|
2-D-Bar-Codes (1) | 5G (1) | 5G mobile communication (1) |
access control (1) | ACM (1) | Acoustic distortion (1) |
acquisition time (1) | ad hoc detectors (1) | Ad hoc networks (1) |
Adaptation models (1) | adaptive (1) | adaptive coding and modulation (1) |
Adaptive Communications (1) | adaptive filtering (1) | adaptive IIR filters (16) |
adaptive processing (1) | adaptive signal processing (26) | adversarial signal processing (9) |
analogue-digital conversio (1) | Analytical models (1) | ANC (3) |
anonymous communications (1) | antenna arrays (2) | Antennas (1) |
Approximation methods (1) | Artificial neural networks (1) | Attenuation (1) |
audio (1) | authentication (1) | Autocorrelation (1) |
autoregressive modeling (1) | autoregressive processes (1) | avoidance (1) |
B-frames (1) | band-pass filters (1) | Bandlimited signals. (1) |
Bandwidth (1) | bandwidth scaling limit (1) | bar-codes (1) |
basis expansion model (1) | basis function approximations (1) | benford (2) |
benford's-law (2) | biometrics (1) | bit loading (1) |
black-box (1) | Blind Adaptation (1) | blind equalization (2) |
Blind estimation (1) | blind identification (1) | blind input estimation (1) |
blind phase estimation (1) | BOWS (1) | Broadcast (1) |
broadcasting (1) | burst (3) | calibration (1) |
calibration errors (1) | Camera Attribution (1) | camera attribution forensic analyzer (1) |
Camera Source Identification (1) | cameras (3) | Capacity (1) |
capacity scaling laws (1) | carrier offset (1) | Carrier offset estimation (1) |
Cellular networks (1) | cellular radio (1) | channel coefficient (1) |
channel Doppler spectrum (1) | channel equalization (2) | channel estimation (2) |
channel estimator (2) | channel shortener (1) | Channel shortening (1) |
channel state information in the transmitter (1) | channel variations (1) | Closed box (1) |
cloud (3) | Codes (2) | cognitive radio (48) |
coherence spectrum (1) | collusion (2) | collusion channel (1) |
compass (67) | compressed sensing (9) | compressive sampling (2) |
computational complexity (3) | connectivity graph (1) | Constant Magnitude (1) |
constant modulus (3) | control (1) | Convolutional Neural Networks (1) |
cooperative communication (1) | correlated sources (3) | Correlation (1) |
Cramér-Rao bound (CRB) (2) | Cramer-Rao lower bound (1) | cross-QAM constellations (1) |
cryptography (3) | CSIT (1) | cyclic prefix (1) |
cyclostationarity (2) | data compression (1) | data hiding (4) |
Data security (1) | data-hiding (80) | DCT (1) |
decision feedback equalization (1) | decoupled parameters (1) | Deep Learning (3) |
defacto standard (1) | Degradation (1) | delay spread (1) |
design methodology (1) | desynchronization (1) | detection diversity (1) |
Digital Communications (33) | digital data protection (1) | digital image forensics (1) |
digital media forensics (1) | digital photo (1) | Digital Television (2) |
dirty paper (2) | dirty paper coding (1) | disclosure attacks (1) |
discrete cosine transform (2) | discrete cosine transforms (2) | Distortion (1) |
distortion correction (1) | Distortion Optimization (1) | distributed estimation (3) |
distributed local Kalman filtering (1) | distributed source coding (1) | distributed tracking (1) |
distributed tracking with consensus (1) | dither modulation (1) | DNA (1) |
DNN watermarking (1) | DOA estimation (1) | Document image (1) |
Doppler effect (1) | Doppler frequencies (1) | double compression detection (2) |
Double JPEG compression (1) | Doubly stochastic model (1) | DS-SS (1) |
DSL (2) | Dual lattice (1) | dummies (1) |
DVB (1) | DVB-S (3) | dynacs (62) |
dynamic spectrum access (2) | dynamic spectrum leasing (2) | dynamic spectrum sharing (1) |
Effective SNR (2) | Effective SNR metrics (1) | EM (2) |
empirical characterization (1) | encrypted domain (1) | energy detector (1) |
equalization (19) | equation error (1) | error statistics (2) |
estimation (3) | Europe (1) | Expectation-Maximization (1) |
expectation-maximization algorithm (1) | exponential matrix (1) | face verification (1) |
face-recognition (1) | fading channels (1) | false negative probabilities (2) |
false positive probabilities (2) | fast fading channels (1) | fast-fading channel (1) |
FER prediction (1) | filter bank (1) | filtering (1) |
Fingerprint (1) | Fingerprint recognition (2) | Fingerprinting (2) |
