default search action
58th CISS 2024: Princeton, NJ, USA
- 58th Annual Conference on Information Sciences and Systems, CISS 2024, Princeton, NJ, USA, March 13-15, 2024. IEEE 2024, ISBN 979-8-3503-6929-8
- Yifan Liang, Hongbin Li:
Source Localization with Spatially Distributed Active and Passive Sensors. 1-6 - Parisa Rafiee, Milos Doroslovacki, Suresh Subramaniam:
The Benefits of Network Coding on Information Freshness in Multi-User Energy Harvesting Broadcasts. 1-6 - Christopher C. Pack, Charles D. Pack:
Entropy-Driven Kalman Filter Model of Vision Training. 1-6 - Andreas Zunker, Marvin Geiselhart, Stephan ten Brink:
Enumeration of Minimum Weight Codewords of Pre-Transformed Polar Codes by Tree Intersection. 1-6 - Danqi Liao, Chen Liu, Benjamin W. Christensen, Alexander Tong, Guillaume Huguet, Guy Wolf, Maximilian Nickel, Ian Adelstein, Smita Krishnaswamy:
Assessing Neural Network Representations During Training Using Noise-Resilient Diffusion Spectral Entropy. 1-6 - Yih-Choung Yu, Hayden Fisher, Angela Busheska, Lily Thompson, Lisa Gabel:
A Hybrid BCI for Robotic Device Navigation. 1-6 - Vatsa S. Patel, Kunal Agrawal, Tam V. Nguyen:
A Comprehensive Analysis of Object Detectors in Adverse Weather Conditions. 1-6 - Ching Nam Hang, Pei-Duo Yu, Chee Wei Tan:
TrumorGPT: Query Optimization and Semantic Reasoning over Networks for Automated Fact-Checking. 1-6 - Niharika Deshpande, Hyoshin Park:
Physics-Informed Deep Learning with Kalman Filter Mixture: A New State Prediction Model. 1-6 - Sahan Liyanaarachchi, Sennur Ulukus:
Early Sampling: Sampling with Incomplete Queue State Information to Minimize the Age. 1-6 - Ege Orkun Gamgam, Nail Akar, Sennur Ulukus:
Cyclic Scheduling for Age of Information Minimization with Generate at Will Status Updates. 1-6 - Chang Liu, Antwan D. Clark:
Error bounds of constant gain least-mean-squares algorithms. 1-6 - Ezgi Özyilkan, Elza Erkip:
Distributed Compression in the Era of Machine Learning: A Review of Recent Advances. 1-6 - Katherine Davis, Shining Sun:
Needle-in-the-Haystack: On Automatic Risk-based Searching to Stop Cyber-Physical Threats in Large-Scale Power Systems. 1-6 - Satyaki Nan, Swastik Brahma:
Hardware Trojan Testing with Hierarchical Trojan Types Under Cognitive Biases. 1-6 - Golara Ahmadi Azar, Melika Emami, Alyson K. Fletcher, Sundeep Rangan:
Learning Embedding Representations in High Dimensions. 1-6 - Yang Qiu, Aaron B. Wagner, Johannes Ballé, Lucas Theis:
Wasserstein Distortion: Unifying Fidelity and Realism. 1-6 - Hayato Muraki, Kei Nishimaki, Shuya Tobari, Kenichi Oishi, Hitoshi Iyatomi:
Isometric Feature Embedding for Content-Based Image Retrieval. 1-6 - Christopher C. Zawacki, Eyad H. Abed:
The Symmetric alpha-Stable Privacy Mechanism. 1-6 - Christopher C. Zawacki, Eyad H. Abed:
Study of Privacy in Federated Reservoir Computing. 1-6 - Xinyi Wang, Lang Tong, Qing Zhao:
Generative Probabilistic Time Series Forecasting and Applications in Grid Operations. 1-6 - Eva Riherd, Raghu Mudumbai, Weiyu Xu:
Linear Progressive Coding for Semantic Communication using Deep Neural Networks. 1-6 - Erdem Eray Cil, Laurent Schmalen:
Log-Log Domain Sum-Product Algorithm for Information Reconciliation in Continuous-Variable Quantum Key Distribution. 1-6 - Pei-Duo Yu, Liang Zheng, Chee Wei Tan:
Contagion Source Detection by Maximum Likelihood Estimation and Starlike Graph Approximation. 1-6 - Ryan Szlosek, Mojtaba Vaezi:
An Efficient Implementation of Coarse Carrier Synchronization Utilizing Band Edge Filters. 1-5 - Lucas H. McCabe:
Nonparametric Estimation and Comparison of Distance Distributions from Censored Data. 1-6 - Alon Zabatani, Shay Kreymer, Tamir Bendory:
Score-based diffusion priors for multi-target detection. 1-6 - Andrey Garnaev, Wade Trappe:
A Fair Anti-Eavesdropping Strategy for Communication with Several Receivers. 1-6 - Jeannie He, Ming Xiao, Mikael Skoglund:
Straggler-Resilient Asynchronous Decentralized ADMM for Consensus Optimization. 1-6 - Shusuke Shirotake, Kana Shimizu:
