Abstract is missing.
- Granger Causal Inference from Indirect Low-Dimensional Measurements with Application to MEG Functional Connectivity AnalysisBehrad Soleimani, Proloy Das, Joshua Kulasingham, Jonathan Z. Simon, Behtash Babadi. 1-5 [doi]
- Spectrum Sensing in Interference and Noise Using Deep LearningDaniel Chew, A. Brinton Cooper. 1-6 [doi]
- Sequential Hypothesis Testing GameGuanze Peng, Quanyan Zhu. 1-6 [doi]
- Cybersecurity of Inference in Vehicular Ad-hoc Networks : Invited PresentationZisheng Wang, Rick S. Blum. 1-6 [doi]
- Support Stability of Spike Deconvolution via Total Variation MinimizationMaxime Ferreira Da Costa, Yuejie Chi. 1-6 [doi]
- Stochastic Gradient Descent Variants for Corrupted Systems of Linear EquationsJamie Haddock, Deanna Needell, Elizaveta Rebrova, William Swartworth. 1-6 [doi]
- On the ϵ-Capacity of Finite Compound Channels with Applications to the Strong Converse and Second Order Coding RateHolger Boche, Rafael F. Schaefer, H. Vincent Poor. 1-6 [doi]
- Convolutional Neural Network Based Radio Tomographic ImagingHongzhuang Wu, Xiaoli Ma, Chao-Han Huck Yang, Songyong Liu. 1-6 [doi]
- Communication Efficient Framework for Decentralized Machine LearningAnis Elgabli, Jihong Park, Amrit S. Bedi, Mehdi Bennis, Vaneet Aggarwal. 1-5 [doi]
- Age of Information with Gilbert-Elliot Servers and SamplersBaturalp Buyukates, Sennur Ulukus. 1-6 [doi]
- Average AoI of Cached Status Updates for a Process Monitored by an Energy Harvesting SensorNikolaos Pappas 0001, Zheng Chen 0002, Mohammad Hatami. 1-5 [doi]
- Distributed Joint Detection and Estimation: A Sequential ApproachDominik Reinhard, Michael Fauß, Abdelhak M. Zoubir. 1-6 [doi]
- Spherical Color-Shift Keying for Visible Light Communication SystemsWenjun Chen, Bo Chen, Ming Jiang. 1-6 [doi]
- Learning Parallel Markov Chains over Unreliable Wireless ChannelsWeichang Wang, Lei Ying. 1-6 [doi]
- Age of Information Minimization in Wireless Powered Stochastic Energy Harvesting NetworksOmar M. Sleem, Shiyang Leng, Aylin Yener. 1-6 [doi]
- Deterministic Sampling of Multivariate Densities based on Projected Cumulative DistributionsUwe D. Hanebeck. 1-6 [doi]
- On Mismatched Detection and Safe, Trustworthy Machine LearningKush R. Varshney. 1-4 [doi]
- MSE-Optimal Neural Network Initialization via Layer FusionRamina Ghods, Andrew S. Lan, Tom Goldstein, Christoph Studer. 1-6 [doi]
- The Gaussian lossy Gray-Wyner networkErixhen Sula, Michael Gastpar. 1-6 [doi]
- Performance of Two-Sensors Tandem Network for Detecting Deterministic Signals in Correlated Gaussian NoiseShailee Yagnik, Ramanarayanan Viswanathan, Lei Cao. 1-6 [doi]
- Efficient Estimation of a Sparse Delay-Doppler ChannelAlisha Zachariah. 1-6 [doi]
- Over-the-Air Adversarial Attacks on Deep Learning Based Modulation Classifier over Wireless ChannelsBrian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus. 1-6 [doi]
- Redundancy-based Mitigation of Jamming AttacksSatyaki Nan, Swastik Brahma. 1-6 [doi]
- Belief Propagation Pattern-Coupled Sparse Bayesian Learning for Non-Stationary Uplink Channel Estimation Over Massive-MIMO Based 5G Mobile Wireless NetworksJianqiao Chen, Xi Zhang. 1-6 [doi]
- A New Method for Hierarchical Image Segmentation from Visual DesignsPavel Myznikov, Yan Huang. 1-6 [doi]
- Guaranteed Convergence of Training Convolutional Neural Networks via Accelerated Gradient DescentShuai Zhang, Meng Wang 0003, Sijia Liu 0001, Pin-Yu Chen, Jinjun Xiong. 1-6 [doi]
- Towards a Robust WiFi-based Fall Detection with Adversarial Data AugmentationTuan-Duy H. Nguyen, Huu-Nghia H. Nguyen. 1-6 [doi]
- The Minimum Cost of Information Erasure for Stationary Memoryless Sources under Restriction on the Output DistributionNaruaki Amada, Hideki Yagi. 1-6 [doi]
- Almost Uniform Sampling From Neural NetworksChanglong Wu, Narayana Prasad Santhanam. 1-6 [doi]
- Fundamental Limitations in Sequential Prediction and Recursive Algorithms: Lp Bounds via an Entropic AnalysisSong Fang, Quanyan Zhu. 1-6 [doi]
- 5G NR CA-Polar Maximum Likelihood Decoding by GRANDKen R. Duffy, Amit Solomon, Kishori M. Konwar, Muriel Médard. 1-5 [doi]
- Escaping Saddle Points for Zeroth-order Non-convex Optimization using Estimated Gradient DescentQinbo Bai, Mridul Agarwal, Vaneet Aggarwal. 1-6 [doi]
- Performance Analysis for Tensor-Train Decomposition to Deep Neural Network Based Vector-to-Vector RegressionJun Qi, Xiaoli Ma, Chin-Hui Lee, Jun Du, Sabato Marco Siniscalchi. 1-6 [doi]
