Abstract is missing.
- Exact Three-Dimensional Estimation in Blind Super-Resolution via Convex OptimizationMohamed A. Suliman, Wei Dai. 1-9 [doi]
- Integrating Volterra Series Model and Deep Neural Networks to Equalize Nonlinear Power AmplifiersRobert J. Thompson, Xiaohua Li. 1-6 [doi]
- Physical Layer Authentication via Fingerprint Embedding: Min-Entropy Analysis : Invited PresentationJake Bailey Perazzone, Paul L. Yu, Brian M. Sadler, Rick S. Blum. 1-6 [doi]
- Adaptive Beamforming for Multiple-Access Millimeter Wave Communications : Invited PresentationPeter O. Taiwo, Arlene A. Cole-Rhodes. 1-6 [doi]
- Channel Coding Optimization for Visually Pleasant QR Codes : Invited PresentationKarelia Pena-Pena, Gonzalo R. Arce. 1-4 [doi]
- Secure Key Generation for Distributed Inference in IoT Invited PresentationHenri Hentila, Visa Koivunen, H. Vincent Poor, Rick S. Blum. 1-6 [doi]
- On Problem Formulation, Efficient Modeling and Deep Neural Networks for High-Quality Ultrasound Imaging : Invited PresentationDimitris Perdios, Adrien Besson, Florian Martinez, Manuel Vonlanthen, Marcel Arditi, Jean-Philippe Thiran. 1-4 [doi]
- Topology Attack Detection in Natural Gas Delivery NetworksZisheng Wang, Rick S. Blum. 1-6 [doi]
- Anytime Minibatch with Stale Gradients : (Invited Paper)Haider Al-Lawati, Nuwan S. Ferdinand, Stark C. Draper. 1-5 [doi]
- Analysis of Wireless Signature Feature Sets for Commercial IoT Devices : Invited PresentationAsia Mason, Michel Reece, Gian Claude, Willie L. Thompson, Kevin Kornegay. 1-4 [doi]
- An Online Algorithm for Data Center Demand ResponseShahab Bahrami, Yu Christine Chen, Vincent W. S. Wong. 1-6 [doi]
- Energy Efficient Cellular Network User Clustering Using Linear Radius AlgorithmHailu Belay Kassa, Kevin Kornegay, Ebrima N. Ceesay. 1-5 [doi]
- Bacteria Nano Communications Described by a Machine Learning Theory Based on the Feynman Path IntegralHuber Nieto-Chaupis. 1-4 [doi]
- Exponential Error Bounds and Decoding Complexity for Block Codes Constructed by Unit Memory Trellis Codes of Branch Length TwoShigeichi Hirasawa, Hideki Yagi, Manabu Kobayashi, Masao Kasahara. 1-6 [doi]
- An efficient deep learning model for intrusion classification and prediction in 5G and IoT networksShahadate Rezvy, Yuan Luo, Miltos Petridis, Aboubaker Lasebae, Tahmina Zebin. 1-6 [doi]
- Blind estimation of wireless network topology and throughputDaniel Salmond. 1-6 [doi]
- Phase noise analysis for mmwave massive MIMO: a design framework for scaling via tiled architecturesMaryam Eslami Rasekh, Mohammed Abdelghany, Upamanyu Madhow, Mark J. W. Rodwell. 1-6 [doi]
- On the problem of weight factors and functions in fusion applicationsK. Bendjilali, Fethi Belkhouche. 1-6 [doi]
- Motion correction for fetal functional magnetic resonance imagingDustin Scheinost. 1 [doi]
- Classification of XSS Attacks by Machine Learning with Frequency of Appearance and Co-occurrenceSota Akaishi, Ryuya Uda. 1-6 [doi]
- Disjoint Subspaces for Common and Distinct Component Analysis: Application to Task FMRI DataMohammad A. B. S. Akhonda, Qunfang Long, Suchita Bhinge, Vince D. Calhoun, Tülay Adali. 1-6 [doi]