fingerprints (2) | fixed point implementation (1) | forensics (8) |
forensics investigators (1) | frame error rate (1) | frequency division multiple access (2) |
Frequency estimation (2) | Frequency estimator (1) | Fridrich-Goljan self-embedding authentication method (2) |
full duplex (13) | full-duplex (10) | FuRLMS (1) |
Gabor (1) | Gabor coefficients (1) | gain estimation (1) |
game theory (2) | generalized Gaussian (2) | generalized likelihood ratio (1) |
generalized likelihood ratio test (1) | generalized likelihood ratio test (GLRT) (1) | Generalized Spatial Modulation (1) |
Genomic Privacy (1) | GOP size estimation (2) | GPU (2) |
graph topology (1) | Graphics processing units (2) | Hadamard ratio (1) |
hash bit errors (2) | hidden services (2) | Hierarchical OFDM (2) |
higher-order statistics (2) | History (1) | homomorphic encryption (3) |
homomorphic encryption systems (1) | homomorphic processing (2) | hybrid beamforming (1) |
Hybrid Terrestrial- Satellite (1) | hypothesis testing (1) | IIR (3) |
IIR notchfilter (1) | image authentication method (2) | Image block-variance (1) |
image coding (3) | Image Denoising (1) | Image Encryption (1) |
Image forensics (6) | Image processing (1) | image sensors (1) |
image source identification (1) | imperfect channel prediction information (1) | Index Modulation (1) |
Index Modulations (1) | Information processing (1) | Information security (1) |
information theory (3) | Intellectual property (1) | interpolation (6) |
Invariant features (1) | inversion (1) | iterative decoding (1) |
iterative equalization (1) | iterative protocol (1) | JPEG compression (1) |
Kalman filter (1) | Kalman filters (2) | keyless security (1) |
Kruskal rank (1) | L-Band (1) | Laguerre systems (1) |
large-scale analysis (1) | Lattice (1) | lattice cryptography (4) |
lattice estimation (1) | lattice filters (7) | Lattice-Based Cryptography (2) |
lattice-based cryptosystems (1) | Leakage (1) | least mean squares algorithm (1) |
least mean squares methods (1) | Least squares (1) | Lenses (1) |
linear algebra (1) | linear filtering (1) | linear minimum mean square error receivers (1) |
link adaptation (8) | log normal distribution (1) | Log-stable distribution (1) |
Logarithmic watermarking (1) | Lognormal distribution (1) | lognormal shadowing (1) |
low complexity estimator (1) | low-complexity channel prediction (1) | low-complexity channel predictor (1) |
low-complexity video coding (1) | LPTV (1) | Machine Learning (6) |
Magnitude (1) | Massive MIMO (1) | matrix algebra (1) |
mayte (2) | Membership inference (1) | message authentication (2) |
MFNN (1) | microphone arrays (4) | millimeter wave bands (1) |
millimetre wave antenna arrays (1) | millimetre wave communication (1) | MIMO-OFDM (1) |
ML (2) | mmWave (30) | mobile communications (1) |
mobile OFDMA (1) | mobile radio (2) | mobile satellite (1) |
mobile stations (2) | mobile wireless channels (1) | Model-based (1) |
modem (1) | Moments-based estimation (1) | MPEG-2 (1) |
multi-beam satellite (1) | multiantenna detection (1) | multiantenna sensors (1) |
multiaxial vibration (1) | multiband sparse signal (1) | multibeam satellites (2) |
multibeam satellites. (1) | multicarrier communications (2) | multichannel (1) |
Multicoset sampling (1) | Multidimensional Signal Processing (1) | multihop protocol (1) |
Multilayer Feedforward Neural Network (1) | multimedia forensics (1) | Multimedia security (7) |
multimodulus (1) | Multiobjective evolutionary algorithms (1) | multiparty computation (1) |
multiple-channel signal detection (1) | multirate sampling (1) | multirate systems (1) |
Multiuser detection (3) | Multiuser MIMO-OFDM (1) | Mutual Information (1) |
myrada (4) | narrow-band filters (1) | nearly-flat spectral characteristics (1) |
network theory (graphs) (1) | neural networks (2) | next generation networks (1) |
next-generation cellular networks (1) | Neyman-Pearson (1) | Node localization (1) |
noisy communications links (1) | noisy estimation (1) | noisy time-varying graphs (1) |
Non-uniformly spaced arrays (1) | non-white Gaussian hosts (1) | nonlinear channels (7) |
nonlinear filters (1) | nonstationary processes (3) | Number Theoretic Transforms (1) |
OFDM (2) | OFDM modulation (3) | OFDM systems (1) |
OFDMA downlink (1) | oracle (1) | order overestimation (1) |
orthogonal frequency division multiple access (1) | orthogonal frequency division multiple access downlink (1) | Overlay (1) |
