IEEE Transactions on Signal and Information Processing over Networks
The IEEE Transactions on Signal and Information Processing over Networks publishes high-quality papers that extend the classical notions of processing of signals defined over vector spaces (e.g. time and space) to processing of signals and information (data) defined over networks, potentially dynamically varying. In signal processing over networks, the topology of the network may define structural relationships in the data, or may constrain processing of the data. Topics include distributed algorithms for filtering, detection, estimation, adaptation and learning, model selection, data fusion, and diffusion or evolution of information over such networks, and applications of distributed signal processing.
Latest Published Articles
-
Latent parameter estimation in fusion networks using separable likelihoods
Thu Apr 12 00:00:00 EDT 2018 Thu Apr 12 00:00:00 EDT 2018 -
Distributed Signal Processing via Chebyshev Polynomial Approximation
Fri Apr 06 00:00:00 EDT 2018 Fri Apr 06 00:00:00 EDT 2018 -
Bias-Constrained Optimal Fusion Filtering for Decentralized WSN with Correlated Noise Sources
Fri Mar 23 00:00:00 EDT 2018 Fri Mar 23 00:00:00 EDT 2018 -
Robust Semi-Supervised Graph Classifier Learning with Negative Edge Weights
Fri Mar 23 00:00:00 EDT 2018 Fri Mar 23 00:00:00 EDT 2018 -
Sparse Laplacian Component Analysis for Internet Traffic Anomalies Detection
Fri Mar 23 00:00:00 EDT 2018 Fri Mar 23 00:00:00 EDT 2018
Popular Articles
-
Joint Optimization of Radio and Computational Resources for Multicell Mobile-Edge Computing
Mon Jun 22 00:00:00 EDT 2015 Mon Jun 22 00:00:00 EDT 2015 -
Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs
Fri Feb 02 00:00:00 EST 2018 Fri Feb 02 00:00:00 EST 2018 -
Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks
Thu Sep 07 00:00:00 EDT 2017 Thu Sep 07 00:00:00 EDT 2017 -
Two-Tier Device-Based Authentication Protocol Against PUEA Attacks for IoT Applications
Wed Jul 05 00:00:00 EDT 2017 Wed Jul 05 00:00:00 EDT 2017 -
Differentially Private Distributed Online Algorithms Over Time-Varying Directed Networks
Wed Jan 24 00:00:00 EST 2018 Wed Jan 24 00:00:00 EST 2018
Publish in this Journal
Meet Our Editors
Editor-in-Chief
Petar Djuric
Stony Brook University, Electrical & Computer Engineering
Light Engineering, Room 245
Stony Brook, NY
11794-2350
USA
+1 631-632-8423
Fax: +1 631-632-8494
petar.djuric@stonybrook.edu
Popular Documents (March 2018)
Feed
Sponsor
-
Joint Optimization of Radio and Computational Resources for Multicell Mobile-Edge Computing
Publication Year: 2015, Page(s):89 - 103
Cited by: Papers (52)Migrating computational intensive tasks from mobile devices to more resourceful cloud servers is a promising technique to increase the computational capacity of mobile devices while saving their battery energy. In this paper, we consider an MIMO multicell system where multiple mobile users (MUs) ask for computation offloading to a common cloud server. We formulate the offloading problem as the joi... View full abstract»
-
Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs
Publication Year: 2018, Page(s):148 - 161Vehicular ad hoc network (VANET) is an enabling technology in modern transportation systems for providing safety and valuable information, and yet vulnerable to a number of attacks from passive eavesdropping to active interfering. Intrusion detection systems (IDSs) are important devices that can mitigate the threats by detecting malicious behaviors. Furthermore, the collaborations among vehicles i... View full abstract»
-
Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks
Publication Year: 2018, Page(s):48 - 59This paper is concerned with the problem of joint distributed attack detection and distributed secure estimation for a networked cyber-physical system under physical and cyber attacks. The system is monitored by a wireless sensor network, in which a group of sensors is spatially distributed and the sensors' measurements are broadcast to remote estimators via a wireless network medium. A malicious ... View full abstract»
-
Two-Tier Device-Based Authentication Protocol Against PUEA Attacks for IoT Applications
Publication Year: 2018, Page(s):33 - 47Securing Internet of Things (IoT) applications is complicated by the limited power and processing capabilities of a typical sensor node. This paper proposes a protocol and a method of spectrum management that can guard against common types of security threats despite the limitations of the local processing. With a hierarchical cognitive IoT architecture, this paper incorporates the strengths of co... View full abstract»
-
Differentially Private Distributed Online Algorithms Over Time-Varying Directed Networks
Publication Year: 2018, Page(s):4 - 17We consider a private distributed online optimization problem where a set of agents aim to minimize the sum of locally convex cost functions while each desires that the local cost function of individual agent is kept differentially private. To solve such problem, we propose differentially private distributed stochastic subgradient online optimization algorithm over time-varying directed networks. ... View full abstract»
