|
2-D-Bar-Codes (1) | 5G (2) | 5G mobile communication (2) |
access control (1) | ACM (1) | Acoustic distortion (1) |
acquisition time (1) | ad hoc detectors (1) | Ad hoc networks (1) |
Adaptation models (1) | adaptive (1) | adaptive coding and modulation (1) |
Adaptive Communications (1) | adaptive filtering (1) | adaptive IIR filters (16) |
adaptive processing (1) | adaptive signal processing (26) | adversarial signal processing (9) |
analogue-digital conversio (1) | Analytical models (1) | ANC (3) |
anonymous communications (1) | antenna arrays (2) | Antennas (1) |
Approximation methods (1) | Artificial Intelligence (1) | Artificial neural networks (1) |
Attenuation (1) | audio (1) | authentication (1) |
Autocorrelation (1) | autoregressive modeling (1) | autoregressive processes (1) |
avoidance (1) | B-frames (1) | band-pass filters (1) |
Bandlimited signals. (1) | Bandwidth (1) | bandwidth scaling limit (1) |
bar-codes (1) | basis expansion model (1) | basis function approximations (1) |
benford (2) | benford's-law (2) | biometrics (1) |
bit loading (1) | black-box (1) | Blind Adaptation (1) |
blind equalization (2) | Blind estimation (1) | blind identification (1) |
blind input estimation (1) | blind phase estimation (1) | BOWS (1) |
Broadcast (1) | broadcasting (1) | burst (3) |
calibration (1) | calibration errors (1) | Camera Attribution (1) |
camera attribution forensic analyzer (1) | Camera Source Identification (1) | cameras (3) |
Capacity (1) | capacity scaling laws (1) | carrier offset (1) |
Carrier offset estimation (1) | Cellular networks (1) | cellular radio (1) |
channel coefficient (1) | channel Doppler spectrum (1) | channel equalization (2) |
channel estimation (2) | channel estimator (2) | channel shortener (1) |
Channel shortening (1) | channel state information in the transmitter (1) | channel variations (1) |
Closed box (1) | cloud (3) | Codes (2) |
cognitive radio (48) | coherence spectrum (1) | collusion (2) |
collusion channel (1) | compass (67) | compressed sensing (9) |
compressive sampling (2) | computational complexity (3) | connectivity graph (1) |
Constant Magnitude (1) | constant modulus (3) | control (1) |
Convolutional Neural Networks (1) | cooperative communication (1) | correlated sources (3) |
Correlation (1) | Cramér-Rao bound (CRB) (2) | Cramer-Rao lower bound (1) |
cross-QAM constellations (1) | cryptography (3) | CSIT (1) |
cyclic prefix (1) | cyclostationarity (2) | data compression (1) |
data hiding (4) | Data security (1) | data-hiding (80) |
DCT (1) | decision feedback equalization (1) | decoupled parameters (1) |
Deep Learning (3) | defacto standard (1) | Degradation (1) |
delay spread (1) | design methodology (1) | desynchronization (1) |
detection diversity (1) | Digital Communications (33) | digital data protection (1) |
digital image forensics (1) | digital media forensics (1) | digital photo (1) |
Digital Television (2) | dirty paper (2) | dirty paper coding (1) |
disclosure attacks (1) | discrete cosine transform (2) | discrete cosine transforms (2) |
Distortion (1) | distortion correction (1) | Distortion Optimization (1) |
distributed estimation (3) | distributed local Kalman filtering (1) | distributed source coding (1) |
distributed tracking (1) | distributed tracking with consensus (1) | dither modulation (1) |
DNA (1) | DNN watermarking (1) | DOA estimation (1) |
Document image (1) | Doppler effect (1) | Doppler frequencies (1) |
double compression detection (2) | Double JPEG compression (1) | Doubly stochastic model (1) |
DS-SS (1) | DSL (2) | Dual lattice (1) |
dummies (1) | DVB (1) | DVB-S (3) |
dynacs (62) | dynamic spectrum access (2) | dynamic spectrum leasing (2) |
dynamic spectrum sharing (1) | Effective SNR (2) | Effective SNR metrics (1) |
EM (2) | empirical characterization (1) | encrypted domain (1) |
energy detector (1) | equalization (19) | equation error (1) |
error statistics (2) | estimation (3) | Europe (1) |
Expectation-Maximization (1) | expectation-maximization algorithm (1) | exponential matrix (1) |
face verification (1) | face-recognition (1) | fading channels (1) |
false negative probabilities (2) | false positive probabilities (2) | fast fading channels (1) |
fast-fading channel (1) | FER prediction (1) | filter bank (1) |
filtering (1) | Fingerprint (1) | Fingerprint recognition (2) |
Fingerprinting (2) | fingerprints (2) | fixed point implementation (1) |
