Faster subgradient methods for functions with Hölderian growth | 2 | 0.39 | 2020 |
Information-theoretic characterizations of Markov random fields and subfields. | 0 | 0.34 | 2019 |
Random Ensemble of Locally Optimum Detectors for Detection of Adversarial Examples. | 0 | 0.34 | 2018 |
Local and global convergence of a general inertial proximal splitting scheme for minimizing composite functions. | 2 | 0.37 | 2017 |
The Log-Volume of Optimal Codes for Memoryless Channels, Asymptotically Within A Few Nats | 2 | 0.39 | 2017 |
Lower bounds on rate of fixed-length source codes under average- and 6-fidelity constraints. | 0 | 0.34 | 2017 |
Locally optimal detection of adversarial inputs to image classifiers | 0 | 0.34 | 2017 |
Active Online Anomaly Detection Using Dirichlet Process Mixture Model and Gaussian Process Classification | 3 | 0.37 | 2017 |
On Characterizations of Markov Random Fields and Subfields. | 1 | 0.40 | 2016 |
Approximationorder of the lap optical flow algorithm | 2 | 0.37 | 2015 |
Second- and Higher-Order Asymptotics For Erasure and List Decoding. | 0 | 0.34 | 2014 |
Second-order capacities of erasure and list decoding | 1 | 0.36 | 2014 |
On the Fingerprinting Capacity Games for Arbitrary Alphabets and Their Asymptotics | 15 | 0.65 | 2014 |
Real Adaboost for content identification | 2 | 0.40 | 2012 |
Model-based decoding metrics for content identification | 7 | 0.50 | 2012 |
A Message-Passing Approach to Combating Desynchronization Attacks | 7 | 0.48 | 2011 |
A universal divergence-rate estimator for steganalysis in timing channels | 1 | 0.36 | 2010 |
Strong converse for Gel'fand-Pinsker channel | 1 | 0.35 | 2009 |
Performance of orthogonal fingerprinting codes under worst-case noise | 9 | 0.57 | 2009 |
Combating desynchronization attacks on blind watermarking systems: A message passing approach | 0 | 0.34 | 2009 |
Regular Simplex Fingerprints and Their Optimality Properties | 8 | 1.02 | 2009 |
Saddle-point solution of the fingerprinting capacity game under the marking assumption | 25 | 1.10 | 2009 |
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions | 54 | 2.80 | 2008 |
Capacity and optimal collusion attack channels for Gaussian fingerprinting games | 8 | 0.64 | 2007 |
Cramer-Rao bound on watermark desynchronization parameter estimation accuracy | 0 | 0.34 | 2007 |
Sphere Packing Lower Bound on Fingerprinting Error Probability | 2 | 0.37 | 2007 |
Noniterative Algorithms for Sensitivity Analysis Attacks | 12 | 0.87 | 2007 |
Optimality of KLT for High-Rate Transform Coding of Gaussian Vector-Scale Mixtures: Application to Reconstruction, Estimation, and Classification | 15 | 0.99 | 2006 |
Guest editorial special issue on signal processing for data hiding in digital media and secure content delivery | 11 | 1.38 | 2003 |
A self-referencing level-set method for image reconstruction from sparse Fourier samples | 8 | 1.05 | 2002 |
Asymptotic global confidence regions in parametric shape estimation problems | 15 | 3.10 | 2000 |
Frame interpolation and bidirectional prediction of video using compactly encoded optical-flow fields and label fields | 28 | 2.09 | 1999 |
Switched control grid interpolation for motion compensated video coding | 6 | 0.65 | 1997 |
Multiscale Motion Estimation For Scalable Video Coding | 3 | 0.56 | 1996 |
An application of splines to maximum likelihood radar imaging | 4 | 0.90 | 1992 |
A method of sieves for multiresolution spectrum estimation and radar imaging | 16 | 8.58 | 1992 |