-
Distributed-Graph-Based Statistical Approach for Intrusion Detection in Cyber-Physical Systems
Publication Year: 2018, Page(s):137 - 147Cyber-physical systems have recently emerged in several practical engineering applications where security and privacy are of paramount importance. This motivated the paper and a recent surge of interest in development of innovative and novel anomaly and intrusion detection technologies. This paper proposes a novel distributed blind intrusion detection framework by modeling sensor measurements as t... View full abstract»
-
Distributed Optimization Using the Primal-Dual Method of Multipliers
Publication Year: 2018, Page(s):173 - 187In this paper, we propose the primal-dual method of multipliers (PDMM) for distributed optimization over a graph. In particular, we optimize a sum of convex functions defined over a graph, where every edge in the graph carries a linear equality constraint. In designing the new algorithm, an augmented primal-dual Lagrangian function is constructed which smoothly captures the graph topology. It is s... View full abstract»
-
A Novel Data Fusion Algorithm to Combat False Data Injection Attacks in Networked Radar Systems
Publication Year: 2018, Page(s):125 - 136Networked radar systems are vulnerable to different types of attacks, including electronic countermeasure (ECM) jamming and false data injection (FDI) attack. Substantial research has concentrated on ECM jamming, which interferes with radar echoes between a radar and targets. However, FDI attack in which an attacker somehow replaces or modifies radars' measurements, has rarely been considered. FDI... View full abstract»
-
Distributed Localization and Tracking of Mobile Networks Including Noncooperative Objects
Publication Year: 2016, Page(s):57 - 71
Cited by: Papers (9)We propose a Bayesian method for distributed sequential localization of mobile networks composed of both cooperative agents and noncooperative objects. Our method provides a consistent combination of cooperative self-localization (CS) and distributed tracking (DT). Multiple mobile agents and objects are localized and tracked using measurements between agents and objects and between agents. For a d... View full abstract»
-
Distributed Joint Attack Detection and Secure State Estimation
Publication Year: 2018, Page(s):96 - 110The joint task of detecting attacks and securely monitoring the state of a cyber-physical system is addressed over a cluster-based network wherein multiple fusion nodes collect data from sensors and cooperate in a neighborwise fashion in order to accomplish the task. The attack detection-state estimation problem is formulated in the context of random set theory by representing joint information on... View full abstract»
-
When to Make a Topic Popular Again? A Temporal Model for Topic Rehotting Prediction in Online Social Networks
Publication Year: 2018, Page(s):202 - 216It is really popular to detect hot topics, which can benefit many tasks including topic recommendations, the guidance of public opinions, and so on. However, in some cases, people may want to know when to rehot a topic, i.e., make the topic popular again. In this paper, we address this issue by introducing a temporal user topic participation (UTP) model, which models users' behaviors of posting me... View full abstract»
-
A Distributed Control Paradigm for Smart Grid to Address Attacks on Data Integrity and Availability
Publication Year: 2018, Page(s):70 - 81In this paper, we propose an adaptive cyber-enabled parametric feedback linearization (PFL) control scheme for transient stability of smart grids. Based on feedback linearization control theory, the distributed PFL controller utilizes a distributed energy storage system to modify the dynamics of the power system during transients. We consider cyber attacks on data integrity and availability in the... View full abstract»
-
Adaptive Least Mean Squares Estimation of Graph Signals
Publication Year: 2016, Page(s):555 - 568
Cited by: Papers (10)The aim of this paper is to propose a least mean squares (LMS) strategy for adaptive estimation of signals defined over graphs. Assuming the graph signal to be band-limited, over a known bandwidth, the method enables reconstruction, with guaranteed performance in terms of mean-square error, and tracking from a limited number of observations over a subset of vertices. A detailed mean square analysi... View full abstract»
-
Joint Uplink/Downlink Optimization for Backhaul-Limited Mobile Cloud Computing With User Scheduling
Publication Year: 2017, Page(s):787 - 802
Cited by: Papers (1)Mobile cloud computing enables the offloading of computationally heavy applications, such as for gaming, object recognition or video processing, from mobile users (MUs) to cloudlet or cloud servers, which are connected to wireless access points, either directly or through finite-capacity backhaul links. In this paper, the design of a mobile cloud computing system is investigated by proposing the j... View full abstract»