forensics (8) | forensics investigators (1) | frame error rate (1) |
frequency division multiple access (2) | Frequency estimation (2) | Frequency estimator (1) |
Fridrich-Goljan self-embedding authentication method (2) | full duplex (14) | full-duplex (10) |
FuRLMS (1) | Gabor (1) | Gabor coefficients (1) |
gain estimation (1) | game theory (2) | generalized Gaussian (2) |
generalized likelihood ratio (1) | generalized likelihood ratio test (1) | generalized likelihood ratio test (GLRT) (1) |
Generalized Spatial Modulation (1) | Genomic Privacy (1) | GOP size estimation (2) |
GPU (2) | graph topology (1) | Graphics processing units (2) |
Hadamard ratio (1) | hash bit errors (2) | hidden services (2) |
Hierarchical OFDM (2) | higher-order statistics (2) | History (1) |
homomorphic encryption (3) | homomorphic encryption systems (1) | homomorphic processing (2) |
hybrid beamforming (1) | Hybrid Terrestrial- Satellite (1) | hypothesis testing (1) |
IIR (3) | IIR notchfilter (1) | image authentication method (2) |
Image block-variance (1) | image coding (3) | Image Denoising (1) |
Image Encryption (1) | Image forensics (6) | Image processing (1) |
image sensors (1) | image source identification (1) | imperfect channel prediction information (1) |
Index Modulation (1) | Index Modulations (1) | Information processing (1) |
Information security (1) | information theory (3) | Intellectual property (1) |
interpolation (6) | Invariant features (1) | inversion (1) |
iterative decoding (1) | iterative equalization (1) | iterative protocol (1) |
JPEG compression (1) | Kalman filter (1) | Kalman filters (2) |
keyless security (1) | Kruskal rank (1) | L-Band (1) |
Laguerre systems (1) | large-scale analysis (1) | Lattice (1) |
lattice cryptography (4) | lattice estimation (1) | lattice filters (7) |
Lattice-Based Cryptography (2) | lattice-based cryptosystems (1) | Leakage (1) |
least mean squares algorithm (1) | least mean squares methods (1) | Least squares (1) |
Lenses (1) | linear algebra (1) | linear filtering (1) |
linear minimum mean square error receivers (1) | link adaptation (8) | log normal distribution (1) |
Log-stable distribution (1) | Logarithmic watermarking (1) | Lognormal distribution (1) |
lognormal shadowing (1) | low complexity estimator (1) | low-complexity channel prediction (1) |
low-complexity channel predictor (1) | low-complexity video coding (1) | LPTV (1) |
MAC scheduling (1) | Machine Learning (6) | Magnitude (1) |
Massive MIMO (1) | matrix algebra (1) | mayte (4) |
Membership inference (1) | message authentication (2) | MFNN (1) |
microphone arrays (4) | millimeter wave bands (1) | millimetre wave antenna arrays (1) |
millimetre wave communication (1) | MIMO-OFDM (1) | ML (2) |
mmWave (31) | mobile communications (1) | mobile OFDMA (1) |
mobile radio (2) | mobile satellite (1) | mobile stations (2) |
mobile wireless channels (1) | Model-based (1) | modem (1) |
Moments-based estimation (1) | MPEG-2 (1) | multi-beam satellite (1) |
multiantenna detection (1) | multiantenna sensors (1) | multiaxial vibration (1) |
multiband sparse signal (1) | multibeam satellites (2) | multibeam satellites. (1) |
multicarrier communications (3) | multichannel (1) | Multicoset sampling (1) |
Multidimensional Signal Processing (1) | multihop protocol (1) | Multilayer Feedforward Neural Network (1) |
multimedia forensics (1) | Multimedia security (7) | multimodulus (1) |
Multiobjective evolutionary algorithms (1) | multiparty computation (1) | multiple-channel signal detection (1) |
multirate sampling (1) | multirate systems (1) | Multiuser detection (3) |
Multiuser MIMO-OFDM (1) | Mutual Information (1) | myrada (4) |
narrow-band filters (1) | nearly-flat spectral characteristics (1) | network theory (graphs) (1) |
neural networks (2) | next generation networks (1) | next-generation cellular networks (1) |
Neyman-Pearson (1) | Node localization (1) | noisy communications links (1) |
noisy estimation (1) | noisy time-varying graphs (1) | Non-uniformly spaced arrays (1) |
non-white Gaussian hosts (1) | nonlinear channels (7) | nonlinear filters (1) |
nonstationary processes (3) | ns-3 simulator (1) | Number Theoretic Transforms (1) |
OFDM (2) | OFDM modulation (3) | OFDM systems (1) |
OFDMA downlink (1) | Optimization (1) | oracle (1) |
order overestimation (1) | orthogonal frequency division multiple access (1) | orthogonal frequency division multiple access downlink (1) |
