On the security and robustness of encryption via compressed sensing
暂无分享,去创建一个
G. Sharma | M.F. Bocko | A. Orsdemir | H.O. Altun | M. Bocko | Gaurav Sharma | G. Sharma | A. Orsdemir | H. Altun | Adem Orsdemir | H. Oktay Altun
[1] Nathaniel E. Helwig,et al. An Introduction to Linear Algebra , 2006 .
[2] G. Stewart,et al. Matrix Perturbation Theory , 1990 .
[3] Emmanuel J. Candès,et al. Decoding by linear programming , 2005, IEEE Transactions on Information Theory.
[4] E. Candès,et al. Stable signal recovery from incomplete and inaccurate measurements , 2005, math/0503066.
[5] R. Tibshirani,et al. Least angle regression , 2004, math/0406456.
[6] Y. C. Pati,et al. Orthogonal matching pursuit: recursive function approximation with applications to wavelet decomposition , 1993, Proceedings of 27th Asilomar Conference on Signals, Systems and Computers.
[7] Michael B. Wakin,et al. An Introduction To Compressive Sampling [A sensing/sampling paradigm that goes against the common knowledge in data acquisition] , 2008 .
[8] Vinod M. Prabhakaran,et al. On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.
[9] Stephen P. Boyd,et al. An Interior-Point Method for Large-Scale $\ell_1$-Regularized Least Squares , 2007, IEEE Journal of Selected Topics in Signal Processing.
[10] Stephen P. Boyd,et al. An Efficient Method for Compressed Sensing , 2007, 2007 IEEE International Conference on Image Processing.
[11] Gaurav Sharma,et al. Set theoretic signal restoration using an error in variables criterion , 1997, IEEE Trans. Image Process..
[12] E.J. Candes,et al. An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.