


default search action
55th CISS 2021: Baltimore, MD, USA
- 55th Annual Conference on Information Sciences and Systems, CISS 2021, Baltimore, MD, USA, March 24-26, 2021. IEEE 2021, ISBN 978-1-6654-1268-1

- Imtinan Azhar, Imad Afyouni, Ashraf Elnagar

:
Facilitated Deep Learning Models for Image Captioning. 1-6 - Agustin Castellano, Juan Andrés Bazerque

, Enrique Mallada:
Model-free safe policy learning via hard action barrier functions. 1 - Qing Yang, Hao Wang

:
Exploring Blockchain for The Coordination of Distributed Energy Resources. 1-6 - Leilani H. Gilpin:

Anticipatory Thinking: A Testing and Representation Challenge for Self-Driving Cars. 1-2 - Yiheng Lin

:
Online Optimization with Predictions and Non-convex Losses. 1 - Nawin Najat Mohammed, Chewan Jalal Mohammed:

Enhanced Determination of Gene Groups Based on Optimal Kernel PCA with Hierarchical Clustering Algorithm. 1-5 - Anthony Kelly, Marc Anthony Johnson:

Investigating the Statistical Assumptions of Naïve Bayes Classifiers. 1-6 - Meng Zhang, Deepanshu Vasal:

Mechanism Design for Large Scale Network Utility Maximization. 1-6 - Travis C. Cuvelier, Takashi Tanaka:

Rate of Prefix-free Codes in LQG Control Systems with Side Information. 1-6 - Gregory Falco:

Autonomy's Hierarchy of Needs: Smart City Ecosystems for Autonomous Space Habitats. 1-6 - Kouhei Kita, Ryuya Uda:

Malware Subspecies Detection Method by Suffix Arrays and Machine Learning. 1-6 - Ryan Vegrzyn, Benedito J. B. Fonseca

:
Optimizing Sensor Locations to Improve the Worst Case Detection Performance of Sensor Detection Systems. 1-6 - Adam Kortylewski, Ju He, Qing Liu, Christian Cosgrove, Chenglin Yang, Alan L. Yuille

:
Compositional Generative Networks and Robustness to Perceptible Image Changes. 1-8 - Danielle Currey

, David Hsu
, Raheel Ahmed, Archana Venkataraman, Jeff Craley:
Cross-site Epileptic Seizure Detection Using Convolutional Neural Networks. 1-6 - John Franklin, A. Brinton Cooper:

Kronecker Compressive Sensing for OFDM Channel Estimation in Millimeter Wave Channels. 1-6 - Md Tanvir Arafin

, Kevin T. Kornegay
:
Attack Detection and Countermeasures for Autonomous Navigation. 1-6 - Michael A. Tope, Joel M. Morris:

Improvements to Sanov and PAC Sublevel-set Bounds for Discrete Random Variables. 1-6 - Peter O. Taiwo

, Arlene A. Cole-Rhodes
:
Performance of a Blind Adaptive Digital Beamformer on a Multi-user Rician Channel. 1-6 - Vinay Nair, Savani Suranglikar, Sourabh Deshmukh, Yashraj Gavhane:

Multi-labelled Ocular Disease Diagnosis Enforcing Transfer Learning. 1-6 - Jinhang Zuo, Carlee Joe-Wong:

Combinatorial Multi-armed Bandits for Resource Allocation. 1-4 - Shaohan Wu

:
A Hybrid Approach to Joint Estimation of MIMO Channel and Antenna Impedance Matrices. 1-6 - Nishant Zachariah, Isidoros Doxas, Jamal Molin:

Parameter Estimation using Random 1 bit Streams (PEERS). 1-4 - Xi Zhang, Jingqing Wang, H. Vincent Poor:

AoI-Driven Statistical Delay and Error-Rate Bounded QoS Provisioning for URLLC in the Finite Blocklength Regime. 1-6 - Jennifer Hsia, Peter J. Ramadge:

An Experimental Study of Balance in Matrix Factorization. 1-6 - Nandi Leslie:

An Unsupervised Learning Approach for In-Vehicle Network Intrusion Detection. 1-4 - Jonah P. Sengupta, Martin Villemur

, Andreas G. Andreou
:
Efficient, event-driven feature extraction and unsupervised object tracking for embedded applications. 1-6 - Xi Zhang, Jingqing Wang, H. Vincent Poor:

Statistical Delay and Error-Rate Bounded QoS Provisioning for SWIPT Over CF M-MIMO Based IoT Networks Using FBC. 1-6 - Jason Hughes, Juntao Chen:

Fair and Distributed Dynamic Optimal Transport for Resource Allocation over Networks. 1-6 - Xi Zhang, Qixuan Zhu, H. Vincent Poor:

Statistical Bounded Age-Of-Information for mURLLC Over 6G Multimedia Wireless Networks. 1-6 - Subhonmesh Bose, Mariola Ndrio, Avinash N. Madavan, Lang Tong, Ye Guo:

Risk-Sensitive Optimization And Pricing For The Modern Power Grid. 1 - Yariv Ephraim, Joshua Coblenz, Brian L. Mark, Hanoch Lev-Ari:

Mixed Poisson Traffic Rate Network Tomography. 1-6 - Abhishek Shende, Deepanshu Vasal, Sriram Vishwanath:

Network Design for Social Welfare. 1-6 - Yuwei Sun, Hideya Ochiai, Hiroshi Esaki:

Deep Learning-Based Anomaly Detection in LAN from Raw Network Traffic Measurement. 1-5 - Yu-Chung Peng, Niharika Shimona D'Souza, Brian Bush, Charles Brown, Archana Venkataraman:

Predicting Acute Kidney Injury via Interpretable Ensemble Learning and Attention Weighted Convoutional-Recurrent Neural Networks. 1-6 - Shiqing Sun, James C. Spall:

Connection of Diagonal Hessian Estimates to Natural Gradients in Stochastic Optimization. 1-6 - Brian Johnson:

Control of Stacked Power Electronics Systems. 1 - Shriya T. P. Gupta, Pablo Linares-Serrano, Basabdatta Sen Bhattacharya

, Teresa Serrano-Gotarredona:
Foveal-pit inspired filtering of DVS spike response. 1-6 - Deniz Sargun, C. Emre Koksal:

Quickest Detection over Sensor Networks with Unknown Post-Change Distribution. 1-6 - Tomoya Suzuki, Ryuya Uda:

Recognition of Digits on License Plate by RAISR with Changing Contrast Ratio. 1-6 - Melih Bastopcu

, Sennur Ulukus:
Timely Group Updating. 1-6 - Justice Darko, Larkin Folsom, Niharika Deshpande, Hyoshin Park:

Distributed Constraint Optimization Problem for Coordinated Response of Unmanned Aerial Vehicles and Ground Vehicles. 1-6 - Arnold Chau, John F. Dawson

, Paul D. Mitchell:
Directional Hub Slotted Aloha Medium Access Control Protocol for Wireless Sensor Networks with Directional Antennas. 1-6 - Manos Athanasakos

:
Secure Coding for the Gaussian Wiretap Channel with Sparse Regression Codes. 1-5 - Yuchen Liang

, Venugopal V. Veeravalli:
Non-Parametric Quickest Detection of a Change in the Mean of an Observation Sequence. 1-6 - Sihang Jiang, James C. Spall:

Comparison between Expected and Observed Fisher Information in Interval Estimation. 1-6 - Getachew K. Befekadu:

Large deviations and rare events in the study of processes describing the spread of traffic congestions in urban network systems. 1-6 - Iyanuoluwa Emiola, Laurent Njilla, Chinwendu Enyioha:

On Distributed Optimization in the Presence of Malicious Agents. 1-6 - Lucas Zanco Ladeira, Luiz Cesar Borro, Ricardo Paranhos Velloso Violato, Graziella Cardoso Bonadia:

RAAF: Resource-Aware Auto Featuring. 1-6 - Muhammad Haris, Minhaj Ahmed Moin, Farooq Abdul Rehman, Muhammad Farhan:

Vehicle Crash Prediction using Vision. 1-5 - W. Steven Gray, Kurusch Ebrahimi-Fard, Alexander Schmeding

:
Universal Zero Dynamics: The SISO Case. 1-6 - Mubarak A. Alanazi

, Abdullah K. Alhazmi, Chris Yakopcic, Vamsy P. Chodavarapu:
Machine Learning Models for Human Fall Detection using Millimeter Wave Sensor. 1-5 - Yiwen Chen:

Comparison of RDSA and SPSA algorithms with different perturbations. 1-6 - Hendrik Bernd Petersen

, Shankar Agarwal
, Peter Jung
, Bubacarr Bah
:
Improving the Reliability of Pooled Testing with Combinatorial Decoding and Compressed Sensing. 1-5 - Stephanie Brandt, James Enciso, Tom Petty, Dean Scribner, Nishant Zachariah, Isidoros Doxas:

Spatiotemporal Processing for Neuromorphic Cameras. 1-4 - Weiqiang Dong

, Moshe Kam:
Parallel Decision Fusion with Local Constraints. 1-6 - Yu-Zhen Janice Chen

, Daniel S. Menasché, Don Towsley
:
To Collaborate or Not in Distributed Statistical Estimation with Resource Constraints? 1-6 - Mohammadreza Robaei, Robert Akl:

Characterizing Non-Stationary Millimeter-Wave Communication Using Fuzzy Entropy. 1-6 - Long Wang, Jingyi Zhu, James C. Spall:

Model-Free Optimal Control using SPSA with Complex Variables. 1-5 - Sandip Roy, Wenyun Ju, Neeraj Nayak, Bernard C. Lesieutre:

Localizing Power-Grid Forced Oscillations Based on Harmonic Analysis of Synchrophasor Data. 1-5 - Mohammad Reza Zare, Mehdi Mehtarizadeh

:
An Ensemble of Deep Semantic Representation for Medical X-ray Image Classification. 1-6 - Wenbo Ren, Jia Liu, Ness B. Shroff:

On Logarithmic Regret for Bandits with Knapsacks. 1-6 - Nicolás Rodríguez, Pedro Julián

, Martin Villemur
:
Symmetric Simplicial Neural Networks. 1-6 - Quanying Liu, Christian Kurniawan

, Chenxi Xu, Siddhant Jagtap, Xiyu Deng, Kexin Lou, Yong Sheng Soh, Yorie Nakahira:
Axon Arbor Trade-off Between Wiring Cost, Delay, and Synchronization in Neuronal Networks. 1-6 - Daniel R. Mendat, Jonah P. Sengupta, Drake K. Foreman, Andreas G. Andreou

:
Parallel Computation of Event-Based Visual Features Using Relational Graphs. 1-6 - Greig Richmond, Arlene A. Cole-Rhodes

:
Image Deblurring using Multi-Scale Dilated Convolutions in a LSTM-based Neural Network. 1-6 - Osvald Frisk, Friedrich Dörmann, Christian Marius Lillelund, Christian Fischer Pedersen:

Super-convergence and Differential Privacy: Training faster with better privacy guarantees. 1-6 - Rajesh K. Mishra, Deepanshu Vasal, Sriram Vishwanath:

Decentralized Multi-agent Reinforcement Learning with Shared Actions. 1-6 - Yue Chen, Changhong Zhao

, Steven H. Low, Shengwei Mei:
Approaching Prosumer Social Optimum via Energy Sharing with Proof of Convergence. 1 - Avik Sengupta, Bishwarup Mondal, Victor Sergeev, Alexei Davydov, Apostolos Papathanassiou:

Contiguous Multi-User Scheduling and Power Control for 5G-NR Uplink. 1-6 - Necmiye Ozay

:
A fresh look at some classical system identification methods. 1 - Gianluigi Liva, Enrico Paolini, Marco Chiani:

Optimum Detection of Defective Elements in Non-Adaptive Group Testing. 1-6 - Manish Kumar Singh, Sarthak Gupta, Vassilis Kekatos

:
Machine Learning for Optimal Inverter Operation in Distribution Grids. 1 - Guanya Shi:

Competitive Control via Online Optimization with Memory, Delayed Feedback, and Inexact Predictions. 1 - Zhuobin Lin, Xuechen Chen, Xuming Lu, Hongzhou Tan:

A Practical Low Delay Digital Scheme for Wyner-Ziv Coding over Gaussian Broadcast Channel. 1-6 - Xiaojian Zhang, Yu Yang

, Abigail L. Cochran
, Noreen McDonald, Xilei Zhao:
Optimizing Demand-Responsive Paratransit Operations: A Mixed Integer Programming Approach. 1-6 - Moustapha Pemy

:
Optimal VWAP Strategies under Regime Switching. 1-6 - Vincent Roulet, Zaïd Harchaoui

:
On the Smoothing of Deep Networks. 1-6 - Lanier A. Watkins, Denzel Hamilton, Kevin T. Kornegay

, Aviel Rubin:
Triaging Autonomous Drone Faults By Simultaneously Assuring Autonomy and Security. 1-6 - Thirupathaiah Vasantam, Don Towsley

, Venugopal V. Veeravalli:
Quickest Change Detection in the Presence of Transient Adversarial Attacks. 1-6 - Ahmadreza Moradipari, Sanae Amani, Mahnoosh Alizadeh, Christos Thrampoulidis:

Safe Linear Bandits. 1 - Shaoru Chen, Mahyar Fazlyab

, Manfred Morari, George J. Pappas
, Victor M. Preciado:
Learning Lyapunov Functions for Hybrid Systems. 1 - Narjis Zehra, Syed Hamza Azeem, Muhammad Farhan

:
Human Activity Recognition Through Ensemble Learning of Multiple Convolutional Neural Networks. 1-5 - Huaizheng Mu, Jenny Liu, Robert L. Ewing, Jia Li:

Human Indoor Positioning via Passive Spectrum Monitoring. 1-6 - Xingyu Zhou, Ness B. Shroff:

No-Regret Algorithms for Time-Varying Bayesian Optimization. 1-6 - Mini Jain, Peya Mowar

, Ruchika Goel, Dinesh Kumar Vishwakarma:
Clickbait in Social Media: Detection and Analysis of the Bait. 1-6 - Muhammad Ibraheem Siddiqui

, Khurram Jadoon:
An Improved Interest Point Detection Approach Based on Combined Harris-SIFT Principles. 1-5 - Lucas Zanco Ladeira, Pedro Eduardo Baird, Filipe Edson da Silveira P. Palma:

Spectrometry for Light Bulb Classification. 1-6 - John W. Simpson-Porco, Nima Monshizadeh:

On Stability of Automatic Generation Control. 1 - Swastik Brahma, Satyaki Nan, Laurent Njilla:

Strategic Hardware Trojan Testing with Hierarchical Trojan Types. 1-6 - Dominic Groß

:
Energy-balancing AC and DC grid-forming control for power converters. 1 - Athindran Ramesh Kumar

, Peter J. Ramadge:
DiffLoop: Tuning PID Controllers by Differentiating Through the Feedback Loop. 1-6 - Xi Zhang, Qixuan Zhu, H. Vincent Poor:

Age-of-Information for mURLLC Over 6G Multimedia Wireless Networks. 1-6 - Sai Susheel Praneeth Kode, Yuri B. Shtessel:

Launch Vehicle Control Design Using Sliding Mode Control Toolbox. 1-6 - Emna Ben Yacoub, Gianluigi Liva, Enrico Paolini:

Bounds on the Error Probability of Nonbinary Linear Codes over the Q-ary Symmetric Channel. 1-6 - Ahmed A. Alabdel Abass, Narayan B. Mandayam, Zoran Gajic:

CYBEX Information Sharing Game with Objective and Subjective Players. 1-5 - Nematollah Iri:

Type Size Code for Compressing Erdos-Rényi Graphs. 1-6 - Xuan Wu, James C. Spall:

Improved Monte Carlo Estimation of the Fisher Information Matrix with Independent Perturbations. 1-5 - Maciej Skorski

:
Modern Analysis of Hutchinson's Trace Estimator. 1-5 - Tasmeer Alam, Richard A. Dean, Mulugeta Dugda, Farzad Moazzami:

Implementation of Adaptive OFDM for Aeronautical Channel. 1-5 - Jonah P. Sengupta, Martin Villemur

, Andreas G. Andreou
:
A Spike-based Cellular-Neural Network Architecture for Spatiotemporal filtering. 1-6 - Xingjian Sun, Shailee Yagnik, Lei Cao, Ramanarayanan Viswanathan

:
Coupling Effect of Single-Threshold Sensor Rules in Two-Sensor Tandem Network. 1-6 - Melih Bastopcu

, Sennur Ulukus:
Cache Freshness in Information Updating Systems. 1-6 - Zafar Ali

, Guilin Qi, Khan Muhammad
, Asim Khalil, Inam Ullah
, Amin Khan:
Global Citation Recommendation employing Multi-view Heterogeneous Network Embedding. 1-6 - Ana M. Ospina, Emiliano Dall'Anese:

Personalized Online Optimization of Networked Systems via Gaussian Processes. 1 - Matthew Aldridge

:
Pooled testing to isolate infected individuals. 1-5 - Andrey Gomzin, Mikhail Drobyshevskiy, Denis Turdakov

:
Context Specificity Matters: Profile Attributes Prediction for Social Network Users. 1-6 - Jessica Maghakian, Russell Lee, Mohammad H. Hajiesmaili, Jian Li, Zhenhua Liu, Ramesh K. Sitaraman:

Leveraging Different Types of Predictors for Online Optimization (Invited Paper). 1 - Farhad Farokhi

:
Using Rényi-divergence and Arimoto-Rényi Information to Quantify Membership Information Leakage. 1-6 - Rakesh Pavan, Madhumitha Nara, Suhas Gopinath, Nagamma Patil:

Bayesian Optimization and Gradient Boosting to Detect Phishing Websites. 1-5 - Yassine Laguel

, Krishna Pillutla, Jérôme Malick, Zaïd Harchaoui
:
A Superquantile Approach to Federated Learning with Heterogeneous Devices. 1-6 - Tao Li

, Guanze Peng, Quanyan Zhu:
Blackwell Online Learning for Markov Decision Processes. 1-6 - Thomas B. Woolf, Justin Tervala, Ian Carter:

Controlling Collective Motions of Self-Propelled Particles by Mean Field Couplings Defined by Topology. 1-5 - Abu Sufian, Changsheng You, Mianxiong Dong:

A Deep Transfer Learning-based Edge Computing Method for Home Health Monitoring. 1-6 - Yasuki Kakishita, Anirban Ray, Hideharu Hattori, Akiko Hisada, Yusuke Ominami, Jean-Pierre Baudoin, Jacques Yaacoub Bou Khalil

, Didier Raoult
:
Quantitative Analysis System for Bacterial Cells in SEM Image using Deep Learning. 1-6 - Michael A. Tope, Joel M. Morris:

A PAC-bound on the Channel Capacity of an Observed Discrete Memoryless Channel. 1-6 - Youbang Sun, Shahin Shahrampour:

Distributed Mirror Descent with Integral Feedback: Convergence Analysis from a Dynamical System Perspective. 1 - Hailu Belay Kassa, Kevin T. Kornegay

, Ebrima N. Ceesay:
Energy Efficiency Analysis of RLS-MUSIC based Smart Antenna System for 5G Network. 1-5 - Rajeev Sahay, David J. Love, Christopher G. Brinton

:
Robust Automatic Modulation Classification in the Presence of Adversarial Attacks. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