-
Spectral Graph Wavelets and Filter Banks With Low Approximation Error
Publication Year: 2016, Page(s):230 - 245
Cited by: Papers (6)We propose filter banks in the graph spectral domain, where each filter is defined by a sum of sinusoidal waves. The main advantages of these filter banks are that (a) they have low approximation errors even if a lower-order shifted Chebyshev polynomial approximation is used, (b) the upper bound of the error after the pth order Chebyshev polynomial approximation can be calculated rigorously withou... View full abstract»
-
Network Topology Inference from Spectral Templates
Publication Year: 2017, Page(s):467 - 483
Cited by: Papers (1)We address the problem of identifying the structure of an undirected graph from the observation of signals defined on its nodes. Fundamentally, the unknown graph encodes direct relationships between signal elements, which we aim to recover from observable indirect relationships generated by a diffusion process on the graph. The fresh look advocated here leverages concepts from convex optimization ... View full abstract»
-
Distributed Two-Step Quantized Fusion Rules Via Consensus Algorithm for Distributed Detection in Wireless Sensor Networks
Publication Year: 2016, Page(s):321 - 335
Cited by: Papers (3)We consider the problem of distributed soft decision fusion in a bandwidth-constrained spatially uncorrelated wireless sensor network (WSN). The WSN is tasked with the detection of an intruder transmitting an unknown signal over a fading channel. Existing distributed consensus-based fusion rules algorithms only ensure equal combining of local data and in the case of band width constrained WSNs, we... View full abstract»
-
Compressive PCA for Low-Rank Matrices on Graphs
Publication Year: 2017, Page(s):695 - 710We introduce a novel framework for an approximate recovery of data matrices which are low rank on graphs, from sampled measurements. The rows and columns of such matrices belong to the span of the first few eigenvectors of the graphs constructed between their rows and columns. We leverage this property to recover the nonlinear low-rank structures efficiently from sampled data measurements, with a ... View full abstract»
-
Resilient Consensus with Mobile Detectors Against Malicious Attacks
Publication Year: 2018, Page(s):60 - 69This paper investigates the problem of resilient consensus under malicious attacks for multiagent systems. Compared with most of existing works, a more general attack model is considered, where malicious agents can neighbor and collude with each other and the number of tolerable attacks is not limited by the network connectivity, which makes the problem more challenging. To solve this problem, we ... View full abstract»
-
Privacy Aware Stochastic Games for Distributed End-User Energy Storage Sharing
Publication Year: 2018, Page(s):82 - 95Deregulated electricity markets with time-varying electricity prices and opportunities for consumer cost mitigation makes energy storage, such as a battery, an attractive proposition. Sharing a large capacity battery across a group of homes in a community can not only alleviate the economic deterrents but also exploit the fact that users' activity patterns do not necessarily overlap. However, batt... View full abstract»
-
Node Embedding via Word Embedding for Network Community Discovery
Publication Year: 2017, Page(s):539 - 552Neural node embeddings have recently emerged as a powerful representation for supervised learning tasks involving graph-structured data. We leverage this recent advance to develop a novel algorithm for unsupervised community discovery in graphs. Through extensive experimental studies on simulated and real-world data, we demonstrate that the proposed approach consistently improves over the current ... View full abstract»
-
Cooperative Localization in WSNs: A Hybrid Convex/Nonconvex Solution
Publication Year: 2018, Page(s):162 - 172We propose an efficient solution to peer-to-peer localization in a wireless sensor network that works in two stages. At the first stage the optimization problem is relaxed into a convex problem, given in the form recently proposed by Soares et al. The convex problem is efficiently solved in a distributed way by an alternating direction method of multipliers approach, which provides a significant i... View full abstract»
-
Mitigation of Byzantine Attacks on Distributed Detection Systems Using Audit Bits
Publication Year: 2018, Page(s):18 - 32This paper considers the problem of distributed detection in the presence of Byzantines who seek to degrade detection performance by falsifying data. This paper proposes a novel mechanism to mitigate Byzantine attacks by partitioning sensors into groups. Local decisions from sensors in each group are sent to the Fusion Center (FC) via multiple paths, which enable the FC to assess (i.e., to audit) ... View full abstract»
