|
2-D-Bar-Codes (1) | 5G (2) | 5G mobile communication (2) |
access control (1) | ACM (1) | Acoustic distortion (1) |
acquisition time (1) | ad hoc detectors (1) | Ad hoc networks (1) |
Adaptation models (1) | adaptive (1) | adaptive coding and modulation (1) |
Adaptive Communications (1) | adaptive filtering (1) | adaptive IIR filters (16) |
adaptive processing (1) | adaptive signal processing (26) | adversarial signal processing (9) |
analogue-digital conversio (1) | Analytical models (1) | ANC (3) |
anonymous communications (1) | antenna arrays (2) | Antennas (1) |
Approximation methods (1) | Artificial Intelligence (1) | Artificial neural networks (1) |
Attenuation (1) | audio (1) | authentication (1) |
Autocorrelation (1) | autoregressive modeling (1) | autoregressive processes (1) |
avoidance (1) | B-frames (1) | band-pass filters (1) |
Bandlimited signals. (1) | Bandwidth (1) | bandwidth scaling limit (1) |
bar-codes (1) | basis expansion model (1) | basis function approximations (1) |
benford (2) | benford's-law (2) | biometrics (1) |
bit loading (1) | black-box (1) | Blind Adaptation (1) |
blind equalization (2) | Blind estimation (1) | blind identification (1) |
blind input estimation (1) | blind phase estimation (1) | BOWS (1) |
Broadcast (1) | broadcasting (1) | burst (3) |
calibration (1) | calibration errors (1) | Camera Attribution (1) |
camera attribution forensic analyzer (1) | Camera Source Identification (1) | cameras (3) |
Capacity (1) | capacity scaling laws (1) | carrier offset (1) |
Carrier offset estimation (1) | Cellular networks (1) | cellular radio (1) |
channel coefficient (1) | channel Doppler spectrum (1) | channel equalization (2) |
channel estimation (2) | channel estimator (2) | channel shortener (1) |
Channel shortening (1) | channel state information in the transmitter (1) | channel variations (1) |
Closed box (1) | cloud (3) | Codes (2) |
cognitive radio (48) | coherence spectrum (1) | collusion (2) |
collusion channel (1) | compass (67) | compressed sensing (9) |
compressive sampling (2) | computational complexity (3) | connectivity graph (1) |
Constant Magnitude (1) | constant modulus (3) | control (1) |
Convolutional Neural Networks (1) | cooperative communication (1) | correlated sources (3) |
Correlation (1) | Cramér-Rao bound (CRB) (2) | Cramer-Rao lower bound (1) |
cross-QAM constellations (1) | cryptography (3) | CSIT (1) |
cyclic prefix (1) | cyclostationarity (2) | data compression (1) |
data hiding (4) | Data security (1) | data-hiding (80) |
DCT (1) | decision feedback equalization (1) | decoupled parameters (1) |
Deep Learning (3) | defacto standard (1) | Degradation (1) |
delay spread (1) | design methodology (1) | desynchronization (1) |
detection diversity (1) | Digital Communications (33) | digital data protection (1) |
digital image forensics (1) | digital media forensics (1) | digital photo (1) |
Digital Television (2) | dirty paper (2) | dirty paper coding (1) |
disclosure attacks (1) | discrete cosine transform (2) | discrete cosine transforms (2) |
Distortion (1) | distortion correction (1) | Distortion Optimization (1) |
distributed estimation (3) | distributed local Kalman filtering (1) | distributed source coding (1) |
distributed tracking (1) | distributed tracking with consensus (1) | dither modulation (1) |
DNA (1) | DNN watermarking (1) | DOA estimation (1) |
Document image (1) | Doppler effect (1) | Doppler frequencies (1) |
double compression detection (2) | Double JPEG compression (1) | Doubly stochastic model (1) |
DS-SS (1) | DSL (2) | Dual lattice (1) |
dummies (1) | DVB (1) | DVB-S (3) |
dynacs (62) | dynamic spectrum access (2) | dynamic spectrum leasing (2) |
dynamic spectrum sharing (1) | Effective SNR (2) | Effective SNR metrics (1) |
EM (2) | empirical characterization (1) | encrypted domain (1) |
energy detector (1) | equalization (19) | equation error (1) |
error statistics (2) | estimation (3) | Europe (1) |
Expectation-Maximization (1) | expectation-maximization algorithm (1) | exponential matrix (1) |
face verification (1) | face-recognition (1) | fading channels (1) |
false negative probabilities (2) | false positive probabilities (2) | fast fading channels (1) |
fast-fading channel (1) | FER prediction (1) | filter bank (1) |
filtering (1) | Fingerprint (1) | Fingerprint recognition (2) |
Fingerprinting (2) | fingerprints (2) | fixed point implementation (1) |