- Automated Reasoning by Convex Optimization: Proof Simplicity, Duality and SparsityChee-Wei Tan 0001, Lin Ling. 1-5 [doi]
- Decentralized Federated Learning for Electronic Health RecordsSongtao Lu, Yawen Zhang, Yunlong Wang. 1-5 [doi]
- A New Characterization of the Capacity Region of Identification Systems Under Noisy EnrollmentVamoua Yachongka, Hideki Yagi. 1-6 [doi]
- Transfer Learning for Wildfire Identification in UAV ImageryHaiyu Wu, Huayu Li, Alireza Shamsoshoara, Abolfazl Razi, Fatemeh Afghah. 1-6 [doi]
- Model Evasion Attack on Intrusion Detection Systems using Adversarial Machine LearningMd. Ahsan Ayub, William A. Johnson, Douglas A. Talbert, Ambareen Siraj. 1-6 [doi]
- Statistical Delay/Error-Rate Bounded QoS Provisioning Across Clustered MmWave-Channels Over Cell-Free Massive MIMO Based 5G Mobile Wireless Networks in the Finite Blocklength RegimeXi Zhang, Jingqing Wang, H. Vincent Poor. 1-6 [doi]
- Information Freshness for Timely Detection of Status ChangesSongtao Feng, Jing Yang. 1-6 [doi]
- A Statistical Decision-Theoretic Approach for Measuring Privacy Risk and Utility in DatabasesAlisa Miyashita, Akira Kamatsuka, Takahiro Yoshida, Toshiyasu Matsushima. 1-6 [doi]
- An Adaptive Content Skipping Methodology based on User Behavioral ModelingYuwei Tu, Elizabeth Tenorio, Christopher G. Brinton. 1-6 [doi]
- Defense Strategies Against Adversarial Jamming Attacks via Deep Reinforcement LearningFeng Wang, Chen Zhong, Mustafa Cenk Gursoy, Senem Velipasalar. 1-6 [doi]
- Converse for Multi-Server Single-Message PIR with Side InformationSu Li, Michael Gastpar. 1-6 [doi]
- Exploring the Role of Loss Functions in Multiclass ClassificationAhmet Demirkaya, Jiasi Chen, Samet Oymak. 1-5 [doi]
- Bilateral Contract Based Incentive Matching for Device-to-Device Content SharingMingzhi Xu, Fengxia She, Kuan Wu, Ming Jiang 0002. 1-6 [doi]
- Fitting Network Traffic to Phase-Type BoundsMassieh Kordi Boroujeny, Brian L. Mark, Yariv Ephraim. 1-6 [doi]
- Bayesian Fisher Information and Detection of a Small Change in a ParameterEric Clarkson. 1-5 [doi]
- Overcoming Challenges for Estimating Virus Spread Dynamics from DataDamir Vrabac, Philip E. Paré, Henrik Sandberg, Karl Henrik Johansson. 1-6 [doi]
- Nonlinear Equalization for TDMR Channels Using Neural NetworksJinlu Shen, Nitin Nangare. 1-6 [doi]
- Timely Updates By Multiple Sources: The M/M/1 Queue RevisitedSanjit K. Kaul, Roy D. Yates. 1-6 [doi]
- Text-based Malicious Domain Names Detection Based on Variational Autoencoder And Supervised LearningYuwei Sun, Ng S. T. Chong, Hideya Ochiai. 1-5 [doi]
- Aesthetic-Aware Text to Image SynthesisSamah Saeed Baraheem, Tam V. Nguyen. 1-6 [doi]
- Deterministic Multiple Change-Point Detection with Limited CommunicationEyal Nitzan, Topi Halme, H. Vincent Poor, Visa Koivunen. 1-6 [doi]
- Reduced-rank Least Squares Parameter Estimation in the Presence of Byzantine SensorsNagananda K. G, Rick S. Blum, Alec Koppel. 1-6 [doi]
- Sparse Recovery of Intermittent Frequency Hopping Signals Aided by DOAAnnan Dong, Anushreya Ghosh, Alexander M. Haimovich, Jason A. Dabin. 1-6 [doi]
- Clock Synchronization with Exponential Smoothing for Dynamic NetworksSirajo Abdullahi Bakura, Alain Lambert, Thomas Nowak. 1-6 [doi]
- Robust Inference of Neuronal Correlations from Blurred and Noisy Spiking ObservationsAnuththara Rupasinghe, Behtash Babadi. 1-5 [doi]
- Vulnerable Web Server Protection by Hash Based URL TransformationRyuya Uda. 1-6 [doi]
- Deep Learning based Affective Sensing with Remote PhotoplethysmographyTimur Luguev, Dominik Seuß, Jens-Uwe Garbas. 1-4 [doi]
- Data User-Based Attribute Based EncryptionEhsan Meamari, Hao Guo, Chien-Chung Shen, Rui Zhang. 1-5 [doi]
- A Bayesian lower bound for parameters with bounded support priorsRaksha Ramakrishna, Anna Scaglione. 1-6 [doi]
- An Optimal Stopping Approach for Iterative Training in Federated LearningPengfei Jiang, Lei Ying. 1-6 [doi]
- Improving Recommendation Performance with Clustering and Missing Value PredictionChenrui Xiong, Youwu Liu, Zijiang Yang, Eric Liu. 1-6 [doi]
- On the Universality of Low-Density Parity-Check Block CodesWei Liu 0105, Rüdiger L. Urbanke. 1-6 [doi]
- Optimal Selective Encoding for Timely UpdatesMelih Bastopcu, Baturalp Buyukates, Sennur Ulukus. 1-6 [doi]
- Generalized Bayesian Cramér-Rao Inequality via Information Geometry of Relative α-EntropyKumar Vijay Mishra, M. Ashok Kumar. 1-6 [doi]