


default search action
54rd CISS 2020: Princeton, NJ, USA
- 54th Annual Conference on Information Sciences and Systems, CISS 2020, Princeton, NJ, USA, March 18-20, 2020. IEEE 2020, ISBN 978-1-7281-4085-8

- Md. Ahsan Ayub

, William A. Johnson, Douglas A. Talbert, Ambareen Siraj:
Model Evasion Attack on Intrusion Detection Systems using Adversarial Machine Learning. 1-6 - Samah Saeed Baraheem

, Tam V. Nguyen
:
Aesthetic-Aware Text to Image Synthesis. 1-6 - Alisha Zachariah:

Efficient Estimation of a Sparse Delay-Doppler Channel. 1-6 - Guanze Peng, Quanyan Zhu:

Sequential Hypothesis Testing Game. 1-6 - Ken R. Duffy

, Amit Solomon, Kishori M. Konwar, Muriel Médard:
5G NR CA-Polar Maximum Likelihood Decoding by GRAND. 1-5 - Anis Elgabli

, Jihong Park
, Amrit S. Bedi, Mehdi Bennis
, Vaneet Aggarwal
:
Communication Efficient Framework for Decentralized Machine Learning. 1-5 - Su Li, Michael Gastpar:

Converse for Multi-Server Single-Message PIR with Side Information. 1-6 - Changlong Wu

, Narayana Prasad Santhanam:
Almost Uniform Sampling From Neural Networks. 1-6 - Maxime Ferreira Da Costa

, Yuejie Chi
:
Support Stability of Spike Deconvolution via Total Variation Minimization. 1-6 - Sanjit K. Kaul

, Roy D. Yates:
Timely Updates By Multiple Sources: The M/M/1 Queue Revisited. 1-6 - Tuan-Duy H. Nguyen, Huu-Nghia H. Nguyen:

Towards a Robust WiFi-based Fall Detection with Adversarial Data Augmentation. 1-6 - Kumar Vijay Mishra, M. Ashok Kumar:

Generalized Bayesian Cramér-Rao Inequality via Information Geometry of Relative α-Entropy. 1-6 - Weichang Wang, Lei Ying

:
Learning Parallel Markov Chains over Unreliable Wireless Channels. 1-6 - Pavel Myznikov, Yan Huang

:
A New Method for Hierarchical Image Segmentation from Visual Designs. 1-6 - Haiyu Wu, Huayu Li, Alireza Shamsoshoara, Abolfazl Razi, Fatemeh Afghah:

Transfer Learning for Wildfire Identification in UAV Imagery. 1-6 - Songtao Feng, Jing Yang

:
Information Freshness for Timely Detection of Status Changes. 1-6 - Wenjun Chen, Bo Chen, Ming Jiang:

Spherical Color-Shift Keying for Visible Light Communication Systems. 1-6 - Eyal Nitzan, Topi Halme, H. Vincent Poor, Visa Koivunen:

Deterministic Multiple Change-Point Detection with Limited Communication. 1-6 - Eric Clarkson:

Bayesian Fisher Information and Detection of a Small Change in a Parameter. 1-5 - Feng Wang, Chen Zhong, Mustafa Cenk Gursoy, Senem Velipasalar:

Defense Strategies Against Adversarial Jamming Attacks via Deep Reinforcement Learning. 1-6 - Annan Dong, Anushreya Ghosh, Alexander M. Haimovich, Jason A. Dabin:

Sparse Recovery of Intermittent Frequency Hopping Signals Aided by DOA. 1-6 - Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu

, Tugba Erpek, Sennur Ulukus:
Over-the-Air Adversarial Attacks on Deep Learning Based Modulation Classifier over Wireless Channels. 1-6 - Shailee Yagnik, Ramanarayanan Viswanathan

, Lei Cao:
Performance of Two-Sensors Tandem Network for Detecting Deterministic Signals in Correlated Gaussian Noise. 1-6 - Jamie Haddock, Deanna Needell, Elizaveta Rebrova

, William Swartworth:
Stochastic Gradient Descent Variants for Corrupted Systems of Linear Equations. 1-6 - Jinlu Shen, Nitin Nangare:

Nonlinear Equalization for TDMR Channels Using Neural Networks. 1-6 - Ehsan Meamari, Hao Guo, Chien-Chung Shen, Rui Zhang:

Data User-Based Attribute Based Encryption. 1-5 - Baturalp Buyukates

, Sennur Ulukus:
Age of Information with Gilbert-Elliot Servers and Samplers. 1-6 - Dominik Reinhard, Michael Fauß, Abdelhak M. Zoubir:

Distributed Joint Detection and Estimation: A Sequential Approach. 1-6 - Ramina Ghods

, Andrew S. Lan, Tom Goldstein, Christoph Studer:
MSE-Optimal Neural Network Initialization via Layer Fusion. 1-6 - Ryuya Uda:

Vulnerable Web Server Protection by Hash Based URL Transformation. 1-6 - Shuai Zhang, Meng Wang, Sijia Liu, Pin-Yu Chen, Jinjun Xiong

:
Guaranteed Convergence of Training Convolutional Neural Networks via Accelerated Gradient Descent. 1-6 - Melih Bastopcu

, Baturalp Buyukates
, Sennur Ulukus:
Optimal Selective Encoding for Timely Updates. 1-6 - Qinbo Bai, Mridul Agarwal, Vaneet Aggarwal

:
Escaping Saddle Points for Zeroth-order Non-convex Optimization using Estimated Gradient Descent. 1-6 - Songtao Lu, Yawen Zhang, Yunlong Wang:

Decentralized Federated Learning for Electronic Health Records. 1-5 - Naruaki Amada, Hideki Yagi:

The Minimum Cost of Information Erasure for Stationary Memoryless Sources under Restriction on the Output Distribution. 1-6 - Uwe D. Hanebeck:

Deterministic Sampling of Multivariate Densities based on Projected Cumulative Distributions. 1-6 - Chee-Wei Tan

, Lin Ling
:
Automated Reasoning by Convex Optimization: Proof Simplicity, Duality and Sparsity. 1-5 - Mingzhi Xu, Fengxia She, Kuan Wu, Ming Jiang:

Bilateral Contract Based Incentive Matching for Device-to-Device Content Sharing. 1-6 - Wei Liu, Rüdiger L. Urbanke:

On the Universality of Low-Density Parity-Check Block Codes. 1-6 - Chenrui Xiong, Youwu Liu, Zijiang Yang, Eric Liu:

Improving Recommendation Performance with Clustering and Missing Value Prediction. 1-6 - Vamoua Yachongka

, Hideki Yagi:
A New Characterization of the Capacity Region of Identification Systems Under Noisy Enrollment. 1-6 - Nikolaos Pappas, Zheng Chen, Mohammad Hatami:

Average AoI of Cached Status Updates for a Process Monitored by an Energy Harvesting Sensor. 1-5 - Satyaki Nan, Swastik Brahma:

Redundancy-based Mitigation of Jamming Attacks. 1-6 - Omar M. Sleem, Shiyang Leng, Aylin Yener:

Age of Information Minimization in Wireless Powered Stochastic Energy Harvesting Networks. 1-6 - Jun Qi, Xiaoli Ma, Chin-Hui Lee, Jun Du, Sabato Marco Siniscalchi:

Performance Analysis for Tensor-Train Decomposition to Deep Neural Network Based Vector-to-Vector Regression. 1-6 - Holger Boche, Rafael F. Schaefer

, H. Vincent Poor:
On the ϵ-Capacity of Finite Compound Channels with Applications to the Strong Converse and Second Order Coding Rate. 1-6 - Pengfei Jiang, Lei Ying

:
An Optimal Stopping Approach for Iterative Training in Federated Learning. 1-6 - Song Fang, Quanyan Zhu:

Fundamental Limitations in Sequential Prediction and Recursive Algorithms: Lp Bounds via an Entropic Analysis. 1-6 - Jianqiao Chen, Xi Zhang:

Belief Propagation Pattern-Coupled Sparse Bayesian Learning for Non-Stationary Uplink Channel Estimation Over Massive-MIMO Based 5G Mobile Wireless Networks. 1-6 - Ahmet Demirkaya, Jiasi Chen

, Samet Oymak:
Exploring the Role of Loss Functions in Multiclass Classification. 1-5 - Anuththara Rupasinghe

, Behtash Babadi:
Robust Inference of Neuronal Correlations from Blurred and Noisy Spiking Observations. 1-5 - Hongzhuang Wu, Xiaoli Ma, Chao-Han Huck Yang, Songyong Liu:

Convolutional Neural Network Based Radio Tomographic Imaging. 1-6 - Xi Zhang, Jingqing Wang, H. Vincent Poor:

Statistical Delay/Error-Rate Bounded QoS Provisioning Across Clustered MmWave-Channels Over Cell-Free Massive MIMO Based 5G Mobile Wireless Networks in the Finite Blocklength Regime. 1-6 - Zisheng Wang, Rick S. Blum

:
Cybersecurity of Inference in Vehicular Ad-hoc Networks : Invited Presentation. 1-6 - Erixhen Sula, Michael Gastpar:

The Gaussian lossy Gray-Wyner network. 1-6 - Damir Vrabac, Philip E. Paré, Henrik Sandberg

, Karl Henrik Johansson
:
Overcoming Challenges for Estimating Virus Spread Dynamics from Data. 1-6 - Timur Luguev, Dominik Seuß

, Jens-Uwe Garbas:
Deep Learning based Affective Sensing with Remote Photoplethysmography. 1-4 - Behrad Soleimani, Proloy Das, Joshua Kulasingham

, Jonathan Z. Simon, Behtash Babadi:
Granger Causal Inference from Indirect Low-Dimensional Measurements with Application to MEG Functional Connectivity Analysis. 1-5 - Yuwei Sun

, Ng S. T. Chong, Hideya Ochiai:
Text-based Malicious Domain Names Detection Based on Variational Autoencoder And Supervised Learning. 1-5 - Massieh Kordi Boroujeny

, Brian L. Mark, Yariv Ephraim:
Fitting Network Traffic to Phase-Type Bounds. 1-6 - Sirajo Abdullahi Bakura, Alain Lambert, Thomas Nowak:

Clock Synchronization with Exponential Smoothing for Dynamic Networks. 1-6 - Raksha Ramakrishna, Anna Scaglione

:
A Bayesian lower bound for parameters with bounded support priors. 1-6 - Alisa Miyashita, Akira Kamatsuka, Takahiro Yoshida, Toshiyasu Matsushima:

A Statistical Decision-Theoretic Approach for Measuring Privacy Risk and Utility in Databases. 1-6 - Yuwei Tu, Elizabeth Tenorio, Christopher G. Brinton

:
An Adaptive Content Skipping Methodology based on User Behavioral Modeling. 1-6 - Nagananda K. G, Rick S. Blum

, Alec Koppel:
Reduced-rank Least Squares Parameter Estimation in the Presence of Byzantine Sensors. 1-6 - Kush R. Varshney:

On Mismatched Detection and Safe, Trustworthy Machine Learning. 1-4 - Daniel Chew, A. Brinton Cooper:

Spectrum Sensing in Interference and Noise Using Deep Learning. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














