


default search action
59th CISS 2025: Baltimore, MD, USA
- 59th Annual Conference on Information Sciences and Systems, CISS 2025, Baltimore, MD, USA, March 19-21, 2025. IEEE 2025, ISBN 979-8-3315-1326-9
- Joseph Griffin, Peihong Yuan, Ken R. Duffy, Muriel Médard:
Using a Single Parity-Check to Reduce the Guesswork of Guessing Codeword Decoding. 1-6 - Chunying Jia, Weixin Wang, Trung Vu, Hanlu Yang, Ben Gabrielson, Vince D. Calhoun, Tülay Adali:
Adaptive Constrained ICA with Mixing Matrix Column Constraints: Application to fMRI Data. 1-6 - Mandana Farhang Ghahfarokhi, Hyoshin Park, Venktesh Pandey, Gyugeun Yoon:
Integrating Real-Time Machine Learning and Dynamic Charging for Electric Vehicle Routing. 1-6 - Farnaz Boudaghi, Luis A. Duffaut Espinosa:
Extending the Execution Time of Chen-Fliess Series. 1-5 - Van Sy Mai, Richard J. La, Tao Zhang:
Detection of Performance Interference Among Network Slices in 5G/6G Systems. 1-6 - Aditya Shrivastava, Abhijeet Gupta, Shruti Singh, Tan-Cong Nguyen, Aaron Sathyanesan, Tam V. Nguyen:
Mouse Brain Cell Segmentation in Fluorescence Microscopy Images. 1-6 - Hunter Harris, Minh To, Matthew Beach, Dylan Couch, Rebecca A. Garcia, Shawn McNutt, Asad W. Malik, Samee U. Khan:
Resource Description Framework Parsing Method on the UAS Integration Safety and Security Technology Ontology. 1-6 - Padmanabh Kaushik, Yih-Choung Yu, Lisa Gabel:
Using Random Forest and Linear SVM for Dyslexia Classification on Hebb-Williams Mazes. 1-6 - Angela Li, Chengkun Yao, Cheng Li, David Li:
A Dynamic Framework for Optimizing Reward Policies in the Sharing Economy. 1-6 - Leo Kosta, Aaron St. Leger:
A generative model for synchrophasor network traffic in smart grids. 1-6 - Sarah Khalifeh, Ken R. Duffy, Muriel Médard:
Turbo product decoding of cubic tensor codes. 1-6 - Ainaz Jamshidi, Muhammad Arif:
Revolutionizing Fake News Detection: A Quantum Machine Learning Paradigm. 1-3 - Ian DeTore
, John Samsundar, Cleon Davis:
Hybrid 1D and 2D CNN-Transformer Architectures for Multilabel 12-Lead EKG Anomaly Detection. 1-6 - Kareem Bonna, Predrag Spasojevic:
Blind SIMO Channel Estimation Subspace Method with Linear Constraints and Channel Overmodeling: A Sensitivity Study. 1-5 - Ashfia Binte Habib, Ben Gabrielson, Hanlu Yang, Vince D. Calhoun, Tülay Adali:
Grassmannian Kernels for Efficient and Effective Detection of Group Differences in fMRI Data. 1-6 - Amna Gillani, Beatriz Lorenzo, Majid Ghaderi, Fikadu T. Dagefu, Dennis Goeckel:
Optimal Link Configuration for Covert Heterogeneous Wireless Networks with Power Constraints. 1-6 - Ningze Wang, Anoosheh Heidarzadeh, Alex Sprintson:
A Low-Complexity Scheme for Multi-Message Private Information Retrieval. 1-6 - Joseph Amato, Anway Bose, Li Bai:
Optimization-based Control of Variable Speed Diesel Generators. 1-6 - Hossein Maghsoumi, Yaser P. Fallah, George Atia:
SADA: Unsupervised Domain Adaptation for Reliable Scene Awareness. 1-6 - Nandan Joshi, Erhan Guven:
Novel Vector Embeddings by Molecular Attributes helps de-novo Molecular Generation. 1-6 - Omar Alotaibi, Brian L. Mark:
Incorporating Multi-Source Transfer Learning into an Unscented Kalman Filter for Object Tracking. 1-6 - Dongyu Wei, Qianqian Zhang, Yuchen Liu, Mingzhe Chen:
Joint Optimization of Model Splitting and Device Task Assignment for Private Multi-hop Split Learning. 1-6 - Mohammad Reza Fasihi, Brian L. Mark:
QaSAL: QoS-aware State-Augmented Learnable Algorithms for Coexistence of 5G NR-U/Wi-Fi. 1-6 - Mingze Pan, Ying Wang:
LOS/NLOS Classification for UAV Communications: A Time-Frequency Multimodal Learning Approach. 1-6 - Dingwen Pan, Weilong Chen, Jian Shi, Chenye Wu, Dan Wang, Choong Seon Hong, Zhu Han:
Cooperation and Decision-Making of LLM Agents in Bayesian-Informed Infinitely Repeated Games. 1-6 - Satyaki Nan, Nahkiyahs Felder:
Securing Multi-Domain Attacks: A Game Theoretic Approach. 1-6 - Saeed Mohseni-Sehdeh, Walid Saad, Kei Sakaguchi, Tao Yu:
Causal Digital Twins for Physical System Control. 1-6 - Lukas Rapp, Muriel Médard, Ken R. Duffy:
SOGRAND Decoding of Non-binary Product Codes. 1-6 - Yunus Alp Biyikoglu, Vipindev Adat Vasudevan, Muriel Médard:
Modeling Network Coding-Enabled Protocols on Bursty Channels. 1-6 - Nikesh Chithambaram, Abhijeet Gupta, Shruti Singh, Tam V. Nguyen:
Virtual Yoga Instructor with Real-Time Feedback. 1-6 - Joshua A Rothe, Haya Shajaiah:
Resource and Performance Improvements of Optimized Convolutional Neural Networks for FPGA Implementations of Automatic Modulation Recognition. 1-6 - Masoud Malekzadeh, Ahmad Ghasemi, Hossein Pishro-Nik:
Constant-Speed Trajectory Processes for Uniform Coverage in UAV Networks. 1-6 - Steven Jones, A. Brinton Cooper:
Sparse parity random linear codes for URLLC in channels with memory. 1-6 - Eyal Zeltzer, Tirza Routtenberg:
Bayesian Graph Signal Estimation in Nonlinear GSP Models with Multiple Topologies. 1-6 - Sara El Bouch, Samy Labsir, Alexandre Renaux, Jordi Vilà-Valls, Eric Chaumette:
New Insights into Lower Bound for Lie Groups and their Applications. 1-6 - Kevin Lian, Larry S. Liebovitch, Melissa Wild, Harry West, Peter T. Coleman, Francine Chen, Everlyne Kimani, Kate A. Sieck:
Machine Learning Classification of Peaceful Countries: A Comparative Analysis and Dataset Optimization. 1-5 - Yuchen Yang, Thomas Thebaud, Najim Dehak:
Demographic Attributes Prediction from Speech Using WavLM Embeddings. 1-6 - Satyaki Nan:
Behavioral and Strategic Modeling of Trojan Insertion and Testing Under Imperfections. 1-6 - Zhuoran Qi, Rami Rashid, Ali Abdi, Dario Pompili:
Carrier Frequency Offset Compensation for OSDM in Underwater Acoustic Communications: Theory and Experiments Using a Vector MIMO Modem. 1-6 - Hai Victor Habi, Hagit Messer, Yoram Bresler:
Opportunities and challenges in learning to bound. 1-6 - Angela Li, Xinyan Cui, David D. Li:
When a Straight-A Student isn't the Best: Fuzzy Ranking and Optimization from a Probabilistic Perspective. 1-6 - Reza Babaei, Huong Pham, Samuel Cheng, Shangqing Zhao:
EADR: Entropy Adjusted Dynamic Routing Capsule Networks. 1-6 - Nadav E. Rosenthal, Joseph Tabrikian:
Misspecified Barankin Type Bound. 1 - Zavareh Bozorgasl, Hao Chen, Mohammad J. Dehghani:
2D-DOA Estimation in Uniform Circular Arrays in the Presence of Mutual Coupling. 1-6 - Zhirui Liang, Qi Li, Anqi Liu, Yury Dvorkin:
Prescribing Decision Conservativeness in Two-Stage Power Markets: A Distributionally Robust End-to-End Approach. 1-6 - Emin Erdem Kumbasar, Hanlu Yang, Trung Vu, Vince D. Calhoun, Tülay Adali:
Fusion of Multitask fMRI Data with Constrained Independent Vector Analysis. 1-6 - Atiyeh Sayadi, Baran Shajari, Ryszard Janicki:
Minimizing Inconsistency in Pairwise Comparison Matrices Using Genetic Algorithm. 1-6 - Matthew Crespo, Chinwendu Enyioha:
Distributed Policy Evaluation with Local Updates over Time-Varying Communication Network. 1-6 - Christ D. Richmond:
On the Misspecified Cramér-Rao Bound and Elliptically Symmetric Distributions. 1-5 - Kathleen Yang, Muriel Médard, Ken R. Duffy:
GRAND-AM in uplink MIMO NOMA systems. 1-6 - Roy Maiberger, Yakov Gusakov, Tirza Routtenberg:
Empirical Evaluation of ENF Extraction Methods for Accurate Timestamping in Multimedia Forensics. 1-6 - Kevin Lian, Larry S. Liebovitch, Melissa Wild, Harry West, Peter T. Coleman, Francine Chen, Everlyne Kimani, Kate A. Sieck:
Classifying Peace in Global Media Using RAG and Intergroup Reciprocity. 1-6 - Chandra Kundu, Abiy Tasissa, HanQin Cai:
Structured Sampling for Robust Euclidean Distance Geometry. 1-6 - Ainaz Jamshidi, Muhammad Arif, Sabir Ali Kalhoro, Alexander F. Gelbukh:
Synthetic Time Series Data Generation for Healthcare Applications: A PCG Case Study. 1-6 - Tasmeer Alam, Kofi Nyarko, Celeste Chavis, Kelechi Nwachukwu, Anjolie Anthony, Opeyemi Adeniran, Richard Pianim:
Automated Traffic Video Analysis with a Modular Computer Vision Pipeline and SQL-Based Analytics. 1-6 - Yalin E. Sagduyu, Tugba Erpek, Sastry Kompella, Kemal Davaslioglu:
Relay Selection and User Equipment Admission in Resource-Efficient NextG Sidelink Communications. 1-6 - Christopher C. Pack, Charles D. Pack:
Kalman Filter-Mutual Information Models Suggest Improved Training Protocols for Treating Cortical Blindness. 1-6 - Geng Zhang, James C. Spall:
Comparative Confidence Regions using Expected and Observed Fisher Information. 1-6 - Abhinav Kumar, Swastik Brahma, Charles A. Kamhoua:
A Hypothesis Testing-based Cyber Deception Framework under Sequential Reconnaissance. 1-6 - Zhihao Zhang, Zhanhao Zhang, Javier Garcia-Frías:
Analog Coding for Bandwidth Expansion. 1-6 - Angela Li, Yu Wang, David Li:
IDOS: Lightweight Nonparametric Outlier Detection Algorithm for Resource-Constrained Applications. 1-6 - Zhuoxuan Ju, Milos Doroslovacki:
Mobile User-RIS Channel Estimation Using Kalman Filter based Approaches. 1-6 - Daniel Wang, Sridevi V. Sarma, Aaron L. Sampson, Veit Stuphorn, Ernst Niebur, Pierre Sacré, Jorge González-Martínez, Daniel B. Dorman:
Neural correlates from the middle temporal gyrus via machine learning decode decision making variables during gambling in humans. 1-6 - Bo Guan, Dennis L. Goeckel:
Channel Decoding from Multiple Looks Under Receiver Impairments. 1-6 - Sujatha Alla, Nagesh Bheesetty, Hyoshin John Park:
Informative Path Planning for Nano-Surgical Robot Adaptive Drug Delivery. 1-6 - Zavareh Bozorgasl, Hao Chen:
Communication-Efficient Federated Learning via Clipped Uniform Quantization. 1-6 - Dariush Kari, Yongjie Zhuang, Andrew C. Singer:
