A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
2-D-Bar-Codes (1) access control (1) ad hoc detectors (1)
adaptive (1) adaptive filtering (1) adaptive IIR filters (17)
adaptive signal processing (1) additive white Gaussian noise (1) adversarial signal processing (5)
analog frequency modulated signal (1) Analog-to-information converters (1) ANC (3)
anonymous communications (1) antenna arrays (2) Antennas (1)
Approximation methods (1) asp (24) Attenuation (1)
audio (1) authentication (1) Autocorrelation (1)
autoregressive modeling (1) autoregressive processes (1) avoidance (1)
AWGN (1) band-pass filters (1) Bandlimited signals. (1)
bar-codes (1) basis expansion model (1) basis function approximations (1)
benford (2) benford's-law (2) biometrics (1)
bit loading (1) Blind Adaptation (1) blind equalization (2)
Blind estimation (1) blind identification (1) blind input estimation (1)
blind phase estimation (1) BOWS (1) Broadcast (1)
broadcasting (1) BTS (1) burst (3)
calibration (1) calibration errors (1) carrier offset (1)
Carrier offset estimation (1) cellular communications (1) cellular radio (1)
channel coefficient (1) channel Doppler spectrum (1) channel estimation (2)
channel estimator (2) channel shortener (1) Channel shortening (1)
channel state information in the transmitter (1) channel variations (1) cloud (3)
CM (1) cognitive radio (7) Cognitive radio (CR) (1)
cognitive radio system (2) Cognitive radios (2) cograd (36)
coherence spectrum (1) collusion (2) collusion channel (1)
combat shadowing (1) compass (47) compressed sensing (8)
compressive sampling (2) computational complexity (2) connectivity graph (1)
Constant Magnitude (1) constant modulus (4) constant-envelope signal (1)
control (1) correlated sources (3) Correlation (1)
covariance matching (1) Cramér-Rao bound (CRB) (2) Cramer-Rao lower bound (1)
cross-QAM constellations (1) cryptography (3) CSIT (1)
cyclic prefix (1) cyclostationarity (2) data hiding (4)
data-hiding (80) DCT (1) decision feedback equalization (2)
decoupled parameters (1) delay spread (1) desynchronization (1)
detection diversity (1) Digital Communications (36) digital data protection (1)
digital image forensics (1) Digital Television (2) dirty paper (2)
dirty paper coding (1) disclosure attacks (1) discrete cosine transform (2)
discrete cosine transforms (2) Distortion Optimization (1) distributed estimation (3)
distributed local Kalman filtering (1) distributed source coding (1) distributed spectrum sensing (1)
distributed tracking (1) distributed tracking with consensus (1) dither modulation (1)
DNA (1) DOA estimation (1) Document image (1)
Doppler effect (1) Doppler frequencies (1) Doubly stochastic model (1)
DS-SS (1) DSL (2) Dual lattice (1)
dummies (1) DVB (1) DVB-S (3)
dynacs (62) dynamic spectrum access (2) dynamic spectrum leasing (2)
dynamic spectrum sharing (1) Effective SNR (2) Effective SNR metrics (1)
EM (2) empirical characterization (1) encrypted domain (1)
energy detector (1) equalization (21) equation error (1)
error statistics (2) estimation (2) Expectation-Maximization (1)
expectation-maximization algorithm (1) exponential matrix (1) face verification (1)
face-recognition (1) fading channels (1) false negative probabilities (2)
false positive probabilities (2) fast fading channels (1) fast-fading channel (1)
FER prediction (1) filter bank (1) filtering (1)
Fingerprinting (1) fingerprints (2) fixed point implementation (1)
forensics (2) frame error rate (1) frequency division multiple access (2)
Frequency estimation (2) Frequency estimator (1) Frequency measurement (1)
frequency-flat antenna (1) Fridrich-Goljan self-embedding authentication method (2) full duplex (13)
FuRLMS (1) Gabor (1) Gabor coefficients (1)
gain estimation (1) game theory (2) Gaussian minimum shift keying modulated signal (1)
generalized Gaussian (2) generalized likelihood ratio (1) generalized likelihood ratio approach (1)
generalized likelihood ratio test (1) generalized likelihood ratio test (GLRT) (2) Genomic Privacy (1)
GLR approach (1) GLRT (1) graph topology (1)
GSM cellular standard (1) Hadamard ratio (1) hash bit errors (2)
hidden services (2) Hierarchical OFDM (2) higher-order statistics (2)
homomorphic encryption (2) homomorphic encryption systems (1) homomorphic processing (2)
hybrid beamforming (1) Hybrid Terrestrial- Satellite (1) hypothesis testing (1)
IIR (3) IIR notchfilter (1) image authentication method (2)
Image block-variance (1) image coding (2) Image Denoising (1)
Image Encryption (1) Image forensics (3) imperfect channel prediction information (1)
information theory (2) interpolation (4) Invariant features (1)
inversion (1) iterative decoding (1) iterative equalization (1)
iterative protocol (1) JPEG compression (1) Kalman filter (1)
Kalman filters (2) keyless security (1) Kruskal rank (1)
L-Band (1) Laguerre systems (1) large-scale analysis (1)
Lattice (1) lattice cryptography (4) lattice estimation (1)
lattice filters (7) Lattice-Based Cryptography (1) least mean squares algorithm (1)
least mean squares methods (1) Least squares (1) linear algebra (1)