Efficient Privacy Preserving Range Query Using Segment Tree. 1-6 - W. Steven Gray, Natalie Pham, Alexander Schmeding:
Distributional Generating Series in Nonlinear Control Theory. 1-6 - Samuel Leone, Xingzhi Sun, Michael Perlmutter, Smita Krishnaswamy:
Bayesian Spectral Graph Denoising with Smoothness Prior. 1-6 - Lingyi Xu, Zoran Gajic:
Comparisons of Different Dynamic Game Reinforcement Learning Optimal Strategies for A Non-holonomic Vehicle. 1-6 - Yue Qi, Mojtaba Vaezi:
NOMA Decoding: Successive Interference Cancellation or Maximum Likelihood Detection? 1-6 - Yunqi Li, Hanxiong Chen, Lanjing Zhang, Yongfeng Zhang:
Fairness in Survival Outcome Prediction for Medical Treatments. 1-6 - Satyajit Thakor:
Constrained Entropy Vectors: Some Direct and Converse Results. 1-6 - Morriel Kasher, Michael Tinston, Predrag Spasojevic:
Post-Quantization Dithering with Look-Up Tables. 1-6 - Gokberk Yaylali, Dionysios S. Kalogerias:
Stochastic Resource Allocation via Dual Tail Waterfilling. 1-6 - Dionysis Kalogerias, Spyridon Pougkakiotis:
Strong Duality Relations in Nonconvex Risk-Constrained Learning. 1-6 - Ishaan Batta, Anees Abrol, Vince D. Calhoun:
A Novel Deep Subspace Learning Framework to Automatically Uncover Assessment-Specific Independent Brain Networks. 1-6 - Omar Alotaibi, Brian L. Mark:
Object Tracking Incorporating Transfer Learning into an Unscented Kalman Filter. 1-6 - Emily Payne, Shining Sun, Astrid Layton, Katherine R. Davis, Shamina Hossain-McKenzie, Nicholas Jacobs:
Insight Into Cyber Information Flow Interdependencies Using Bio-inspired Topologies. 1-6 - Kayvon Mazooji, Ilan Shomorony:
An Instance-Based Approach to the Trace Reconstruction Problem. 1-6 - Andrew S. Gordon, Andrew Feng:
Combining the Predictions of Out-of-Domain Classifiers Using Etcetera Abduction. 1-6 - Jaeeun Jang, Sangmin Kim, Mikyoung Lee, Mira Yun, Charles Wiseman:
imEL: Instance-level Masked Entity Linking Model. 1-6 - Ziqing Lu, Guanlin Liu, Lifeng Lai, Weiyu Xu:
Optimal Cost Constrained Adversarial Attacks for Multiple Agent Systems. 1-6 - HanQin Cai, Longxiu Huang, Chandra Kundu, Bowen Su:
On the Robustness of Cross-Concentrated Sampling for Matrix Completion. 1-5 - Hwanjin Kim, Hongjae Nam, David J. Love:
Robust Over-the-Air Federated Learning. 1-6 - Shreya Meel, Sennur Ulukus:
Distributed Optimization with Feasible Set Privacy. 1-6 - Yunqi Li, Lanjing Zhang, Yongfeng Zhang:
Probing into the Fairness of Large Language Models: A Case Study of ChatGPT. 1-6 - Bo Guan, Shuangqing Wei, Amir Houmansadr, Hossein Pishro-Nik, Dennis Goeckel:
Optimal Obfuscation to Protect Client Privacy in Federated Learning. 1-6 - Jirí Mazurek, Ryszard Janicki:
A Hybrid Stochastic-Full Enumeration Approach to a Ranking Problem with Insufficient Information. 1-6 - Martin Dahl, Erik G. Larsson:
Over-the-Air Federated Learning with Phase Noise: Analysis and Countermeasures. 1-6 - Xi Zhang, Qixuan Zhu:
Integrated Sensing, Communications, and Powering for Statistical-QoS Provisioning Over Next-Generation Massive-MIMO Mobile Networks. 1-6 - Shi-Yuan Wang, Meng-Che Chang, Matthieu R. Bloch:
Covert Joint Communication and Sensing under Variational Distance Constraint. 1-6 - Mohamed Nomeir, Sajani Vithana, Sennur Ulukus:
Asymmetric X-Secure T-Private Information Retrieval: More Databases is Not Always Better. 1-6 - Batoul Taki, Anand D. Sarwate, Waheed U. Bajwa:
Low Separation Rank in Tensor Generalized Linear Models: An Asymptotic Analysis. 1-6 - Enes Arda, Emrecan Kutay, Aylin Yener:
Semantic Forwarding for Next Generation Relay Networks. 1-6 - John J. Kelly, Jonathan Ashdown:
Unsupervised User Selection for Efficient MIMO Communications Spectrum Sharing. 1-6 - Rafid Umayer Murshed, Md. Saheed Ullah, Mohammad Saquib:
A Fast Effective Greedy Approach for MU-MIMO Beam Selection in mm-Wave and THz Communications. 1-6 - Jingbo Liu:
Improving the Lower Bound for the Union-closed Sets Conjecture via Conditionally IID Coupling. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.