A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
2-D-Bar-Codes (1) access control (1) acquisition time (1)
ad hoc detectors (1) adaptive (1) adaptive filtering (1)
adaptive IIR filters (16) adaptive signal processing (24) adversarial signal processing (9)
ANC (3) anonymous communications (1) antenna arrays (1)
Antennas (1) Approximation methods (1) Attenuation (1)
audio (1) authentication (1) Autocorrelation (1)
autoregressive modeling (1) autoregressive processes (1) avoidance (1)
band-pass filters (1) Bandlimited signals. (1) bar-codes (1)
basis expansion model (1) basis function approximations (1) benford (2)
benford's-law (2) biometrics (1) bit loading (1)
Blind Adaptation (1) blind equalization (2) Blind estimation (1)
blind identification (1) blind input estimation (1) blind phase estimation (1)
BOWS (1) Broadcast (1) broadcasting (1)
burst (3) calibration (1) calibration errors (1)
cameras (1) carrier offset (1) Carrier offset estimation (1)
channel coefficient (1) channel Doppler spectrum (1) channel equalization (2)
channel estimation (2) channel estimator (2) channel shortener (1)
Channel shortening (1) channel state information in the transmitter (1) channel variations (1)
cloud (3) cognitive radio (47) coherence spectrum (1)
collusion (2) collusion channel (1) compass (67)
compressed sensing (9) compressive sampling (2) computational complexity (3)
connectivity graph (1) Constant Magnitude (1) constant modulus (3)
control (1) correlated sources (3) Correlation (1)
Cramér-Rao bound (CRB) (2) Cramer-Rao lower bound (1) cross-QAM constellations (1)
cryptography (3) CSIT (1) cyclic prefix (1)
cyclostationarity (2) data compression (1) data hiding (4)
data-hiding (80) DCT (1) decision feedback equalization (1)
decoupled parameters (1) defacto standard (1) delay spread (1)
design methodology (1) desynchronization (1) detection diversity (1)
Digital Communications (33) digital data protection (1) digital image forensics (1)
digital photo (1) Digital Television (2) dirty paper (2)
dirty paper coding (1) disclosure attacks (1) discrete cosine transform (2)
discrete cosine transforms (2) Distortion Optimization (1) distributed estimation (3)
distributed local Kalman filtering (1) distributed source coding (1) distributed tracking (1)
distributed tracking with consensus (1) dither modulation (1) DNA (1)
DOA estimation (1) Document image (1) Doppler effect (1)
Doppler frequencies (1) Doubly stochastic model (1) DS-SS (1)
DSL (2) Dual lattice (1) dummies (1)
DVB (1) DVB-S (3) dynacs (62)
dynamic spectrum access (2) dynamic spectrum leasing (2) dynamic spectrum sharing (1)
Effective SNR (2) Effective SNR metrics (1) EM (2)
empirical characterization (1) encrypted domain (1) energy detector (1)
equalization (19) equation error (1) error statistics (2)
estimation (1) Expectation-Maximization (1) expectation-maximization algorithm (1)
exponential matrix (1) face verification (1) face-recognition (1)
fading channels (1) false negative probabilities (2) false positive probabilities (2)
fast fading channels (1) fast-fading channel (1) FER prediction (1)
filter bank (1) filtering (1) Fingerprinting (1)
fingerprints (2) fixed point implementation (1) forensics (2)
forensics investigators (1) frame error rate (1) frequency division multiple access (2)
Frequency estimation (2) Frequency estimator (1) Fridrich-Goljan self-embedding authentication method (2)
full duplex (13) full-duplex (1) FuRLMS (1)
Gabor (1) Gabor coefficients (1) gain estimation (1)
game theory (2) generalized Gaussian (2) generalized likelihood ratio (1)
generalized likelihood ratio test (1) generalized likelihood ratio test (GLRT) (1) Genomic Privacy (1)
graph topology (1) Hadamard ratio (1) hash bit errors (2)
hidden services (2) Hierarchical OFDM (2) higher-order statistics (2)
homomorphic encryption (2) homomorphic encryption systems (1) homomorphic processing (2)
hybrid beamforming (1) Hybrid Terrestrial- Satellite (1) hypothesis testing (1)
IIR (3) IIR notchfilter (1) image authentication method (2)
Image block-variance (1) image coding (3) Image Denoising (1)
Image Encryption (1) Image forensics (4) image sensors (1)
image source identification (1) imperfect channel prediction information (1) information theory (2)
interpolation (5) Invariant features (1) inversion (1)
iterative decoding (1) iterative equalization (1) iterative protocol (1)
JPEG compression (1) Kalman filter (1) Kalman filters (2)
keyless security (1) Kruskal rank (1) L-Band (1)
Laguerre systems (1) large-scale analysis (1) Lattice (1)
lattice cryptography (4) lattice estimation (1) lattice filters (7)
Lattice-Based Cryptography (1) least mean squares algorithm (1) least mean squares methods (1)
Least squares (1) linear algebra (1) linear filtering (1)
linear minimum mean square error receivers (1) link adaptation (4) log normal distribution (1)
