Abstract-Malicious attacks against power system state estimation are considered. It has been recently observed that if an adversary is able to manipulate the measurements taken at ...
Oliver Kosut, Liyan Jia, Robert J. Thomas, Lang To...
Due to the explosion of various video applications and services it is becoming increasingly important to accurately measure video quality in real-time. Since reference information...
Tao Liu, G. Cash, Wen Chen, Chunhua Chen, Jeffrey ...
—Gaussian belief propagation is an iterative algorithm for computing the mean of a multivariate Gaussian distribution. Equivalently, the min-sum algorithm can be used to compute ...
— We study the two-user one-eavesdropper discrete memoryless compound wiretap channel, where the transmitter sends a common confidential message to both users, which needs to be...
—Recovery of sparse signals from noisy observations is a problem that arises in many information processing contexts. LASSO and the Dantzig selector (DS) are two well-known schem...
—Distributed transmit beamforming has recently been proposed as a technique in which several single-antenna sources cooperate to form a virtual antenna array and simultaneously t...
Abstract— An analytically tractable model for Gaussian multiuser channels with fading is studied, and the capacity region of this model is found to be a good approximation of the...
—Frame permutation quantization (FPQ) is a new vector quantization technique using finite frames. In FPQ, a vector is encoded using a permutation source code to quantize its fra...
Abstract—The capacity region of Gaussian interference channel in the weak interference regime is an open problem. Recently, Etkin, Tse and Wang derived an outer bound for the two...
—We consider broadcasting from a single source to multiple destinations in a linear wireless erasure network with feedback. The problem is to find the maximum stable throughput ...