forensics (8) | forensics investigators (1) | frame error rate (1) |
frequency division multiple access (2) | Frequency estimation (2) | Frequency estimator (1) |
Fridrich-Goljan self-embedding authentication method (2) | full duplex (14) | full-duplex (10) |
FuRLMS (1) | Gabor (1) | Gabor coefficients (1) |
gain estimation (1) | game theory (2) | generalized Gaussian (2) |
generalized likelihood ratio (1) | generalized likelihood ratio test (1) | generalized likelihood ratio test (GLRT) (1) |
Generalized Spatial Modulation (1) | Genomic Privacy (1) | GOP size estimation (2) |
GPU (2) | graph topology (1) | Graphics processing units (2) |
Hadamard ratio (1) | hash bit errors (2) | hidden services (2) |
Hierarchical OFDM (2) | higher-order statistics (2) | History (1) |
homomorphic encryption (3) | homomorphic encryption systems (1) | homomorphic processing (2) |
hybrid beamforming (1) | Hybrid Terrestrial- Satellite (1) | hypothesis testing (1) |
IIR (3) | IIR notchfilter (1) | image authentication method (2) |
Image block-variance (1) | image coding (3) | Image Denoising (1) |
Image Encryption (1) | Image forensics (6) | Image processing (1) |
image sensors (1) | image source identification (1) | imperfect channel prediction information (1) |
Index Modulation (1) | Index Modulations (1) | Information processing (1) |
Information security (1) | information theory (3) | Intellectual property (1) |
interpolation (6) | Invariant features (1) | inversion (1) |
iterative decoding (1) | iterative equalization (1) | iterative protocol (1) |
JPEG compression (1) | Kalman filter (1) | Kalman filters (2) |
keyless security (1) | Kruskal rank (1) | L-Band (1) |
Laguerre systems (1) | large-scale analysis (1) | Lattice (1) |
lattice cryptography (4) | lattice estimation (1) | lattice filters (7) |
Lattice-Based Cryptography (2) | lattice-based cryptosystems (1) | Leakage (1) |
least mean squares algorithm (1) | least mean squares methods (1) | Least squares (1) |
Lenses (1) | linear algebra (1) | linear filtering (1) |
linear minimum mean square error receivers (1) | link adaptation (8) | log normal distribution (1) |
Log-stable distribution (1) | Logarithmic watermarking (1) | Lognormal distribution (1) |
lognormal shadowing (1) | low complexity estimator (1) | low-complexity channel prediction (1) |
low-complexity channel predictor (1) | low-complexity video coding (1) | LPTV (1) |
MAC scheduling (1) | Machine Learning (6) | Magnitude (1) |
Massive MIMO (1) | matrix algebra (1) | mayte (3) |
Membership inference (1) | message authentication (2) | MFNN (1) |
microphone arrays (4) | millimeter wave bands (1) | millimetre wave antenna arrays (1) |
millimetre wave communication (1) | MIMO-OFDM (1) | ML (2) |
mmWave (31) | mobile communications (1) | mobile OFDMA (1) |
mobile radio (2) | mobile satellite (1) | mobile stations (2) |
mobile wireless channels (1) | Model-based (1) | modem (1) |
Moments-based estimation (1) | MPEG-2 (1) | multi-beam satellite (1) |
multiantenna detection (1) | multiantenna sensors (1) | multiaxial vibration (1) |
multiband sparse signal (1) | multibeam satellites (2) | multibeam satellites. (1) |
multicarrier communications (2) | multichannel (1) | Multicoset sampling (1) |
Multidimensional Signal Processing (1) | multihop protocol (1) | Multilayer Feedforward Neural Network (1) |
multimedia forensics (1) | Multimedia security (7) | multimodulus (1) |
Multiobjective evolutionary algorithms (1) | multiparty computation (1) | multiple-channel signal detection (1) |
multirate sampling (1) | multirate systems (1) | Multiuser detection (3) |
Multiuser MIMO-OFDM (1) | Mutual Information (1) | myrada (4) |
narrow-band filters (1) | nearly-flat spectral characteristics (1) | network theory (graphs) (1) |
neural networks (2) | next generation networks (1) | next-generation cellular networks (1) |
Neyman-Pearson (1) | Node localization (1) | noisy communications links (1) |
noisy estimation (1) | noisy time-varying graphs (1) | Non-uniformly spaced arrays (1) |
non-white Gaussian hosts (1) | nonlinear channels (7) | nonlinear filters (1) |
nonstationary processes (3) | ns-3 simulator (1) | Number Theoretic Transforms (1) |
OFDM (2) | OFDM modulation (3) | OFDM systems (1) |
OFDMA downlink (1) | Optimization (1) | oracle (1) |
order overestimation (1) | orthogonal frequency division multiple access (1) | orthogonal frequency division multiple access downlink (1) |
