Abstract is missing.
- Transactive Resilience in Renewable Microgrids: A Contract-Theoretic ApproachJuntao Chen, Yunhan Huang, Quanyan Zhu. 1-6 [doi]
- Secure Integer Comparison Protocol For ML-based Disease Diagnosis In MHN With Energy Efficient Edge ComputingSona Alex, K. J. Dhanaraj, P. P. Deepthi. 1-6 [doi]
- Interpretable Hierarchical Bayesian Modeling of Cell-Type Distributions in COVID-19 DiseaseSarah Parsons, Nathan P. Whitener, Sapan Bhandari, Natalia Khuri. 7-12 [doi]
- Deep Learning Based Bacteria Classification from SEM Images Using a Combination of Membrane and Internal FeaturesYasuki Kakishita, Hideharu Hattori, Anirban Ray, Akiko Hisada, Yusuke Ominami, Jean-Pierre Baudoin, Jacques Yaacoub Bou Khalil, Didier Raoult. 13-18 [doi]
- Design and Implementation of a Steganography-based System that Provides Protection for Breast Cancer Patient's DataSewar Khalifeh, Jude Georgi, Shatha Shakhatreh. 19-24 [doi]
- VaxEquity: A Data-Driven Risk Assessment and Optimization Framework for Equitable Vaccine DistributionNavpreet Kaur, Jason Hughes, Juntao Chen. 25-30 [doi]
- Dynamical Dorfman Testing with QuarantineMustafa Doger, Sennur Ulukus. 31-36 [doi]
- Learning and generalization of one-hidden-layer neural networks, going beyond standard Gaussian dataHongkang Li, Shuai Zhang, Meng Wang. 37-42 [doi]
- Identifying the Superspreader in Proactive Backward Contact Tracing by Deep LearningSiya Chen, Pei-Duo Yu, Chee-Wei Tan 0001, H. Vincent Poor. 43-48 [doi]
- Massive-MIMO Channel Capacity Modeling for mURLLC Over 6G UAV Mobile Wireless NetworksXi Zhang 0005, Qixuan Zhu, H. Vincent Poor. 49-54 [doi]
- Multivariate Spatio-temporal Cellular Traffic Prediction with Handover Based ClusteringEvren Tuna, Alkan Soysal. 55-59 [doi]
- Doubly-Rational Series: Recognizability and RealizationsG. S. Venkatesh. 60-65 [doi]
- Sparse Matrix Codes: Rate-Reliability Trade-offs for URLLCSudarshan Adiga, Ravi Tandon, Tamal Bose. 66-71 [doi]
- A Non-Zero Sum Bandwidth Scanning Game with a Sophisticated AdversaryAndrey Garnaev, Wade Trappe. 72-77 [doi]
- On Performance Limit for Bandwidth-Constrained Distributed Parameter Estimation SystemsAlireza Sani, Azadeh Vosoughi. 78-83 [doi]
- Multi-Designated Receiver Authentication-Codes with Information-Theoretic SecurityTakenobu Seito, Junji Shikata, Yohei Watanabe 0001. 84-89 [doi]
- Estimating Test Statistic Distributions for Multiple Hypothesis Testing in Sensor NetworksMartin Gölz, Abdelhak M. Zoubir, Visa Koivunen. 90-95 [doi]
- Communication Efficient Federated Learning via Ordered ADMM in a Fully Decentralized SettingYicheng Chen 0001, Rick S. Blum, Brian M. Sadler. 96-100 [doi]
- Decentralized Graph Federated Multitask Learning for Streaming DataVinay Chakravarthi Gogineni, Stefan Werner 0001, Yih-Fang Huang, Anthony Kuh. 101-106 [doi]
- The RBMLE method for Reinforcement LearningAkshay Mete, Rahul Singh 0001, P. R. Kumar 0001. 107-112 [doi]
- Doubly Pessimistic Algorithms for Strictly Safe Off-Policy OptimizationSanae Amani, Lin F. Yang. 113-118 [doi]
- On Distributed Lossy Coding of Symmetrically Correlated Gaussian SourcesSiyao Zhou 0002, Sadaf Salehkalaibar, Jingjing Qian, Jun Chen 0005, Wuxian Shi, Yiqun Ge, Wen Tong. 119-124 [doi]
- The Price of Distributed: Rate Loss in the CEO ProblemArda Atalik, Alper Köse, Michael Gastpar. 125-130 [doi]
- Rate Region of the One-Help-Two Quadratic Gaussian Source-Coding Problem with MarkovityOmer Bilgen, Aaron B. Wagner. 131-136 [doi]
- Democratizing Language Learning using Machine LearningAhana Gangopadhyay, Indrajit Bardhan, Anirban Das, Nitish Subhash Soman, Santanu Das. 137-141 [doi]
