Abstract is missing.
- Post-Quantization Dithering with Look-Up TablesMorriel Kasher, Michael Tinston, Predrag Spasojevic. 1-6 [doi]
- Efficient Privacy Preserving Range Query Using Segment TreeShusuke Shirotake, Kana Shimizu. 1-6 [doi]
- Needle-in-the-Haystack: On Automatic Risk-based Searching to Stop Cyber-Physical Threats in Large-Scale Power SystemsKatherine Davis, Shining Sun. 1-6 [doi]
- Nonparametric Estimation and Comparison of Distance Distributions from Censored DataLucas H. McCabe. 1-6 [doi]
- A Novel Deep Subspace Learning Framework to Automatically Uncover Assessment-Specific Independent Brain NetworksIshaan Batta, Anees Abrol, Vince D. Calhoun. 1-6 [doi]
- Learning Embedding Representations in High DimensionsGolara Ahmadi Azar, Melika Emami, Alyson K. Fletcher, Sundeep Rangan. 1-6 [doi]
- Combining the Predictions of Out-of-Domain Classifiers Using Etcetera AbductionAndrew S. Gordon, Andrew Feng. 1-6 [doi]
- Distributed Compression in the Era of Machine Learning: A Review of Recent AdvancesEzgi Özyilkan, Elza Erkip. 1-6 [doi]
- Hardware Trojan Testing with Hierarchical Trojan Types Under Cognitive BiasesSatyaki Nan, Swastik Brahma. 1-6 [doi]
- The Benefits of Network Coding on Information Freshness in Multi-User Energy Harvesting BroadcastsParisa Rafiee, Milos Doroslovacki, Suresh Subramaniam 0001. 1-6 [doi]
- Constrained Entropy Vectors: Some Direct and Converse ResultsSatyajit Thakor. 1-6 [doi]
- Covert Joint Communication and Sensing under Variational Distance ConstraintShi-Yuan Wang, Meng-Che Chang, Matthieu R. Bloch. 1-6 [doi]
- TrumorGPT: Query Optimization and Semantic Reasoning over Networks for Automated Fact-CheckingChing Nam Hang, Pei-Duo Yu, Chee-Wei Tan 0001. 1-6 [doi]
- imEL: Instance-level Masked Entity Linking ModelJaeeun Jang, Sangmin Kim, Mikyoung Lee, Mira Yun, Charles Wiseman. 1-6 [doi]
- Fairness in Survival Outcome Prediction for Medical TreatmentsYunqi Li 0003, Hanxiong Chen, Lanjing Zhang, Yongfeng Zhang. 1-6 [doi]
- On the Robustness of Cross-Concentrated Sampling for Matrix CompletionHanQin Cai, Longxiu Huang, Chandra Kundu, Bowen Su. 1-5 [doi]
- Insight Into Cyber Information Flow Interdependencies Using Bio-inspired TopologiesEmily Payne, Shining Sun, Astrid Layton, Katherine R. Davis 0001, Shamina Hossain-McKenzie, Nicholas Jacobs. 1-6 [doi]
- Low Separation Rank in Tensor Generalized Linear Models: An Asymptotic AnalysisBatoul Taki, Anand D. Sarwate, Waheed U. Bajwa. 1-6 [doi]
- Probing into the Fairness of Large Language Models: A Case Study of ChatGPTYunqi Li, Lanjing Zhang, Yongfeng Zhang. 1-6 [doi]
- Isometric Feature Embedding for Content-Based Image RetrievalHayato Muraki, Kei Nishimaki, Shuya Tobari, Kenichi Oishi, Hitoshi Iyatomi. 1-6 [doi]
- Linear Progressive Coding for Semantic Communication using Deep Neural NetworksEva Riherd, Raghu Mudumbai, Weiyu Xu. 1-6 [doi]
- Distributional Generating Series in Nonlinear Control TheoryW. Steven Gray, Natalie Pham, Alexander Schmeding. 1-6 [doi]
- Source Localization with Spatially Distributed Active and Passive SensorsYifan Liang, Hongbin Li 0001. 1-6 [doi]
- Bayesian Spectral Graph Denoising with Smoothness PriorSamuel Leone, Xingzhi Sun, Michael Perlmutter, Smita Krishnaswamy. 1-6 [doi]
- An Efficient Implementation of Coarse Carrier Synchronization Utilizing Band Edge FiltersRyan Szlosek, Mojtaba Vaezi. 1-5 [doi]
- Assessing Neural Network Representations During Training Using Noise-Resilient Diffusion Spectral EntropyDanqi Liao, Chen Liu, Benjamin W. Christensen, Alexander Tong 0001, Guillaume Huguet, Guy Wolf, Maximilian Nickel, Ian Adelstein, Smita Krishnaswamy. 1-6 [doi]
- Improving the Lower Bound for the Union-closed Sets Conjecture via Conditionally IID CouplingJingbo Liu. 1-6 [doi]
- Straggler-Resilient Asynchronous Decentralized ADMM for Consensus OptimizationJeannie He, Ming Xiao 0001, Mikael Skoglund. 1-6 [doi]
- Enumeration of Minimum Weight Codewords of Pre-Transformed Polar Codes by Tree IntersectionAndreas Zunker, Marvin Geiselhart, Stephan ten Brink. 1-6 [doi]