- An intuitive and most efficient Ll-norm principal component analysis algorithm for big dataXiaowei Song. 1-4 [doi]
- Design of a Ground Sampling Distance Graphical User Interface for an Unmanned Aerial Vehicle SystemAndy S. Peng, Ahmet Turkmen, Brian Eickhoff, Mark Finta, Paul Gerads. 1-6 [doi]
- Capacity of Gaussian Arbitrarily-Varying Fading ChannelsFatemeh Hosseinigoki, Oliver Kosut. 1-6 [doi]
- Formalisms of Quantization in High Intensity Fields: Quantum Mechanics Meets Classical ElectrodynamicsHuber Nieto-Chaupis. 1-4 [doi]
- Minimax Lower Bound of k-Monotone Estimation in the Sup-normTeresa M. Lebair, Jinglai Shen. 1-6 [doi]
- The Impact of Aggregating Distributed Energy Resources on Electricity Market EfficiencyKhaled Alshehri, Mariola Ndrio, Subhonmesh Bose, Tamer Basar. 1-6 [doi]
- On the Sum-capacity of Compound MAC Models with Distributed CSI and Unknown Fading StatisticsDebarnab Mitra, Himanshu Asnani, Sibi B. Raj Pillai. 1-6 [doi]
- Business-to-Peer Carsharing Systems with Electric VehiclesTheodoros Mamalis, Subhonmesh Bose, Lav R. Varshney. 1-6 [doi]
- Smoothed First-order Algorithms for Expectation-valued Constrained ProblemsAfrooz Jalilzadeh, Uday V. Shanbhag. 1 [doi]
- Piano Practice Evaluation and Visualization by HMM for Arbitrary Jumps and MistakesMatsuto Hori, Christoph M. Wilk, Shigeki Sagayama. 1-5 [doi]
- Optimal Sensor Placement for Topology Identification in Smart Power GridsAnanth Narayan Samudrala, M. Hadi Amini, Soummya Kar, Rick S. Blum. 1-6 [doi]
- A Simplicial Piecewise Linear Approach for Efficient Hardware Realization of Neural Networks : (Invited Presentation)Nicolas Rodriguez, Pedro Julián, Eduardo Paolini. 1-3 [doi]
- A Note on the Limiting Properties of the Extended Kalman Filter's Estimates : Invited PresentationCarsten H. Botts. 1-6 [doi]
- Protograph-Based LDPC Code Design for Probabilistic Shaping with On-Off KeyingAlexandru Dominic Git, Balázs Matuz, Fabian Steiner. 1-6 [doi]
- On the Spectrum Sensing, Beam Selection and Power Allocation in Cognitive Radio Networks Using Reconfigurable AntennasHassan Yazdani, Azadeh Vosoughi. 1-7 [doi]
- GAN Augmented Text Anomaly Detection with Sequences of Deep StatisticsMariem Ben Fadhel, Kofi Nyarko. 1-5 [doi]
- Optimal placement of inertia and primary control in high voltage power gridsPhilippe Jacquod, Laurent Pagnier. 1-6 [doi]
- Socio-Emotional Robot with Distributed Multi-Platform Neuromorphic Processing : (Invited Presentation)Kate D. Fischl, Adam B. Cellon, Terrence C. Stewart, Timothy K. Horiuchi, Andreas G. Andreou. 1-6 [doi]
- A Prospect Theoretical Extension of a Communication Game Under JammingAndrey Garnaev, Wade Trappe. 1-6 [doi]
- Characterization and Design of Generalized Convolutional Neural NetworkPan Zhong, Zhengdao Wang. 1-6 [doi]
- Improving Short-Length LDPC Codes with a CRC and Iterative Ordered Statistic Decoding : (Invited Paper)Wei Zhou, Michael Lentmaier. 1-6 [doi]
- Online Linear Programming with Uncertain Constraints : (Invited Paper)Lin Yang, Mohammad Hassan Hajiesmaili, Wing Shing Wong. 1-6 [doi]
- Optimization of Cyber System Survivability Under Attacks Using Redundancy of ComponentsQasem Abu Al-Haija, Swastik Brahma. 1-6 [doi]