OTFS (1) | Overlay (1) | oversampling (1) |
passband filters (1) | PCE (1) | Perceptually shaped watermarks (1) |
perfect channel state information (1) | performance analysis (3) | Performance evaluation (1) |
perspective distortion correction (1) | phase estimation (2) | photo response non-uniformity (1) |
photo response nonuniformity (1) | Photoresponse Non-Uniformity (1) | PHY abstraction (1) |
PLC (4) | PLL (3) | Polarized Modulation (2) |
polyphase filters (1) | power control (1) | precoding (4) |
prediction error (1) | prediction error characterization (1) | prediction error filters (3) |
prediction residue analysis (1) | prediction-based RA strategies (1) | prediction-based resource allocation (1) |
prediction-based resource allocation algorithm (1) | prefiltering (1) | print-&-scan (1) |
privacy (12) | Privacy Protection (1) | PRNU (4) |
PRNU compression (1) | probability (1) | projection matrices (1) |
protocols (1) | PSK modulation (1) | public image dataset (1) |
Quantization (1) | radial correction (1) | Radial Distortion Correction (1) |
radio maps (1) | radio spectrum management (1) | radio transmitters (1) |
Rain (1) | rain fading (1) | random vibration (3) |
Range measurements (1) | Rare event (1) | rate distortion optimization (1) |
rational dither modulation (1) | Rayleigh (3) | Rayleigh fading (1) |
Real sinusoid (1) | recursive formulation (1) | region duplication (1) |
Reinforcement learning (1) | relay (1) | relay networks (telecommunication) (1) |
Reliability (1) | resampling detection (2) | resampling estimation (1) |
resampling factor estimation (1) | Resource management (1) | return link (1) |
Rice (2) | Ricean fading (1) | rights management (1) |
robust (8) | robust hashing (2) | rodin (12) |
RPHD estimator (1) | SAM (1) | satcom (27) |
satellite communications (11) | Satellite OFDM (1) | Satellites (1) |
Scheduling algorithms (1) | SDR (1) | second-order statistics (12) |
secure adaptive filtering (1) | Secure Embedding (1) | Secure Signal Processing (2) |
security (24) | sensitivity (4) | sensor network (3) |
SIFT (2) | signal privacy preservation (1) | Signal processing (2) |
Signal Processing in the Encrypted Domain (1) | signal shaping (1) | Signal to noise ratio (2) |
Signal-to-noise ratio (SNR) (1) | silicon sensor imperfections (1) | Single Frequency Network (3) |
Single sinusoid (1) | Sinusoid detection (1) | Slepian-Wolf coding (1) |
Smart phones (1) | SNR (2) | SNR estimation (3) |
Software (1) | Somewhat Homomorphic Encryption (1) | Source heterogeneity (1) |
source attribution (1) | Space-Time Coding (1) | Spatial Modulation (3) |
spatial transformation (1) | specific camera sensor (1) | Spectral estimation (1) |
spectrum sensing (16) | spectrum shaping (16) | SPED (5) |
SPED techniques (1) | speed estimation (4) | SPR (13) |
stability (3) | staggered modulation (1) | Statistical Model (1) |
steady-state Kalman filter (1) | Steganalysis (1) | steganography (1) |
Stochastic optimization (1) | strengthened (1) | subband adaptive filters (1) |
sum-of-sinusoids channel predictors (1) | superimposed pilots (1) | Surveillance (1) |
SVD (1) | symbol rate (1) | synchronization (7) |
system identification (15) | systems of linear equations (1) | tampering detection (1) |
Tardos (2) | Tardos code (2) | Tardos codes (1) |
Task analysis (1) | telecommunication links (1) | telecommunication network topology (1) |
Terrestrial (2) | time domain equalizer (1) | time-varying channels (3) |
time-varying network topology (1) | time-varying secondary system (1) | time-varying systems (1) |
timestamps (2) | timing channel (2) | Tomlinson-Harashima precoding (1) |
tor network (2) | traffic monitoring (4) | Training (1) |
training symbols (1) | Traitor tracing (5) | Two-dimensional-modulations (1) |
unit-norm (1) | universal pattern (1) | vehicular communications (1) |
vibration synthesis (1) | video forensics (2) | Video Source Identification (1) |
Video Stabilization (1) | videosurveillance (1) | visible-encryption (2) |
Visualization (1) | watermark detection (1) | watermark embedding (1) |
watermarking (111) | weak multiplicative noise (1) | Weber's law (1) |
white-box (1) | Wideband regime (1) | winter (28) |
wireless channel (1) | wireless channels (1) | Wireless communication (1) |
wireless medium (1) | Wireless Microphones (1) | wireless multimedia sensor networks (1) |
Witsenhausen's counterexample (1) | wsn (25) | zero-knowledge (3) |