Overlay (1) | oversampling (1) | passband filters (1) |
PCE (1) | Perceptually shaped watermarks (1) | perfect channel state information (1) |
performance analysis (3) | Performance evaluation (1) | perspective distortion correction (1) |
phase estimation (2) | photo response non-uniformity (1) | photo response nonuniformity (1) |
Photoresponse Non-Uniformity (1) | PHY abstraction (1) | PLC (4) |
PLL (3) | Polarized Modulation (2) | polyphase filters (1) |
power control (1) | precoding (4) | prediction error (1) |
prediction error characterization (1) | prediction error filters (3) | prediction residue analysis (1) |
prediction-based RA strategies (1) | prediction-based resource allocation (1) | prediction-based resource allocation algorithm (1) |
prefiltering (1) | print-&-scan (1) | privacy (12) |
Privacy Protection (1) | PRNU (4) | PRNU compression (1) |
probability (1) | projection matrices (1) | protocols (1) |
PSK modulation (1) | public image dataset (1) | Quantization (1) |
radial correction (1) | Radial Distortion Correction (1) | radio maps (1) |
radio spectrum management (1) | radio transmitters (1) | Rain (1) |
rain fading (1) | random vibration (3) | Range measurements (1) |
Rare event (1) | rate distortion optimization (1) | rational dither modulation (1) |
Rayleigh (3) | Rayleigh fading (1) | Real sinusoid (1) |
recursive formulation (1) | region duplication (1) | Reinforcement learning (1) |
relay (1) | relay networks (telecommunication) (1) | Reliability (1) |
resampling detection (2) | resampling estimation (1) | resampling factor estimation (1) |
Resource management (1) | return link (1) | Rice (2) |
Ricean fading (1) | rights management (1) | robust (8) |
robust hashing (2) | rodin (12) | RPHD estimator (1) |
SAM (1) | satcom (27) | satellite communications (11) |
Satellite OFDM (1) | Satellites (1) | Scheduling algorithms (1) |
SDR (1) | second-order statistics (12) | secure adaptive filtering (1) |
Secure Embedding (1) | Secure Signal Processing (2) | security (24) |
sensitivity (4) | sensor network (3) | SIFT (2) |
signal privacy preservation (1) | Signal processing (2) | Signal Processing in the Encrypted Domain (1) |
signal shaping (1) | Signal to noise ratio (2) | Signal-to-noise ratio (SNR) (1) |
silicon sensor imperfections (1) | Single Frequency Network (3) | Single sinusoid (1) |
Sinusoid detection (1) | Slepian-Wolf coding (1) | Smart phones (1) |
SNR (2) | SNR estimation (3) | Software (1) |
Somewhat Homomorphic Encryption (1) | Source heterogeneity (1) | source attribution (1) |
Space-Time Coding (1) | Spatial Modulation (3) | spatial transformation (1) |
specific camera sensor (1) | Spectral estimation (1) | spectrum sensing (16) |
spectrum shaping (15) | SPED (5) | SPED techniques (1) |
speed estimation (4) | SPR (13) | stability (3) |
staggered modulation (1) | Statistical Model (1) | steady-state Kalman filter (1) |
Steganalysis (1) | steganography (1) | Stochastic optimization (1) |
strengthened (1) | subband adaptive filters (1) | sum-of-sinusoids channel predictors (1) |
superimposed pilots (1) | Surveillance (1) | SVD (1) |
symbol rate (1) | synchronization (7) | system identification (15) |
systems of linear equations (1) | tampering detection (1) | Tardos (2) |
Tardos code (2) | Tardos codes (1) | Task analysis (1) |
telecommunication links (1) | telecommunication network topology (1) | Terrestrial (2) |
time domain equalizer (1) | time-varying channels (3) | time-varying network topology (1) |
time-varying secondary system (1) | time-varying systems (1) | timestamps (2) |
timing channel (2) | Tomlinson-Harashima precoding (1) | tor network (2) |
traffic monitoring (4) | Training (1) | training symbols (1) |
Traitor tracing (5) | Two-dimensional-modulations (1) | unit-norm (1) |
universal pattern (1) | vehicular communications (1) | vibration synthesis (1) |
video forensics (2) | Video Source Identification (1) | Video Stabilization (1) |
videosurveillance (1) | visible-encryption (2) | Visualization (1) |
watermark detection (1) | watermark embedding (1) | watermarking (111) |
weak multiplicative noise (1) | Weber's law (1) | white-box (1) |
Wideband regime (1) | winter (28) | wireless channel (1) |
wireless channels (1) | Wireless communication (1) | wireless medium (1) |
Wireless Microphones (1) | wireless multimedia sensor networks (1) | Witsenhausen's counterexample (1) |
wsn (25) | zero-knowledge (3) | |