Silvija Kokalj-Filipovic

Orcid: 0000-0002-7548-4092

According to our database1, Silvija Kokalj-Filipovic authored at least 39 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Deep-Learned Compression for Radio-Frequency Signal Classification.
Proceedings of the IEEE International Symposium on Information Theory, 2024

2023
Analysis of Lossy Generative Data Compression for Robust Remote Deep Inference.
Proceedings of the 2023 ACM Workshop on Wireless Security and Machine Learning, 2023

2022
Large Scale Radio Frequency Signal Classification.
CoRR, 2022

2021
Reservoir-Based Distributed Machine Learning for Edge Operation.
CoRR, 2021

Inaudible Manipulation of Voice-Enabled Devices Through BackDoor Using Robust Adversarial Audio Attacks: Invited Paper.
Proceedings of the WiseML@WiSec 2021: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, 2021

Reservoir Based Edge Training on RF Data To Deliver Intelligent and Efficient IoT Spectrum Sensors.
Proceedings of the IEEE International Conference on Smart Computing, 2021

Reservoir-Based Distributed Machine Learning for Edge Operation of Emitter Identification.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Practical Training for RF Fingerprinting of Commercial Transmitters at the Edge.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

2020
Deep Delay Loop Reservoir Computing for Specific Emitter Identification.
CoRR, 2020

Detecting acoustic backdoor transmission of inaudible messages using deep learning.
Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, 2020

2019
Mitigation of Adversarial Examples in RF Deep Classifiers Utilizing AutoEncoder Pre-training.
CoRR, 2019

Adversarial Examples in RF Deep Learning: Detection of the Attack and its Physical Robustness.
CoRR, 2019

Targeted Adversarial Examples Against RF Deep Classifiers.
Proceedings of the ACM Workshop on Wireless Security and Machine Learning, 2019

AutoEncoders for Training Compact Deep Learning RF Classifiers for Wireless Protocols.
Proceedings of the 20th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2019

Mitigation of Adversarial Examples in RF Deep Classifiers Utilizing AutoEncoder Pre-training.
Proceedings of the International Conference on Military Communications and Information Systems, 2019

Policy Based Synthesis: Data Generation and Augmentation Methods For RF Machine Learning.
Proceedings of the 2019 IEEE Global Conference on Signal and Information Processing, 2019

Adversarial Examples in RF Deep Learning: Detection and Physical Robustness.
Proceedings of the 2019 IEEE Global Conference on Signal and Information Processing, 2019

2018
Introduction to the Issue on Machine Learning for Cognition in Radio Communications and Radar.
IEEE J. Sel. Top. Signal Process., 2018

2017
Non-parametric learning to infer wireless relays, routes and traffic patterns from time series of spectrum activity.
Proceedings of the 51st Asilomar Conference on Signals, Systems, and Computers, 2017

2016
Learning structural properties of wireless ad-hoc networks non-parametrically from spectral activity samples.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

I/O HSMM: Learning behavioral dynamics of a cognitive wireless network node from spectrum sensing.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

2015
Methods for Extracting V2V Propagation Models from Imperfect RSSI Field Data.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

EM-based channel estimation from crowd-sourced RSSI samples corrupted by noise and interference.
Proceedings of the 49th Annual Conference on Information Sciences and Systems, 2015

2014
V2V Propagation Modeling with Imperfect RSSI Samples.
CoRR, 2014

2013
Low Complexity Doped Wireless Broadcast for Multimedia Applications.
IEEE Trans. Commun., 2013

2012
Low Complexity Differentiating Adaptive Erasure Codes for Multimedia Wireless Broadcast
CoRR, 2012

Suppressing the Cliff Effect in Video Reproduction Quality.
Bell Labs Tech. J., 2012

2011
Trade-offs of source location protection in globally attacked sensor networks: A case analysis.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

The quality of source location protection in globally attacked sensor networks.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Cliff effect suppression through multiple-descriptions with split personality.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Is rateless paradigm fitted for lossless compression of erasure-impaired sources?
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

2010
Some Important Aspects of Source Location Protection in Globally Attacked Sensor Networks
CoRR, 2010

Personal Social Graph as an anonymous vehicle for P2P applications: The cost of renting trusted connections.
Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010

2009
Geographic Data Propagation in Location-Unaware Wireless Sensor Networks: A Two-Dimensional Random Walk Analysis.
IEEE J. Sel. Areas Commun., 2009

Doped fountain coding for minimum delay data collection in circular networks.
IEEE J. Sel. Areas Commun., 2009

Can a packet walk straight through a field of randomly dying location-unaware wireless nodes?
Proceedings of the 2nd ACM international workshop on Foundations of wireless ad hoc and sensor networking and computing, 2009

2008
Decentralized fountain codes for minimum-delay data collection.
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008

2007
BeSpoken Protocol for Data Dissemination in Wireless Sensor Networks.
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007

Random Walk Models for Geographic Data Propagation in Wireless Sensor Networks.
Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007


  Loading...