default search action
54rd CISS 2020: Princeton, NJ, USA
- 54th Annual Conference on Information Sciences and Systems, CISS 2020, Princeton, NJ, USA, March 18-20, 2020. IEEE 2020, ISBN 978-1-7281-4085-8
- Md. Ahsan Ayub
, William A. Johnson, Douglas A. Talbert, Ambareen Siraj:
Model Evasion Attack on Intrusion Detection Systems using Adversarial Machine Learning. 1-6 - Samah Saeed Baraheem
, Tam V. Nguyen
:
Aesthetic-Aware Text to Image Synthesis. 1-6 - Alisha Zachariah:
Efficient Estimation of a Sparse Delay-Doppler Channel. 1-6 - Guanze Peng, Quanyan Zhu:
Sequential Hypothesis Testing Game. 1-6 - Ken R. Duffy
, Amit Solomon, Kishori M. Konwar, Muriel Médard:
5G NR CA-Polar Maximum Likelihood Decoding by GRAND. 1-5 - Anis Elgabli
, Jihong Park
, Amrit S. Bedi, Mehdi Bennis
, Vaneet Aggarwal
:
Communication Efficient Framework for Decentralized Machine Learning. 1-5 - Su Li, Michael Gastpar:
Converse for Multi-Server Single-Message PIR with Side Information. 1-6 - Changlong Wu, Narayana Prasad Santhanam:
Almost Uniform Sampling From Neural Networks. 1-6 - Maxime Ferreira Da Costa
, Yuejie Chi
:
Support Stability of Spike Deconvolution via Total Variation Minimization. 1-6 - Sanjit K. Kaul
, Roy D. Yates:
Timely Updates By Multiple Sources: The M/M/1 Queue Revisited. 1-6 - Tuan-Duy H. Nguyen, Huu-Nghia H. Nguyen:
Towards a Robust WiFi-based Fall Detection with Adversarial Data Augmentation. 1-6 - Kumar Vijay Mishra, M. Ashok Kumar:
Generalized Bayesian Cramér-Rao Inequality via Information Geometry of Relative α-Entropy. 1-6 - Weichang Wang, Lei Ying
:
Learning Parallel Markov Chains over Unreliable Wireless Channels. 1-6 - Pavel Myznikov, Yan Huang
:
A New Method for Hierarchical Image Segmentation from Visual Designs. 1-6 - Haiyu Wu, Huayu Li, Alireza Shamsoshoara, Abolfazl Razi, Fatemeh Afghah:
Transfer Learning for Wildfire Identification in UAV Imagery. 1-6 - Songtao Feng, Jing Yang:
Information Freshness for Timely Detection of Status Changes. 1-6 - Wenjun Chen, Bo Chen, Ming Jiang:
Spherical Color-Shift Keying for Visible Light Communication Systems. 1-6 - Eyal Nitzan, Topi Halme, H. Vincent Poor, Visa Koivunen:
Deterministic Multiple Change-Point Detection with Limited Communication. 1-6 - Eric Clarkson:
Bayesian Fisher Information and Detection of a Small Change in a Parameter. 1-5 - Feng Wang, Chen Zhong, Mustafa Cenk Gursoy, Senem Velipasalar:
Defense Strategies Against Adversarial Jamming Attacks via Deep Reinforcement Learning. 1-6 - Annan Dong, Anushreya Ghosh, Alexander M. Haimovich, Jason A. Dabin:
Sparse Recovery of Intermittent Frequency Hopping Signals Aided by DOA. 1-6 - Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus:
Over-the-Air Adversarial Attacks on Deep Learning Based Modulation Classifier over Wireless Channels. 1-6 - Shailee Yagnik, Ramanarayanan Viswanathan
, Lei Cao:
Performance of Two-Sensors Tandem Network for Detecting Deterministic Signals in Correlated Gaussian Noise. 1-6 - Jamie Haddock, Deanna Needell, Elizaveta Rebrova
, William Swartworth:
Stochastic Gradient Descent Variants for Corrupted Systems of Linear Equations. 1-6 - Jinlu Shen, Nitin Nangare:
Nonlinear Equalization for TDMR Channels Using Neural Networks. 1-6 - Ehsan Meamari, Hao Guo, Chien-Chung Shen, Rui Zhang:
Data User-Based Attribute Based Encryption. 1-5 - Baturalp Buyukates
, Sennur Ulukus:
Age of Information with Gilbert-Elliot Servers and Samplers. 1-6 - Dominik Reinhard, Michael Fauß, Abdelhak M. Zoubir:
Distributed Joint Detection and Estimation: A Sequential Approach. 1-6 - Ramina Ghods
, Andrew S. Lan, Tom Goldstein, Christoph Studer:
MSE-Optimal Neural Network Initialization via Layer Fusion. 1-6 - Ryuya Uda:
Vulnerable Web Server Protection by Hash Based URL Transformation. 1-6 - Shuai Zhang, Meng Wang, Sijia Liu, Pin-Yu Chen, Jinjun Xiong
:
Guaranteed Convergence of Training Convolutional Neural Networks via Accelerated Gradient Descent. 1-6 - Melih Bastopcu
, Baturalp Buyukates
, Sennur Ulukus:
Optimal Selective Encoding for Timely Updates. 1-6 - Qinbo Bai, Mridul Agarwal, Vaneet Aggarwal
:
Escaping Saddle Points for Zeroth-order Non-convex Optimization using Estimated Gradient Descent. 1-6 - Songtao Lu, Yawen Zhang, Yunlong Wang:
Decentralized Federated Learning for Electronic Health Records. 1-5 - Naruaki Amada, Hideki Yagi:
The Minimum Cost of Information Erasure for Stationary Memoryless Sources under Restriction on the Output Distribution. 1-6 - Uwe D. Hanebeck:
