We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Abstract-- The inference of a network structure from experimental data providing dynamical information about the underlying system of investigation is an important and still outsta...
Abstract. We focus on covariance criteria for finding a suitable subspace for regression in a reproducing kernel Hilbert space: kernel principal component analysis, kernel partial...
Luc Hoegaerts, Johan A. K. Suykens, Joos Vandewall...
Abstract—We consider correlated MIMO multiple access channels with block fading, where each block is divided into training and data transmission phases. We find the channel esti...
—The subject of extracting high-resolution data from low-resolution images is one of the most important digital processing applications in recent years, attracting much research....