- Automatic Piano Reduction of Orchestral Music Based on Musical EntropyYou Li, Christoph M. Wilk, Takeshi Hori, Shigeki Sagayama. 1-5 [doi]
- Reducing Sampling Ratios and Increasing Number of Estimates Improve Bagging in Sparse RegressionLuoluo Liu, Sang Peter Chin, Trac D. Tran. 1-5 [doi]
- Design of Eigenportfolios for US Equities Using Exponential Correlation ModelAli N. Akansu, Anqi Xiong. 1-5 [doi]
- A Noncoherent Space-Time Code from Quantum Error CorrectionS. Andrew Lanham, Travis C. Cuvelier, Corey I. Ostrove, Brian R. La Cour, Granville E. Ott, Robert W. Heath Jr.. 1-6 [doi]
- Disturbance Observers for Nonlinear MIMO Systems- An Alternative Design ApproachSudeshna Dasgupta, Smita Sadhu, Tapan Kumar Ghoshal. 1-6 [doi]
- Figure-ground representation in deep neural networksBrian Hu, Salman Khan, Ernst Niebur, Bryan P. Tripp. 1-6 [doi]
- Super-Resolution for Practical Automated Plant Disease Diagnosis SystemQuan Huu Cap, Hiroki Tani, Hiroyuki Uga, Satoshi Kagiwada, Hitoshi Iyatomi. 1-6 [doi]
- The Largest Critical Sets of Latin SquaresKeith Hermiston. 1-6 [doi]
- Length-Compatible Polar Codes: A Survey : (Invited Paper)Thibaud Tonnellier, Adam Cavatassi, Warren J. Gross. 1-6 [doi]
- Asymptotic Limits of Privacy in Bayesian Time Series MatchingNazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik. 1-6 [doi]
- Autism Spectrum Disorder Discrimination Based on Voice Activities Related to Fillers and LaughterDaiki Mitsumoto, Takeshi Hori, Shigeki Sagayama, Hidenori Yamasue, Keiho Owada, Masaki Kojima, Keiko Ochi, Nobutaka Ono. 1-6 [doi]
- On flattening of symmetric tensors and identification of latent factorsAli Koochakzadeh, Piya Pal. 1-2 [doi]
- Discrete-time Chen Series for Time Discretization and Machine LearningW. Steven Gray, G. S. Venkatesh, Luis A. Duffaut Espinosa. 1-6 [doi]
- Non-Linear Rate Compatible Modulation : Invited PresentationMariano Eduardo Burich, Richard Demo Souza, Javier Garcia-Frías. 1-5 [doi]
- Controlling spectral selectivity in optoelectronics via photonic band engineering in absorbing mediaBotong Qiu, Yida Lin, Ebuka S. Arinze, Arlene Chiu, Lulin Li, Susanna M. Thon. 1-5 [doi]
- Information theory and signal processing methodology to identify nucleic acid-protein binding sequences in RNA-protein interactionsHarry Shaw, Nagarajan Pattabiraman, Deborah Preston, Tatiana Ammosova, Yuri Obukhov, Sergei Nekhai, Ajit Kumar. 1-6 [doi]
- Online optimization in the Non-Stationary Cloud: Change Point Detection for Resource Provisioning (Invited Paper)Jessica Maghakian, Joshua Comden, Zhenhua Liu. 1-6 [doi]
- Empirical Bounds on the Rate of Secret Bits Extracted from Received Signal StrengthSima Azizi, Arash Komaee. 1-6 [doi]
- Security Assessment of Blockchains in Heterogenous IoT Networks : Invited PresentationJay Jemal, Kevin T. Kornegay. 1-4 [doi]
- Securing PKES against Relay Attacks using Coordinate Tracing and Multi-Factor AuthenticationSyed Rizvi, Jarrett Imler, Luke Ritchey, Michael Tokar. 1-6 [doi]
- Construction and Analysis for Minimum Storage Regenerating Codes Based Parity-Check Matrices : Invited PresentationLiyuan Song, Qin Huang, Jiayi Rui. 1-6 [doi]
- The Feynman-Kac Formula to Estimate the Very Beginning of the Diabetic NephropathyHuber Nieto-Chaupis. 1-4 [doi]