Mismatch-Robust Underwater Acoustic Localization Using A Differentiable Modular Forward Model. 1-6 - Jiahao You, Ziye Jia, Chao Dong, Qihui Wu, Zhu Han:
Generative AI-Enhanced Cooperative MEC of UAVs and Ground Stations for Unmanned Surface Vehicles. 1-6 - Rijo Joy
:
The Role of Autonomy in ISP Compliance Decisions in Flexible Work Environments. 1-6 - Temitope Ezekiel Ajibola, Opeyemi Taiwo Adeniran, Peter Taiwo:
SmartPattern: A Machine Learning Framework for Detecting Reentrancy Vulnerabilities in Blockchain Smart Contracts. 1-6 - Paul Staat, Meik Dörpinghaus, Azadeh Sheikholeslami, Christof Paar, Gerhard Fcllwcis, Dennis Goeckel:
Key Exchange in the Quantum Era: Evaluating a Hybrid System of Public-Key Cryptography and Physical-Layer Security. 1-6 - Shoaib Ahmed, Cengcang Zeng, Hongbin Li:
Spectral Estimation of Weak Signals with Strong Interference via Modulo Sampling. 1-6 - Funmilola B. Akeju, Arlene A. Cole-Rhodes:
LS Channel Estimation with SIC Equalization of Mixed Signals for a MIMO OFDM System. 1-6 - Michael F. Talley, Kofi Nyarko, Willie L. Thompson, Arlene Cole-Rhodes, Craig Scott:
Convolutional Neural Network Approach for Emitter Association using Channel Identification in a MIMO System based on Propagation Features. 1-6 - Xingtu Liu:
Neural Networks with Complex-Valued Weights Have No Spurious Local Minima. 1-6 - Kruti Shah, Erhan Guven:
Exploring Ethical Issues and Challenges of Autonomous Vehicles in Different Countries and Cultures. 1-6 - Kaichuang Zhang, Ping Xu, Zhi Tian:
Distributional and Byzantine Robust Decentralized Federated Learning. 1-6 - Nadav Harel, Tirza Routtenberg:
Cramér-Rao Bound for Non-Bayesian Estimation After Detection. 1 - Lei Cao, Ramanarayanan Viswanathan:
Observation-Transformed Distributed Detection in Sensor Networks. 1-6 - Cariappa Kotrangada Suresh, Swastik Brahma:
Overbooking-Based Management of Physical Resource Blocks in 5G Networks. 1-6 - Farshad Soleiman
, Massieh Kordi Boroujeny, Kai Zeng:
Reinforcement Learning-based Beam Hopping for Anti-jamming mmWave Communication. 1-6 - Xingtu Liu:
A Note on Arithmetic-Geometric Mean Inequality for Well-Conditioned Matrices. 1-3 - Tushar Prasad, Larry S. Liebovitch, Melissa Wild, Harry West, Peter T. Coleman:
Words that Represent Peace. 1-6 - Gonzalo A. Ruz:
Training threshold Boolean networks: applications to gene regulatory network modeling. 1-6 - Natalie Pham, W. Steven Gray:
Parameter Dependent Chen-Fliess Series: Convergence and Continuity. 1-6 - Aidan Greenlee, Neil F. Palumbo:
Breast Cancer Diagnosis via Swarm-Optimized Adaptive Neuro-Fuzzy Inference System. 1-6 - Nanrui Gong, James C. Spall:
Simulation-Based Optimization for Policy Incentives and Planning of Hybrid Microgrids. 1-5 - Yumin Li, Javier Garcia-Frías:
Analysis of Simplified Circuit Level Noise in T Gate Implementation. 1-6 - Pedro Aquino de Alcantara, Flavio Bezerra Costa, Daniel R. Fuhrmann:
One-Dimensional Kalman Filter with Measurement Noise Replaced by Quantization. 1-6 - Shenko Chura Aredo, Hailu Jelde Wedajo, Hailu Belay Kassa, Kevin T. Kornegay:
Performance Analysis of 5G Enabled Mission Critical Push-to-Talk (MCPTT) Services for Secured Smart City. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.