winter (28)
wireless channel (1) wireless channels (1) Wireless communication (1)
wireless medium (1) Wireless Microphones (1) wireless multimedia sensor networks (1)
Witsenhausen's counterexample (1) wsn (25) zero-knowledge (3)