Log-stable distribution (1) Logarithmic watermarking (1) Lognormal distribution (1)
lognormal shadowing (1) low complexity estimator (1) low-complexity channel prediction (1)
low-complexity channel predictor (1) low-complexity video coding (1) LPTV (1)
Machine Learning (1) Magnitude (1) Massive MIMO (1)
matrix algebra (1) message authentication (2) microphone arrays (4)
MIMO-OFDM (1) ML (2) mmWave (19)
mobile communications (1) mobile OFDMA (1) mobile radio (2)
mobile satellite (1) mobile stations (2) mobile wireless channels (1)
Model-based (1) modem (1) Moments-based estimation (1)
multiantenna detection (1) multiantenna sensors (1) multiband sparse signal (1)
multibeam satellites (2) multibeam satellites. (1) multicarrier communications (1)
multichannel (1) Multicoset sampling (1) multimedia forensics (1)
Multimedia security (7) multimodulus (1) Multiobjective evolutionary algorithms (1)
multiparty computation (1) multiple-channel signal detection (1) multirate sampling (1)
multirate systems (1) Multiuser detection (3) Multiuser MIMO-OFDM (1)
myrada (2) narrow-band filters (1) nearly-flat spectral characteristics (1)
network theory (graphs) (1) Neyman-Pearson (1) Node localization (1)
noisy communications links (1) noisy estimation (1) noisy time-varying graphs (1)
Non-uniformly spaced arrays (1) non-white Gaussian hosts (1) nonlinear channels (7)
nonlinear filters (1) nonstationary processes (3) Number Theoretic Transforms (1)
OFDM (1) OFDM modulation (3) OFDM systems (1)
OFDMA downlink (1) oracle (1) order overestimation (1)
orthogonal frequency division multiple access (1) orthogonal frequency division multiple access downlink (1) Overlay (1)
oversampling (1) passband filters (1) Perceptually shaped watermarks (1)
perfect channel state information (1) performance analysis (3) Performance evaluation (1)
perspective distortion correction (1) phase estimation (2) photo response nonuniformity (1)
PHY abstraction (1) PLC (4) PLL (3)
polyphase filters (1) power control (1) precoding (3)
prediction error (1) prediction error characterization (1) prediction error filters (3)
prediction-based RA strategies (1) prediction-based resource allocation (1) prediction-based resource allocation algorithm (1)
prefiltering (1) print-&-scan (1) privacy (10)
Privacy Protection (1) PRNU compression (1) probability (1)
projection matrices (1) PSK modulation (1) public image dataset (1)
Quantization (1) radio transmitters (1) Rain (1)
rain fading (1) random vibration (1) Range measurements (1)
Rare event (1) rational dither modulation (1) Rayleigh (3)
Rayleigh fading (1) Real sinusoid (1) recursive formulation (1)
region duplication (1) relay (1) resampling detection (2)
resampling estimation (1) resampling factor estimation (1) return link (1)
Rice (2) Ricean fading (1) rights management (1)
robust (8) robust hashing (2) RPHD estimator (1)
SAM (1) satcom (26) satellite communications (10)
Satellite OFDM (1) Satellites (1) SDR (1)
second-order statistics (12) secure adaptive filtering (1) Secure Embedding (1)
Secure Signal Processing (1) security (24) sensitivity (4)
sensor network (3) SIFT (1) signal privacy preservation (1)
Signal Processing in the Encrypted Domain (1) signal shaping (1) Signal to noise ratio (2)
Signal-to-noise ratio (SNR) (1) silicon sensor imperfections (1) Single Frequency Network (3)
Single sinusoid (1) Sinusoid detection (1) Slepian-Wolf coding (1)
SNR (2) SNR estimation (3) Somewhat Homomorphic Encryption (1)
Space-Time Coding (1) spatial transformation (1) specific camera sensor (1)
Spectral estimation (1) spectrum sensing (16) SPED (5)
SPED techniques (1) speed estimation (4) SPR (13)
stability (3) staggered modulation (1) Statistical Model (1)
steady-state Kalman filter (1) Steganalysis (1) steganography (1)
Stochastic optimization (1) strengthened (1) subband adaptive filters (1)
sum-of-sinusoids channel predictors (1) superimposed pilots (1) SVD (1)
symbol rate (1) synchronization (7) system identification (15)
systems of linear equations (1) tampering detection (1) Tardos (2)
Tardos code (2) telecommunication links (1) telecommunication network topology (1)
Terrestrial (2) time domain equalizer (1) time-varying channels (3)
time-varying network topology (1) time-varying secondary system (1) time-varying systems (1)
timestamps (2) timing channel (2) Tomlinson-Harashima precoding (1)
tor network (2) traffic monitoring (4) training symbols (1)
Traitor tracing (4) Two-dimensional-modulations (1) unit-norm (1)
universal pattern (1) vehicular communications (1) videosurveillance (1)
visible-encryption (2) watermark detection (1) watermark embedding (1)
watermarking (110) weak multiplicative noise (1) Weber's law (1)
winter (14) wireless channel (1) wireless channels (1)
wireless medium (1) Wireless Microphones (1) wireless multimedia sensor networks (1)
Witsenhausen's counterexample (1) wsn (23) zero-knowledge (3)