|
2-D-Bar-Codes (1) | 5G (1) | access control (1) |
ACM (1) | acquisition time (1) | ad hoc detectors (1) |
adaptive (1) | adaptive coding and modulation (1) | Adaptive Communications (1) |
adaptive filtering (1) | adaptive IIR filters (16) | adaptive signal processing (26) |
adversarial signal processing (9) | ANC (3) | anonymous communications (1) |
antenna arrays (1) | Antennas (1) | Approximation methods (1) |
Attenuation (1) | audio (1) | authentication (1) |
Autocorrelation (1) | autoregressive modeling (1) | autoregressive processes (1) |
avoidance (1) | B-frames (1) | band-pass filters (1) |
Bandlimited signals. (1) | bar-codes (1) | basis expansion model (1) |
basis function approximations (1) | benford (2) | benford's-law (2) |
biometrics (1) | bit loading (1) | Blind Adaptation (1) |
blind equalization (2) | Blind estimation (1) | blind identification (1) |
blind input estimation (1) | blind phase estimation (1) | BOWS (1) |
Broadcast (1) | broadcasting (1) | burst (3) |
calibration (1) | calibration errors (1) | camera attribution forensic analyzer (1) |
cameras (1) | Capacity (1) | carrier offset (1) |
Carrier offset estimation (1) | channel coefficient (1) | channel Doppler spectrum (1) |
channel equalization (2) | channel estimation (2) | channel estimator (2) |
channel shortener (1) | Channel shortening (1) | channel state information in the transmitter (1) |
channel variations (1) | cloud (3) | cognitive radio (48) |
coherence spectrum (1) | collusion (2) | collusion channel (1) |
compass (67) | compressed sensing (9) | compressive sampling (2) |
computational complexity (3) | connectivity graph (1) | Constant Magnitude (1) |
constant modulus (3) | control (1) | correlated sources (3) |
Correlation (1) | Cramér-Rao bound (CRB) (2) | Cramer-Rao lower bound (1) |
cross-QAM constellations (1) | cryptography (3) | CSIT (1) |
cyclic prefix (1) | cyclostationarity (2) | data compression (1) |
data hiding (4) | data-hiding (80) | DCT (1) |
decision feedback equalization (1) | decoupled parameters (1) | Deep Learning (2) |
defacto standard (1) | delay spread (1) | design methodology (1) |
desynchronization (1) | detection diversity (1) | Digital Communications (33) |
digital data protection (1) | digital image forensics (1) | digital media forensics (1) |
digital photo (1) | Digital Television (2) | dirty paper (2) |
dirty paper coding (1) | disclosure attacks (1) | discrete cosine transform (2) |
discrete cosine transforms (2) | Distortion Optimization (1) | distributed estimation (3) |
distributed local Kalman filtering (1) | distributed source coding (1) | distributed tracking (1) |
distributed tracking with consensus (1) | dither modulation (1) | DNA (1) |
DOA estimation (1) | Document image (1) | Doppler effect (1) |
Doppler frequencies (1) | double compression detection (2) | Doubly stochastic model (1) |
DS-SS (1) | DSL (2) | Dual lattice (1) |
dummies (1) | DVB (1) | DVB-S (3) |
dynacs (62) | dynamic spectrum access (2) | dynamic spectrum leasing (2) |
dynamic spectrum sharing (1) | Effective SNR (2) | Effective SNR metrics (1) |
EM (2) | empirical characterization (1) | encrypted domain (1) |
energy detector (1) | equalization (19) | equation error (1) |
error statistics (2) | estimation (1) | Expectation-Maximization (1) |
expectation-maximization algorithm (1) | exponential matrix (1) | face verification (1) |
face-recognition (1) | fading channels (1) | false negative probabilities (2) |
false positive probabilities (2) | fast fading channels (1) | fast-fading channel (1) |
FER prediction (1) | filter bank (1) | filtering (1) |
Fingerprinting (1) | fingerprints (2) | fixed point implementation (1) |
forensics (2) | forensics investigators (1) | frame error rate (1) |
frequency division multiple access (2) | Frequency estimation (2) | Frequency estimator (1) |