- Spatially Coupled LDPC Codes and the Multiple Access ChannelSebastian Cammerer, Xiaojie Wang, Yingyan Ma, Stephan ten Brink. 1-6 [doi]
- Uncertainty-Aware optimization for Network Provisioning and RoutingYingjie Bi, Ao Tang. 1-6 [doi]
- A Comparison of the Finite Difference and Simultaneous Perturbation Gradient Estimation Methods with Noisy Function EvaluationsAdam Blakney, Jingyi Zhu. 1-6 [doi]
- Worst-Case Latency Performance Of Load Balancing Through Distributed Waterfilling AlgorithmJiangnan Cheng, Shih-Hao Tseng, Ao Tang. 1-6 [doi]
- Binary Message Passing Decoding of Product Codes Based on Generalized Minimum Distance Decoding : (Invited Paper)Alireza Sheikh, Alexandre Graell i Amat, Gianluigi Liva. 1-5 [doi]
- Combatting Adversarial Attacks through Denoising and Dimensionality Reduction: A Cascaded Autoencoder ApproachRajeev Sahay, Rehana Mahfuz, Aly El Gamal. 1-6 [doi]
- Tail-Limited Phase-Type Burstiness Bounds for Network TrafficMassieh Kordi Boroujeny, Brian L. Mark, Yariv Ephraim. 1-6 [doi]
- On the Randomness Cost of Linear Secure Computation : (Invited Presentation)Yanliang Zhou, Hua Sun, Shengli Fu. 1-6 [doi]
- Statistical QoS-Driven Energy-Efficiency optimization for URLLC Over 5G Mobile Wireless Networks in the Finite Blocklength RegimeXi Zhang 0005, Jingqing Wang, H. Vincent Poor. 1-6 [doi]
- Petri Net Approach for Estimation the Information Systems Security Level in Any Logic EnvironmentHein Tun, Sergey Lupin, Ko Ko Oo, Myat Min Oo. 1-6 [doi]
- MU-MIMO and CSI Feedback Performance of NR/LTEBishwarup Mondal, Victor Sergeev, Avik Sengupta, Gregory Ermolaev, Alexei Davydov, Eddy Kwon, Seunghee Han, Apostolos Papathanassiou. 1-6 [doi]
- An Online Learning Multi-path Selection Framework for Multi-path Transmission ProtocolsKechao Cai, John C. S. Lui. 1-2 [doi]
- Multilevel Storage Cell Characterization and Behavior Modeling of a Crossbar Computational Array in ESF3 Flash Technology : (Invited Paper)Jonah Sengupta, Gaspar Tognetti, Philippe O. Pouliquen, Andreas G. Andreou. 1-5 [doi]
- Registration for Image-Based Transcriptomics: Parametric Signal Features and Multivariate Information MeasuresRebecca Chen, Abhinav B. Das, Lav R. Varshney. 1-6 [doi]
- Policy Search in Infinite-Horizon Discounted Reinforcement Learning: Advances through Connections to Non-Convex Optimization : Invited PresentationKaiqing Zhang, Alec Koppel, Hao Zhu, Tamer Basar. 1-3 [doi]
- Error Estimation for the Particle FilterZiyu Liu, James C. Spall. 1-6 [doi]
- Compressive Sensing for Indoor Millimeter Wave Massive MIMO : (Invited Paper)John Franklin, A. Brinton Cooper. 1-6 [doi]
- Cost-Constrained Classifier Cascade using Sparse Probit Models : Invited PresentationChristopher Ratto, Waseem Malik, Iman Kabir, Robert Newsome. 1-6 [doi]
- Characterization of a pseudo-DRAM Crossbar Computational Memory Array in 55nm CMOS : (Invited Paper)Gaspar Tognetti, Jonah Sengupta, Philippe O. Pouliquen, Andreas G. Andreou. 1-5 [doi]
- Performance Comparison of Minimum Variance, Market and Eigen Portfolios for US EquitiesAnqi Xiong, Ali N. Akansu. 1-5 [doi]
