References of "IEEE Journal of Selected Topics in Signal Processing"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailSuccessive convex approximation algorithms for sparse signal estimation with nonconvex regularizations
Yang, Yang UL; Pesavento, Marius; Chatzinotas, Symeon UL et al

in IEEE Journal of Selected Topics in Signal Processing (2018), 12(6), 1286-1302

Detailed reference viewed: 210 (32 UL)
Full Text
Peer Reviewed
See detailConstrained Bayesian Active Learning of Interference Channels in Cognitive Radio Networks
Tsakmalis, Anestis UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in IEEE Journal of Selected Topics in Signal Processing (2017)

In this paper, a sequential probing method for interference constraint learning is proposed to allow a centralized Cognitive Radio Network (CRN) accessing the frequency band of a Primary User (PU) in an ... [more ▼]

In this paper, a sequential probing method for interference constraint learning is proposed to allow a centralized Cognitive Radio Network (CRN) accessing the frequency band of a Primary User (PU) in an underlay cognitive scenario with a designed PU protection specification. The main idea is that the CRN probes the PU and subsequently eavesdrops the reverse PU link to acquire the binary ACK/NACK packet. This feedback indicates whether the probing-induced interference is harmful or not and can be used to learn the PU interference constraint. The cognitive part of this sequential probing process is the selection of the power levels of the Secondary Users (SUs) which aims to learn the PU interference constraint with a minimum number of probing attempts while setting a limit on the number of harmful probing-induced interference events or equivalently of NACK packet observations over a time window. This constrained design problem is studied within the Active Learning (AL) framework and an optimal solution is derived and implemented with a sophisticated, accurate and fast Bayesian Learning method, the Expectation Propagation (EP). The performance of this solution is also demonstrated through numerical simulations and compared with modified versions of AL techniques we developed in earlier work. [less ▲]

Detailed reference viewed: 103 (20 UL)
Full Text
Peer Reviewed
See detailDirectional Modulation via Symbol-Level Precoding: A Way to Enhance Security
Kalantari, Ashkan UL; Soltanalian, Mojtaba; Maleki, Sina UL et al

in IEEE Journal of Selected Topics in Signal Processing (2016)

Wireless communication provides a wide coverage at the cost of exposing information to unintended users. As an information-theoretic paradigm, secrecy rate derives bounds for secure transmission when the ... [more ▼]

Wireless communication provides a wide coverage at the cost of exposing information to unintended users. As an information-theoretic paradigm, secrecy rate derives bounds for secure transmission when the channel to the eavesdropper is known. However, such bounds are shown to be restrictive in practice and may require exploitation of specialized coding schemes. In this paper, we employ the concept of directional modulation and follow a signal processing approach to enhance the security of multi-user MIMO communication systems when a multi-antenna eavesdropper is present. Enhancing the security is accomplished by increasing the symbol error rate at the eavesdropper. Unlike the information-theoretic secrecy rate paradigm, we assume that the legitimate transmitter is not aware of its channel to the eavesdropper, which is a more realistic assumption. We examine the applicability of MIMO receiving algorithms at the eavesdropper. Using the channel knowledge and the intended symbols for the users, we design security enhancing symbol-level precoders for different transmitter and eavesdropper antenna configurations. We transform each design problem to a linearly constrained quadratic program and propose two solutions, namely the iterative algorithm and one based on non-negative least squares, at each scenario for a computationally-efficient modulation. Simulation results verify the analysis and show that the designed precoders outperform the benchmark scheme in terms of both power efficiency and security enhancement. [less ▲]

Detailed reference viewed: 170 (29 UL)
Full Text
Peer Reviewed
See detailReal-Time Distance-Dependent Mapping for a Hybrid ToF Multi-Camera Rig
Garcia Becerro, Frederic UL; Aouada, Djamila UL; Mirbach, Bruno et al

in IEEE Journal of Selected Topics in Signal Processing (2012), 6(5), 1-12

Detailed reference viewed: 136 (5 UL)