Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
This article addresses the modeling of reverberant recording environments in the context of under-determined convolutive blind source separation. We model the contribution of each ...
This paper presents a new acoustic-to-articulatory inversion methodbased on an episodic memory, which is an interesting model for two reasons. First, it does not rely on any assum...
We consider the problem of source number estimation in array processing when impulsive noise is present. To combat impulsive noise more effectively, two robust estimators with hig...
This paper proposes a novel application of image inpainting techniques for the edge enhancement problems in image deblurring and denoising. The edge enhancement effect is achieved...