oversampling (1) | passband filters (1) | PCE (1) |
Perceptually shaped watermarks (1) | perfect channel state information (1) | performance analysis (3) |
Performance evaluation (1) | perspective distortion correction (1) | phase estimation (2) |
photo response non-uniformity (1) | photo response nonuniformity (1) | Photoresponse Non-Uniformity (1) |
PHY abstraction (1) | PLC (4) | PLL (3) |
Polarized Modulation (2) | polyphase filters (1) | power control (1) |
precoding (4) | prediction error (1) | prediction error characterization (1) |
prediction error filters (3) | prediction residue analysis (1) | prediction-based RA strategies (1) |
prediction-based resource allocation (1) | prediction-based resource allocation algorithm (1) | prefiltering (1) |
print-&-scan (1) | privacy (12) | Privacy Protection (1) |
PRNU (4) | PRNU compression (1) | probability (1) |
projection matrices (1) | protocols (1) | PSK modulation (1) |
public image dataset (1) | Quantization (1) | radial correction (1) |
Radial Distortion Correction (1) | radio maps (1) | radio spectrum management (1) |
radio transmitters (1) | Rain (1) | rain fading (1) |
random vibration (3) | Range measurements (1) | Rare event (1) |
rate distortion optimization (1) | rational dither modulation (1) | Rayleigh (3) |
Rayleigh fading (1) | Real sinusoid (1) | recursive formulation (1) |
region duplication (1) | relay (1) | relay networks (telecommunication) (1) |
Reliability (1) | resampling detection (2) | resampling estimation (1) |
resampling factor estimation (1) | return link (1) | Rice (2) |
Ricean fading (1) | rights management (1) | robust (8) |
robust hashing (2) | rodin (12) | RPHD estimator (1) |
SAM (1) | satcom (27) | satellite communications (11) |
Satellite OFDM (1) | Satellites (1) | SDR (1) |
second-order statistics (12) | secure adaptive filtering (1) | Secure Embedding (1) |
Secure Signal Processing (2) | security (24) | sensitivity (4) |
sensor network (3) | SIFT (2) | signal privacy preservation (1) |
Signal processing (2) | Signal Processing in the Encrypted Domain (1) | signal shaping (1) |
Signal to noise ratio (2) | Signal-to-noise ratio (SNR) (1) | silicon sensor imperfections (1) |
Single Frequency Network (3) | Single sinusoid (1) | Sinusoid detection (1) |
Slepian-Wolf coding (1) | Smart phones (1) | SNR (2) |
SNR estimation (3) | Software (1) | Somewhat Homomorphic Encryption (1) |
Source heterogeneity (1) | source attribution (1) | Space-Time Coding (1) |
Spatial Modulation (3) | spatial transformation (1) | specific camera sensor (1) |
Spectral estimation (1) | spectrum sensing (16) | spectrum shaping (15) |
SPED (5) | SPED techniques (1) | speed estimation (4) |
SPR (13) | stability (3) | staggered modulation (1) |
Statistical Model (1) | steady-state Kalman filter (1) | Steganalysis (1) |
steganography (1) | Stochastic optimization (1) | strengthened (1) |
subband adaptive filters (1) | sum-of-sinusoids channel predictors (1) | superimposed pilots (1) |
Surveillance (1) | SVD (1) | symbol rate (1) |
synchronization (7) | system identification (15) | systems of linear equations (1) |
tampering detection (1) | Tardos (2) | Tardos code (2) |
Tardos codes (1) | telecommunication links (1) | telecommunication network topology (1) |
Terrestrial (2) | time domain equalizer (1) | time-varying channels (3) |
time-varying network topology (1) | time-varying secondary system (1) | time-varying systems (1) |
timestamps (2) | timing channel (2) | Tomlinson-Harashima precoding (1) |
tor network (2) | traffic monitoring (4) | Training (1) |
training symbols (1) | Traitor tracing (5) | Two-dimensional-modulations (1) |
unit-norm (1) | universal pattern (1) | vehicular communications (1) |
vibration synthesis (1) | video forensics (2) | Video Source Identification (1) |
Video Stabilization (1) | videosurveillance (1) | visible-encryption (2) |
Visualization (1) | watermark detection (1) | watermark embedding (1) |
watermarking (111) | weak multiplicative noise (1) | Weber's law (1) |
white-box (1) | Wideband regime (1) | winter (28) |
wireless channel (1) | wireless channels (1) | Wireless communication (1) |
wireless medium (1) | Wireless Microphones (1) | wireless multimedia sensor networks (1) |
Witsenhausen's counterexample (1) | wsn (25) | zero-knowledge (3) |