Abstract-Malicious attacks against power system state estimation are considered. It has been recently observed that if an adversary is able to manipulate the measurements taken at ...
Oliver Kosut, Liyan Jia, Robert J. Thomas, Lang To...
Abstract—Compressive sampling (CS) has emerged as significant signal processing framework to acquire and reconstruct sparse signals at rates significantly below the Nyquist rate...
—This paper presents the system level performance evaluation for energy-detection based cooperative spectrum sensing in cognitive radio networks. Three performance criteria are q...
Probabilistic inference in graphical models is a prevalent task in statistics and artificial intelligence. The ability to perform this inference task efficiently is critical in l...
Hamsi is one of the 14 second-stage candidates in NIST’s SHA-3 competition. The only previous attack on this hash function was a very marginal attack on its 256-bit version publi...