Fridrich-Goljan self-embedding authentication method (2) | full duplex (13) | full-duplex (9) |
FuRLMS (1) | Gabor (1) | Gabor coefficients (1) |
gain estimation (1) | game theory (2) | generalized Gaussian (2) |
generalized likelihood ratio (1) | generalized likelihood ratio test (1) | generalized likelihood ratio test (GLRT) (1) |
Generalized Spatial Modulation (1) | Genomic Privacy (1) | GOP size estimation (2) |
graph topology (1) | Hadamard ratio (1) | hash bit errors (2) |
hidden services (2) | Hierarchical OFDM (2) | higher-order statistics (2) |
homomorphic encryption (3) | homomorphic encryption systems (1) | homomorphic processing (2) |
hybrid beamforming (1) | Hybrid Terrestrial- Satellite (1) | hypothesis testing (1) |
IIR (3) | IIR notchfilter (1) | image authentication method (2) |
Image block-variance (1) | image coding (3) | Image Denoising (1) |
Image Encryption (1) | Image forensics (4) | image sensors (1) |
image source identification (1) | imperfect channel prediction information (1) | Index Modulation (1) |
Index Modulations (1) | information theory (2) | interpolation (5) |
Invariant features (1) | inversion (1) | iterative decoding (1) |
iterative equalization (1) | iterative protocol (1) | JPEG compression (1) |
Kalman filter (1) | Kalman filters (2) | keyless security (1) |
Kruskal rank (1) | L-Band (1) | Laguerre systems (1) |
large-scale analysis (1) | Lattice (1) | lattice cryptography (4) |
lattice estimation (1) | lattice filters (7) | Lattice-Based Cryptography (2) |
lattice-based cryptosystems (1) | least mean squares algorithm (1) | least mean squares methods (1) |
Least squares (1) | linear algebra (1) | linear filtering (1) |
linear minimum mean square error receivers (1) | link adaptation (8) | log normal distribution (1) |
Log-stable distribution (1) | Logarithmic watermarking (1) | Lognormal distribution (1) |
lognormal shadowing (1) | low complexity estimator (1) | low-complexity channel prediction (1) |
low-complexity channel predictor (1) | low-complexity video coding (1) | LPTV (1) |
Machine Learning (5) | Magnitude (1) | Massive MIMO (1) |
matrix algebra (1) | message authentication (2) | MFNN (1) |
microphone arrays (4) | MIMO-OFDM (1) | ML (2) |
mmWave (28) | mobile communications (1) | mobile OFDMA (1) |
mobile radio (2) | mobile satellite (1) | mobile stations (2) |
mobile wireless channels (1) | Model-based (1) | modem (1) |
Moments-based estimation (1) | MPEG-2 (1) | multi-beam satellite (1) |
multiantenna detection (1) | multiantenna sensors (1) | multiaxial vibration (1) |
multiband sparse signal (1) | multibeam satellites (2) | multibeam satellites. (1) |
multicarrier communications (1) | multichannel (1) | Multicoset sampling (1) |
Multidimensional Signal Processing (1) | Multilayer Feedforward Neural Network (1) | multimedia forensics (1) |
Multimedia security (7) | multimodulus (1) | Multiobjective evolutionary algorithms (1) |
multiparty computation (1) | multiple-channel signal detection (1) | multirate sampling (1) |
multirate systems (1) | Multiuser detection (3) | Multiuser MIMO-OFDM (1) |
Mutual Information (1) | myrada (4) | narrow-band filters (1) |
nearly-flat spectral characteristics (1) | network theory (graphs) (1) | neural networks (2) |
Neyman-Pearson (1) | Node localization (1) | noisy communications links (1) |
noisy estimation (1) | noisy time-varying graphs (1) | Non-uniformly spaced arrays (1) |
non-white Gaussian hosts (1) | nonlinear channels (7) | nonlinear filters (1) |
nonstationary processes (3) | Number Theoretic Transforms (1) | OFDM (1) |
OFDM modulation (3) | OFDM systems (1) | OFDMA downlink (1) |
oracle (1) | order overestimation (1) | orthogonal frequency division multiple access (1) |
