Jan 09, 2026 - Viktor Markopoulos - We often trust what we see. In cybersecurity, we are trained to look for suspicious links, strange file extensions, or garbled code. But what if the threat looked ...
Abstract: Motivated by high-density storage needs, symbol-pair codes were introduced by Cassuto and Blaum to address channels with overlapping symbol outputs. In this paper, we present a systematic ...
Abstract: As increasing demands for recognizing social environment and/or human activity using sensory devices and video cameras, streaming data has become one of major data types. The applications ...