Name
Papers
Collaborators
P. MOULIN
36
43
Citations 
PageRank 
Referers 
270
34.41
502
Referees 
References 
554
329
Search Limit
100554
Title
Citations
PageRank
Year
Faster subgradient methods for functions with Hölderian growth20.392020
Information-theoretic characterizations of Markov random fields and subfields.00.342019
Random Ensemble of Locally Optimum Detectors for Detection of Adversarial Examples.00.342018
Local and global convergence of a general inertial proximal splitting scheme for minimizing composite functions.20.372017
The Log-Volume of Optimal Codes for Memoryless Channels, Asymptotically Within A Few Nats20.392017
Lower bounds on rate of fixed-length source codes under average- and 6-fidelity constraints.00.342017
Locally optimal detection of adversarial inputs to image classifiers00.342017
Active Online Anomaly Detection Using Dirichlet Process Mixture Model and Gaussian Process Classification30.372017
On Characterizations of Markov Random Fields and Subfields.10.402016
Approximationorder of the lap optical flow algorithm20.372015
Second- and Higher-Order Asymptotics For Erasure and List Decoding.00.342014
Second-order capacities of erasure and list decoding10.362014
On the Fingerprinting Capacity Games for Arbitrary Alphabets and Their Asymptotics150.652014
Real Adaboost for content identification20.402012
Model-based decoding metrics for content identification70.502012
A Message-Passing Approach to Combating Desynchronization Attacks70.482011
A universal divergence-rate estimator for steganalysis in timing channels10.362010
Strong converse for Gel'fand-Pinsker channel10.352009
Performance of orthogonal fingerprinting codes under worst-case noise90.572009
Combating desynchronization attacks on blind watermarking systems: A message passing approach00.342009
Regular Simplex Fingerprints and Their Optimality Properties81.022009
Saddle-point solution of the fingerprinting capacity game under the marking assumption251.102009
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions542.802008
Capacity and optimal collusion attack channels for Gaussian fingerprinting games80.642007
Cramer-Rao bound on watermark desynchronization parameter estimation accuracy00.342007
Sphere Packing Lower Bound on Fingerprinting Error Probability20.372007
Noniterative Algorithms for Sensitivity Analysis Attacks120.872007
Optimality of KLT for High-Rate Transform Coding of Gaussian Vector-Scale Mixtures: Application to Reconstruction, Estimation, and Classification150.992006
Guest editorial special issue on signal processing for data hiding in digital media and secure content delivery111.382003
A self-referencing level-set method for image reconstruction from sparse Fourier samples81.052002
Asymptotic global confidence regions in parametric shape estimation problems153.102000
Frame interpolation and bidirectional prediction of video using compactly encoded optical-flow fields and label fields282.091999
Switched control grid interpolation for motion compensated video coding60.651997
Multiscale Motion Estimation For Scalable Video Coding30.561996
An application of splines to maximum likelihood radar imaging40.901992
A method of sieves for multiresolution spectrum estimation and radar imaging168.581992