Superposition coding in an adversarial environment

被引:0
作者
Electrical and Computer Engineering Department, Northeastern University, Boston, MA 02115-5000, United States [1 ]
不详 [2 ]
机构
来源
Annu. Conf. Inf. Sci. Syst., CISS | 1600年
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Codes (symbols)
引用
收藏
相关论文
共 50 条
  • [21] Applications of generative adversarial networks in medical image processing
    Pan, Dan
    Jia, Longfei
    Zeng, An
    Song, Xiaowei
    Shengwu Yixue Gongchengxue Zazhi/Journal of Biomedical Engineering, 2018, 35 (06): : 970 - 976
  • [22] Gradient Aggregation Boosting Adversarial Examples Transferability Method
    Deng, Shiyun
    Ling, Jie
    Computer Engineering and Applications, 2024, 60 (14) : 275 - 282
  • [23] Generative Adversarial Networks based Skin Lesion Segmentation
    Innani, Shubham
    Dutande, Prasad
    Baid, Ujjwal
    Pokuri, Venu
    Bakas, Spyridon
    Talbar, Sanjay
    Baheti, Bhakti
    Guntuku, Sharath Chandra
    arXiv, 2023,
  • [24] Adversarial Attacks on Transformers-Based Malware Detectors
    Jakhotiya, Yash
    Patil, Heramb
    Rawlani, Jugal
    Mane, Sunil B.
    arXiv, 2022,
  • [25] Chained LDPC Codes via Partial Information Coupling and Partial Parity Superposition
    Wang, Qianfan
    Chen, Li
    Ma, Xiao
    2021 IEEE Globecom Workshops, GC Wkshps 2021 - Proceedings, 2021,
  • [26] Block Truncation Coding (BTC)
    Salama, Paul
    Saenz, Martha
    Delp, Edward J.
    Handb. of Image and Video Proces., 1600, (661-671):
  • [27] A unification of network coding and routing
    Institute of Network Coding, Department of Information Engineering, Chinese University of Hong Kong, Hong Kong, Hong Kong
    Inf. Theory Appl. Workshop, ITA - Conf. Proc., 2012, (246-248):
  • [28] PREDICTIVE IMAGE CODING.
    Musmann, Hans George
    Advances in Electronics and Electron Physics, 1979, 12 : 73 - 112
  • [29] A New Bound to Error Probability on AWGN Channels: From Folded Coding to Gaussian Random Coding
    Lin, Dengsheng
    Xiao, Yue
    IEEE Open Journal of the Communications Society, 2022, 3 : 453 - 461
  • [30] Adversarial topology discovery in network virtualization environments: a threat for ISPs?
    Pignolet, Yvonne Anne
    Schmid, Stefan
    Tredan, Gilles
    DISTRIBUTED COMPUTING, 2015, 28 (02) : 91 - 109