- C-ICT for Discovery of Multiple Associations in Multimodal Imaging Data: Application to Fusion of fMRI and DTI DataChunying Jia, Mohammad A. B. S. Akhonda, Qunfang Long, Vince D. Calhoun, Shari Waldstein, Tülay Adali. 1-5 [doi]
- Training a Remote-Control Car to Autonomously Lane-Follow using End-to-End Neural NetworksBryce Simmons, Pasham Adwani, Huong Pham, Yazeed Alhuthaifi, Artur Wolek. 1-6 [doi]
- Shuffled Linear Regression with Erroneous ObservationsSamer Said Saab, Khaled Kamal Saab, Samer Said Saab Jr.. 1-6 [doi]
- Deep learning to detect catheter tips in vivo during photoacoustic-guided catheter interventions : Invited PresentationDerek Allman, Fabrizio Assis, Jonathan Chrispin, Muyinatu A. Lediju Bell. 1-3 [doi]
- A Note on the Estimation Method of Intervention Effects based on Statistical Decision TheoryShunsuke Horii, Tota Suko. 1-6 [doi]
- A Generative Adversarial Neural Network for Beamforming Ultrasound Images Invited PresentationArun Asokan Nair, Trac D. Tran, Austin Reiter, Muyinatu A. Lediju Bell. 1-6 [doi]
- Policy Gradient using Weak Derivatives for Reinforcement LearningSujay Bhatt, Alec Koppel, Vikram Krishnamurthy. 1-3 [doi]
- Distribution Estimation for Stochastic Approximation in Finite Samples Using A Surrogate Stochastic Differential Equation MethodShuyu Liu, Yingze Hou, James C. Spall. 1-6 [doi]
- Comparison of dictionary learning methods for reverberation suppression in photoacoustic microscopy : Invited presentationSushanth G. Sathyanarayana, Bo Ning 0004, Song Hu, John A. Hossack. 1-4 [doi]
- Multilayered Neural Networks With Sparse, Data-driven Connectivity and Balanced Information and Energy EfficiencyRobert A. Baxter, William B. Levy. 1-6 [doi]
- Multi-dataset Low-rank Matrix FactorizationHossein Valavi, Peter J. Ramadge. 1-5 [doi]
- Efficient learning of neighbor representations for boundary trees and forestsTharindu Adikari, Stark C. Draper. 1-6 [doi]
- Per-Flow Cardinality Estimation Based On Virtual LogLog SketchingZeyu Zhou, Bruce E. Hajek. 1-6 [doi]
- Beam Management in 5G NR using Geolocation Side InformationMarius Arvinte, Marcos Tavares, Dragan Samardzija. 1-6 [doi]
- Discriminant Analysis Deep Neural NetworksLi Li, Milos Doroslovacki, Murray H. Loew. 1-6 [doi]
- Deep Learning for IoT Communications : Invited PresentationWillie L. Thompson, Michael F. Talley. 1-4 [doi]
- Sparse Dictionary Learning and Per-source Filtering for Blind Radio Source SeparationAnnan Dong, Osvaldo Simeone, Alexander M. Haimovich, Jason A. Dabin. 1-5 [doi]
- A Path Planning Algorithm for Collective Monitoring Using Autonomous DronesShafkat Islam, Abolfazl Razi. 1-6 [doi]
- Discretized Density Evolution for Rate Compatible Modulation : Invited PresentationMariano Eduardo Burich, Richard Demo Souza, Javier Garcia-Frías. 1-6 [doi]
- Supervised Joint Nonlinear Transform Learning with Discriminative-Ambiguous Prior for Generic Privacy-Preserved FeaturesDimche Kostadinov, Behrooz Razeghi, Shideh Rezaeifar, Slava Voloshynovskiy. 1-6 [doi]
- Estimating Sparse Covariance Matrix Under Differential Privacy via ThresholdingDi Wang, Jinhui Xu 0001, Yang He. 1-5 [doi]
- Authentication of IoT Devices for WiFi Connectivity from the CloudWondimu K. Zegeye, Farzad Moazzami. 1-6 [doi]