This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
In this course, various aspects of probability theory are considered. The first part is devoted to the main theorems in the field (law of large numbers, central limit theorem, concentration inequaliti
Signal processing theory and applications: discrete and continuous time signals; Fourier analysis, DFT, DTFT,
CTFT, FFT, STFT; linear time invariant systems; filter design and adaptive filtering; samp
Related publications (12)
Please note that this is not a complete list of this person’s publications. It includes only semantically relevant works. For a full list, please refer to Infoscience.
With the rapid development of biometric recognition systems, users can be simultaneously enrolled in multiple biometric recognition systems, either with a single or multiple biometric characteristics (e.g., face, voice, etc.). With such a growth of biometr ...
We study communication-constrained secret key generation, where two legitimate parties would like to generate a secret key using communication subject to a rate constraint. The problem is studied in the finite-blocklength regime. In this regime, the use of ...
Given two random variables X and Y, the maximal leakage L(X → Y) from X to Y was recently proposed as an operational privacy measure. Maximal leakage quantifies the multiplicative increase of the probability of correctly guessing any randomized function of ...
Institute of Electrical and Electronics Engineers Inc.2024