- Neural Language Modeling of Unstructured Clinical Notes for Automated Patient PhenotypingAkshara Prabhakar, Shidharth S, S. Sowmya Kamath. 142-147 [doi]
- Traffic Rate Network Tomography via Moment Generating Function MatchingYariv Ephraim, Joshua Coblenz, Brian L. Mark, Hanoch Lev-Ari. 148-153 [doi]
- An Industrial Application of Multi Target Detection in Thermal Images from Different Cameras with DeepLearningBerkan Unutmaz, Isiotan Erer. 154-159 [doi]
- Development of Anomalous Video Detection System using Hybrid-Features Analysis of Actions and Scene-Backgrounds InformationBharindra Kamanditya. 160-165 [doi]
- Product Market Demand Analysis Using NLP in Banglish Text with Sentiment Analysis and Named Entity RecognitionMd Sabbir Hossain, Nishat Nayla, Annajiat Alim Rasel. 166-171 [doi]
- Hardware-Efficient Deconvolution-Based GAN for Edge ComputingAzzam Alhussain, Mingjie Lin. 172-176 [doi]
- Classification Predictive Modeling of DyslexiaYih-Choung Yu, Khaknazar Shyntassov, Amanuel Zewge, Lisa Gabel. 177-181 [doi]
- Optimal Drug Dosing to Achieve the Desired Actual Neutrophil Counts (ANC) in Chemotherapy Induced MyelosuppressionVerica Radisavljevic-Gajic. 182-187 [doi]
- Neural Bandits for Protein Sequence OptimizationChenyu Wang, Joseph Kim, Le-Cong, Mengdi Wang. 188-193 [doi]
- Fast Breadth-First Search Approximation for Epidemic Source InferenceCongduan Li, Siya Chen, Chee-Wei Tan 0001. 194-199 [doi]
- Data-driven spatio-temporal dynamic brain connectivity analysis using fALFF: Application to sensorimotor task dataKhondoker Murad Hossain, Suchita Bhinge, Qunfang Long, Vince D. Calhoun, Tülay Adali. 200-205 [doi]
- Statistical Delay and Error-Rate Bounded QoS Control for mURLLC Over 6G Multimedia Mobile Wireless Networks in the Non-Asymptotic RegimeXi Zhang, Jingqing Wang, H. Vincent Poor. 206-211 [doi]
- Fairness in Sensor Detection SystemsBenedito J. B. Fonseca. 212-217 [doi]
- Achieving the Capacity of a DNA Storage Channel with Linear Coding SchemesKel Levick, Reinhard Heckel, Ilan Shomorony. 218-223 [doi]
- Multi-user Beam Alignment in Presence of Multi-pathNariman Torkzaban, Mohamamd Amir Khojastepour, John S. Baras. 224-229 [doi]
- CP-ABE encryption over MQTT for an IoT system with Raspberry PiFredy Mendoza-Cardenas, Rai Stiv Leon-Aguilar, Jose L. Quiroz Arroyo. 236-239 [doi]
- Differentially Private Federated Learning with Drift ControlWei-Ting Chang, Mohamed Seif, Ravi Tandon. 240-245 [doi]
- Convergence Time Minimization for Federated Reinforcement Learning over Wireless NetworksSihua Wang, Mingzhe Chen, Changchuan Yin, H. Vincent Poor. 246-251 [doi]
- On the Convergence of Hybrid Federated Learning with Server-Clients Collaborative TrainingKun Yang, Cong Shen. 252-257 [doi]
- Sequential Recommendation Using Deep Reinforcement Learning and Multi-Head AttentionRaneem Sultan, Mervat Abu-Elkheir. 258-262 [doi]
- Hidden Vulnerabilities in Cosine Similarity based Poisoning DefenseHarsh Kasyap, Somanath Tripathy. 263-268 [doi]
- Safety Control for Prime Focus SpectrographTing-Han Fan, Athindran Ramesh Kumar, Peter J. Ramadge. 269-274 [doi]
- On Explainability of A Simple Classifier for AR(1) SourceCem Benar, Ali N. Akansu. 275-280 [doi]
- Policy Gradient for Ratio Optimization: A Case StudyWesley A. Suttle, Alec Koppel, Ji Liu. 281-286 [doi]
- On Audio Enhancement via Online Non-Negative Matrix FactorizationAndrew Sack, Wenzhao Jiang, Michael Perlmutter, Palina Salanevich, Deanna Needell. 287-291 [doi]
- Communication Complexity of Two-party Nonparametric Global Density EstimationJingbo Liu. 292-297 [doi]