Deterministic Sampling of Multivariate Densities based on Projected Cumulative Distributions. 1-6 - Chee-Wei Tan
, Lin Ling
:
Automated Reasoning by Convex Optimization: Proof Simplicity, Duality and Sparsity. 1-5 - Mingzhi Xu, Fengxia She, Kuan Wu, Ming Jiang:
Bilateral Contract Based Incentive Matching for Device-to-Device Content Sharing. 1-6 - Wei Liu, Rüdiger L. Urbanke:
On the Universality of Low-Density Parity-Check Block Codes. 1-6 - Chenrui Xiong, Youwu Liu, Zijiang Yang, Eric Liu:
Improving Recommendation Performance with Clustering and Missing Value Prediction. 1-6 - Vamoua Yachongka
, Hideki Yagi:
A New Characterization of the Capacity Region of Identification Systems Under Noisy Enrollment. 1-6 - Nikolaos Pappas, Zheng Chen, Mohammad Hatami:
Average AoI of Cached Status Updates for a Process Monitored by an Energy Harvesting Sensor. 1-5 - Satyaki Nan, Swastik Brahma:
Redundancy-based Mitigation of Jamming Attacks. 1-6 - Omar M. Sleem, Shiyang Leng, Aylin Yener:
Age of Information Minimization in Wireless Powered Stochastic Energy Harvesting Networks. 1-6 - Jun Qi, Xiaoli Ma, Chin-Hui Lee, Jun Du, Sabato Marco Siniscalchi:
Performance Analysis for Tensor-Train Decomposition to Deep Neural Network Based Vector-to-Vector Regression. 1-6 - Holger Boche, Rafael F. Schaefer
, H. Vincent Poor:
On the ϵ-Capacity of Finite Compound Channels with Applications to the Strong Converse and Second Order Coding Rate. 1-6 - Pengfei Jiang, Lei Ying
:
An Optimal Stopping Approach for Iterative Training in Federated Learning. 1-6 - Song Fang, Quanyan Zhu:
Fundamental Limitations in Sequential Prediction and Recursive Algorithms: Lp Bounds via an Entropic Analysis. 1-6 - Jianqiao Chen, Xi Zhang:
Belief Propagation Pattern-Coupled Sparse Bayesian Learning for Non-Stationary Uplink Channel Estimation Over Massive-MIMO Based 5G Mobile Wireless Networks. 1-6 - Ahmet Demirkaya, Jiasi Chen, Samet Oymak:
Exploring the Role of Loss Functions in Multiclass Classification. 1-5 - Anuththara Rupasinghe
, Behtash Babadi:
Robust Inference of Neuronal Correlations from Blurred and Noisy Spiking Observations. 1-5 - Hongzhuang Wu, Xiaoli Ma, Chao-Han Huck Yang, Songyong Liu:
Convolutional Neural Network Based Radio Tomographic Imaging. 1-6 - Xi Zhang, Jingqing Wang, H. Vincent Poor:
Statistical Delay/Error-Rate Bounded QoS Provisioning Across Clustered MmWave-Channels Over Cell-Free Massive MIMO Based 5G Mobile Wireless Networks in the Finite Blocklength Regime. 1-6 - Zisheng Wang, Rick S. Blum
:
Cybersecurity of Inference in Vehicular Ad-hoc Networks : Invited Presentation. 1-6 - Erixhen Sula, Michael Gastpar:
The Gaussian lossy Gray-Wyner network. 1-6 - Damir Vrabac, Philip E. Paré, Henrik Sandberg
, Karl Henrik Johansson
:
Overcoming Challenges for Estimating Virus Spread Dynamics from Data. 1-6 - Timur Luguev, Dominik Seuß
, Jens-Uwe Garbas:
Deep Learning based Affective Sensing with Remote Photoplethysmography. 1-4 - Behrad Soleimani, Proloy Das, Joshua Kulasingham
, Jonathan Z. Simon, Behtash Babadi:
Granger Causal Inference from Indirect Low-Dimensional Measurements with Application to MEG Functional Connectivity Analysis. 1-5 - Yuwei Sun
, Ng S. T. Chong, Hideya Ochiai:
Text-based Malicious Domain Names Detection Based on Variational Autoencoder And Supervised Learning. 1-5 - Massieh Kordi Boroujeny
, Brian L. Mark, Yariv Ephraim:
Fitting Network Traffic to Phase-Type Bounds. 1-6 - Sirajo Abdullahi Bakura, Alain Lambert, Thomas Nowak:
Clock Synchronization with Exponential Smoothing for Dynamic Networks. 1-6 - Raksha Ramakrishna, Anna Scaglione
:
A Bayesian lower bound for parameters with bounded support priors. 1-6 - Alisa Miyashita, Akira Kamatsuka, Takahiro Yoshida, Toshiyasu Matsushima:
A Statistical Decision-Theoretic Approach for Measuring Privacy Risk and Utility in Databases. 1-6 - Yuwei Tu, Elizabeth Tenorio, Christopher G. Brinton:
An Adaptive Content Skipping Methodology based on User Behavioral Modeling. 1-6 - Nagananda K. G, Rick S. Blum
, Alec Koppel:
Reduced-rank Least Squares Parameter Estimation in the Presence of Byzantine Sensors. 1-6 - Kush R. Varshney:
On Mismatched Detection and Safe, Trustworthy Machine Learning. 1-4 - Daniel Chew, A. Brinton Cooper:
Spectrum Sensing in Interference and Noise Using Deep Learning. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.