- Unsupervised User Selection for Efficient MIMO Communications Spectrum SharingJohn J. Kelly, Jonathan Ashdown. 1-6 [doi]
- Semantic Forwarding for Next Generation Relay NetworksEnes Arda, Emrecan Kutay, Aylin Yener. 1-6 [doi]
- An Instance-Based Approach to the Trace Reconstruction ProblemKayvon Mazooji, Ilan Shomorony. 1-6 [doi]
- A Hybrid Stochastic-Full Enumeration Approach to a Ranking Problem with Insufficient InformationJirí Mazurek, Ryszard Janicki. 1-6 [doi]
- Strong Duality Relations in Nonconvex Risk-Constrained LearningDionysis Kalogerias, Spyridon Pougkakiotis. 1-6 [doi]
- Entropy-Driven Kalman Filter Model of Vision TrainingChristopher C. Pack, Charles D. Pack. 1-6 [doi]
- A Comprehensive Analysis of Object Detectors in Adverse Weather ConditionsVatsa S. Patel, Kunal Agrawal, Tam V. Nguyen 0002. 1-6 [doi]
- Early Sampling: Sampling with Incomplete Queue State Information to Minimize the AgeSahan Liyanaarachchi, Sennur Ulukus. 1-6 [doi]
- Optimal Cost Constrained Adversarial Attacks for Multiple Agent SystemsZiqing Lu, Guanlin Liu, Lifeng Lai, Weiyu Xu. 1-6 [doi]
- A Fair Anti-Eavesdropping Strategy for Communication with Several ReceiversAndrey Garnaev, Wade Trappe. 1-6 [doi]
- A Fast Effective Greedy Approach for MU-MIMO Beam Selection in mm-Wave and THz CommunicationsRafid Umayer Murshed, Md. Saheed Ullah, Mohammad Saquib. 1-6 [doi]
- Generative Probabilistic Time Series Forecasting and Applications in Grid OperationsXinyi Wang, Lang Tong, Qing Zhao 0001. 1-6 [doi]
- Comparisons of Different Dynamic Game Reinforcement Learning Optimal Strategies for A Non-holonomic VehicleLingyi Xu, Zoran Gajic. 1-6 [doi]
- Study of Privacy in Federated Reservoir ComputingChristopher C. Zawacki, Eyad H. Abed. 1-6 [doi]
- Wasserstein Distortion: Unifying Fidelity and RealismYang Qiu, Aaron B. Wagner, Johannes Ballé, Lucas Theis. 1-6 [doi]
- Error bounds of constant gain least-mean-squares algorithmsChang Liu, Antwan D. Clark. 1-6 [doi]
- A Hybrid BCI for Robotic Device NavigationYih-Choung Yu, Hayden Fisher, Angela Busheska, Lily Thompson, Lisa Gabel. 1-6 [doi]
- Cyclic Scheduling for Age of Information Minimization with Generate at Will Status UpdatesEge Orkun Gamgam, Nail Akar, Sennur Ulukus. 1-6 [doi]
- Stochastic Resource Allocation via Dual Tail WaterfillingGokberk Yaylali, Dionysios S. Kalogerias. 1-6 [doi]
- Distributed Optimization with Feasible Set PrivacyShreya Meel, Sennur Ulukus. 1-6 [doi]
- Optimal Obfuscation to Protect Client Privacy in Federated LearningBo Guan, Shuangqing Wei, Amir Houmansadr, Hossein Pishro-Nik, Dennis Goeckel. 1-6 [doi]
- Contagion Source Detection by Maximum Likelihood Estimation and Starlike Graph ApproximationPei-Duo Yu, Liang Zheng 0002, Chee-Wei Tan 0001. 1-6 [doi]
- Object Tracking Incorporating Transfer Learning into an Unscented Kalman FilterOmar Alotaibi, Brian L. Mark. 1-6 [doi]
- Score-based diffusion priors for multi-target detectionAlon Zabatani, Shay Kreymer, Tamir Bendory. 1-6 [doi]
- Robust Over-the-Air Federated LearningHwanjin Kim, Hongjae Nam, David J. Love. 1-6 [doi]
- NOMA Decoding: Successive Interference Cancellation or Maximum Likelihood Detection?Yue Qi, Mojtaba Vaezi. 1-6 [doi]
- The Symmetric alpha-Stable Privacy MechanismChristopher C. Zawacki, Eyad H. Abed. 1-6 [doi]
- Integrated Sensing, Communications, and Powering for Statistical-QoS Provisioning Over Next-Generation Massive-MIMO Mobile NetworksXi Zhang 0005, Qixuan Zhu. 1-6 [doi]
- Asymmetric X-Secure T-Private Information Retrieval: More Databases is Not Always BetterMohamed Nomeir, Sajani Vithana, Sennur Ulukus. 1-6 [doi]
- Physics-Informed Deep Learning with Kalman Filter Mixture: A New State Prediction ModelNiharika Deshpande, Hyoshin Park. 1-6 [doi]
- Over-the-Air Federated Learning with Phase Noise: Analysis and CountermeasuresMartin Dahl, Erik G. Larsson. 1-6 [doi]
- Log-Log Domain Sum-Product Algorithm for Information Reconciliation in Continuous-Variable Quantum Key DistributionErdem Eray Cil, Laurent Schmalen. 1-6 [doi]