orthogonal frequency division multiple access downlink (1) | Overlay (1) | oversampling (1) |
passband filters (1) | Perceptually shaped watermarks (1) | perfect channel state information (1) |
performance analysis (3) | Performance evaluation (1) | perspective distortion correction (1) |
phase estimation (2) | photo response nonuniformity (1) | Photoresponse Non-Uniformity (1) |
PHY abstraction (1) | PLC (4) | PLL (3) |
Polarized Modulation (2) | polyphase filters (1) | power control (1) |
precoding (4) | prediction error (1) | prediction error characterization (1) |
prediction error filters (3) | prediction residue analysis (1) | prediction-based RA strategies (1) |
prediction-based resource allocation (1) | prediction-based resource allocation algorithm (1) | prefiltering (1) |
print-&-scan (1) | privacy (10) | Privacy Protection (1) |
PRNU compression (1) | probability (1) | projection matrices (1) |
PSK modulation (1) | public image dataset (1) | Quantization (1) |
radio transmitters (1) | Rain (1) | rain fading (1) |
random vibration (3) | Range measurements (1) | Rare event (1) |
rate distortion optimization (1) | rational dither modulation (1) | Rayleigh (3) |
Rayleigh fading (1) | Real sinusoid (1) | recursive formulation (1) |
region duplication (1) | relay (1) | resampling detection (2) |
resampling estimation (1) | resampling factor estimation (1) | return link (1) |
Rice (2) | Ricean fading (1) | rights management (1) |
robust (8) | robust hashing (2) | rodin (10) |
RPHD estimator (1) | SAM (1) | satcom (27) |
satellite communications (11) | Satellite OFDM (1) | Satellites (1) |
SDR (1) | second-order statistics (12) | secure adaptive filtering (1) |
Secure Embedding (1) | Secure Signal Processing (2) | security (24) |
sensitivity (4) | sensor network (3) | SIFT (1) |
signal privacy preservation (1) | Signal Processing in the Encrypted Domain (1) | signal shaping (1) |
Signal to noise ratio (2) | Signal-to-noise ratio (SNR) (1) | silicon sensor imperfections (1) |
Single Frequency Network (3) | Single sinusoid (1) | Sinusoid detection (1) |
Slepian-Wolf coding (1) | SNR (2) | SNR estimation (3) |
Somewhat Homomorphic Encryption (1) | Space-Time Coding (1) | Spatial Modulation (3) |
spatial transformation (1) | specific camera sensor (1) | Spectral estimation (1) |
spectrum sensing (16) | spectrum shaping (13) | SPED (5) |
SPED techniques (1) | speed estimation (4) | SPR (13) |
stability (3) | staggered modulation (1) | Statistical Model (1) |
steady-state Kalman filter (1) | Steganalysis (1) | steganography (1) |
Stochastic optimization (1) | strengthened (1) | subband adaptive filters (1) |
sum-of-sinusoids channel predictors (1) | superimposed pilots (1) | SVD (1) |
symbol rate (1) | synchronization (7) | system identification (15) |
systems of linear equations (1) | tampering detection (1) | Tardos (2) |
Tardos code (2) | telecommunication links (1) | telecommunication network topology (1) |
Terrestrial (2) | time domain equalizer (1) | time-varying channels (3) |
time-varying network topology (1) | time-varying secondary system (1) | time-varying systems (1) |
timestamps (2) | timing channel (2) | Tomlinson-Harashima precoding (1) |
tor network (2) | traffic monitoring (4) | training symbols (1) |
Traitor tracing (4) | Two-dimensional-modulations (1) | unit-norm (1) |
universal pattern (1) | vehicular communications (1) | vibration synthesis (1) |
video forensics (2) | videosurveillance (1) | visible-encryption (2) |
watermark detection (1) | watermark embedding (1) | watermarking (110) |
weak multiplicative noise (1) | Weber's law (1) | winter (28) |
wireless channel (1) | wireless channels (1) | wireless medium (1) |
Wireless Microphones (1) | wireless multimedia sensor networks (1) | Witsenhausen's counterexample (1) |
wsn (25) | zero-knowledge (3) | |