linear filtering (1) linear minimum mean square error receivers (1) link adaptation (4)
log normal distribution (1) Log-stable distribution (1) Logarithmic watermarking (1)
Lognormal distribution (1) lognormal shadowing (1) low complexity estimator (1)
low-complexity channel prediction (1) low-complexity channel predictor (1) low-complexity video coding (1)
LPTV (1) Machine Learning (1) Magnitude (1)
Massive MIMO (1) maximum likelihood (ML) estimation (2) message authentication (2)
microphone arrays (4) MIMO channels (1) MIMO-OFDM (1)
minimum shift keying (1) ML (2) mmWave (13)
mobile communications (1) mobile OFDMA (1) mobile radio (2)
mobile satellite (1) mobile stations (2) mobile wireless channels (1)
Model-based (1) modem (1) Moments-based estimation (1)
multiantenna detection (1) multiantenna sensors (1) multiband sparse signal (1)
multibeam satellites (2) multibeam satellites. (1) multicarrier communications (1)
multichannel (1) Multicoset sampling (1) multimedia forensics (1)
Multimedia security (1) multimodulus (1) Multiobjective evolutionary algorithms (1)
multiparty computation (1) multiple-channel signal detection (1) multirate sampling (1)
multirate systems (1) Multiuser detection (3) Multiuser MIMO-OFDM (1)
myrada (1) narrow-band filters (1) network theory (graphs) (1)
Neyman-Pearson (1) Node localization (1) Noise (1)
noise spatial independence (1) noisy communications links (1) noisy estimation (1)
noisy time-varying graphs (1) Non-uniformly spaced arrays (1) non-white Gaussian hosts (1)
nonlinear channels (7) nonlinear filters (1) nonstationary processes (3)
Number Theoretic Transforms (1) OFDM (1) OFDM modulation (3)
OFDM systems (1) OFDMA downlink (1) oracle (1)
order overestimation (1) orthogonal frequency division multiple access (1) orthogonal frequency division multiple access downlink (1)
Overlay (1) oversampling (1) passband filters (1)
Perceptually shaped watermarks (1) perfect channel state information (1) performance analysis (3)
perspective distortion correction (1) phase estimation (3) PHY abstraction (1)
PLC (4) PLL (3) polyphase filters (1)
power control (1) precoding (2) prediction error (1)
prediction error characterization (1) prediction error filters (3) prediction-based RA strategies (1)
prediction-based resource allocation (1) prediction-based resource allocation algorithm (1) prefiltering (1)
print-&-scan (1) privacy (10) Privacy Protection (1)
PSK modulation (1) QAM modulation (1) Quantization (1)
radio transmitters (1) Rain (1) rain fading (1)
Range measurements (1) Rare event (1) rational dither modulation (1)
Rayleigh (3) Rayleigh fading (1) Real sinusoid (1)
realizable filters (2) recursive formulation (1) region duplication (1)
relay (1) resampling detection (2) resampling estimation (1)
resampling factor estimation (1) return link (1) Rice (2)
Ricean fading (1) rights management (1) robust (8)
robust hashing (2) RPHD estimator (1) SAM (1)
satcom (25) satellite communications (10) Satellite OFDM (1)
Satellites (1) SDR (1) second-order statistics (12)
secure adaptive filtering (1) Secure Embedding (1) Secure Signal Processing (1)
security (24) sensitivity (4) sensor network (3)
Sensors (1) SIFT (1) signal detection (1)
signal privacy preservation (1) Signal processing algorithms (1) Signal Processing in the Encrypted Domain (1)
signal shaping (1) Signal to noise ratio (1) Signal-to-noise ratio (SNR) (1)
Single Frequency Network (3) Single sinusoid (1) Sinusoid detection (1)
Slepian-Wolf coding (1) SNR (2) SNR estimation (3)
Somewhat Homomorphic Encryption (1) Space-Time Coding (1) spatial transformation (1)
Spectral estimation (1) spectrum sensing (10) SPED (5)
SPED techniques (1) speed estimation (4) SPR (13)
stability (3) staggered modulation (1) Statistical Model (1)
steady-state Kalman filter (1) Steganalysis (1) steganography (1)
Stochastic optimization (1) strengthened (1) subband adaptive filters (1)
sum-of-sinusoids channel predictors (1) superimposed pilots (1) SVD (1)
symbol rate (1) synchronization (7) system identification (15)
systems of linear equations (1) tampering detection (1) Tardos (2)
Tardos code (2) telecommunication links (1) telecommunication network topology (1)
Terrestrial (2) time domain equalizer (1) time-varying channels (3)
time-varying network topology (1) time-varying secondary system (1) time-varying systems (1)
timestamps (2) timing channel (2) Tomlinson-Harashima precoding (1)
tor network (2) traffic monitoring (4) training symbols (1)
Traitor tracing (4) TV band (1) Two-dimensional-modulations (1)
unit-norm (1) universal pattern (1) unknown signal detection (1)
unknown variance noise (1) vehicular communications (1) videosurveillance (1)
visible-encryption (2) watermark detection (1) watermark embedding (1)
watermarking (110) Weber's law (1) Wideband (1)
wideband spectrum sensing (1) winter (3) wireless channel (1)
wireless channels (1) wireless medium (1) wireless microphone transmission (1)
Wireless Microphones (1) wireless multimedia sensor networks (1) Witsenhausen's counterexample (1)
wsn (19) zero-knowledge (3)