-
QoS-Driven Energy-Efficient Resource Allocation in Multiuser Amplify-and-Forward Relay Networks
Publication Year: 2017, Page(s):771 - 786In this paper, we investigate energy-efficient joint subcarrier pairing, subcarrier allocation, and power allocation algorithms for improving the network energy efficiency (EE) in multiuser amplify-and-forward (AF) relay networks while ensuring the desired quality-of-service (QoS) requirement for the users through the concept of “network price.” Further, we introduce a network price ... View full abstract»
-
Consensus-Based Algorithms for Distributed Network-State Estimation and Localization
Publication Year: 2017, Page(s):430 - 444
Cited by: Papers (1)Recent advances of hardware design and radio technologies have opened the way for an emerging category of network-enabled smart physical devices as a result of convergence in computing and wireless communication capabilities. Inspired by biological interactions, distributed processing of data collected by individual devices is now becoming crucial to let the nodes self-learn relevant network-state... View full abstract»
-
Function Splitting and Quadratic Approximation of the Primal-Dual Method of Multipliers for Distributed Optimization over Graphs
Publication Year: 2018, Page(s): 1We propose two algorithms based on the Primal-Dual Method of Multipliers (PDMM) to be used in distributed network optimization: Function Split PDMM (FS-PDMM) and Quadratically Approximated PDMM (QA-PDMM). Our approaches simplify the local subproblems that must be solved for each node, at each update iteration, improving computational efficiency at distributed processors. FS-PDMM allows for simplif... View full abstract»
-
Graph Signal Denoising via Trilateral Filter on Graph Spectral Domain
Publication Year: 2016, Page(s):137 - 148
Cited by: Papers (9)This paper presents a graph signal denoising method with the trilateral filter defined in the graph spectral domain. The original trilateral filter (TF) is a data-dependent filter that is widely used as an edge-preserving smoothing method for image processing. However, because of the data-dependency, one cannot provide its frequency domain representation. To overcome this problem, we establish the... View full abstract»
-
Measuring Causal Relationships in Dynamical Systems through Recovery of Functional Dependencies
Publication Year: 2017, Page(s):650 - 659
Cited by: Papers (1)We introduce a measure of causality that captures the functional dependencies in dynamical systems and subsequently, define anew type of graphical model, functional dependency graph, to encode such dependencies. We study the relationship between this type of graphical model and other graphical models such as directed information graphs and linear dynamical graphs that have been proposed to capture... View full abstract»
-
Distributed Time and Carrier Frequency Synchronization for Dense Wireless Networks
Publication Year: 2018, Page(s): 1Dense networks call for inter-connectivity of a large number of devices, and in this context, the diversity of interconnected devices introduces challenges to be considered for management and coordination of the network. Synchronization of timing (TO) and carrier frequency offsets (CFO) are critical aspects to be considered to guarantee the proper network interconnectivity. This paper addresses a ... View full abstract»
-
Recursive Tensor Subspace Tracking for Dynamic Brain Network Analysis
Publication Year: 2017, Page(s):669 - 682Recent years have seen a rapid growth in computational methods for a better understanding of functional connectivity brain networks constructed from neuroimaging data. Most of the current work has been limited to static functional connectivity networks (FCNs), where the relationships between different brain regions is assumed to be stationary. Recent work indicates that functional connectivity is ... View full abstract»
-
Resource Allocation in Energy-Harvesting Sensor Networks
Publication Year: 2018, Page(s): 1We consider an energy-harvesting sensor network, possibly a subnetwork of a larger system, with a central unit that acts as information sink, and also recharges periodically the sensors. At each stage, a system supervisor allows the central unit to manage a certain amount of energy, which is to be apportioned amongst the sensors for their sensing tasks. How should energy be apportioned? And how su... View full abstract»
-
Decentralized Joint-Sparse Signal Recovery: A Sparse Bayesian Learning Approach
Publication Year: 2017, Page(s):29 - 45This work proposes a decentralized, iterative, sparse Bayesian learning algorithm for in-network estimation of multiple joint-sparse vectors by a network of nodes, using noisy and underdetermined linear measurements. The proposed algorithm, called consensus-based distributed sparse Bayesian learning, exploits the network wide joint sparsity of the unknown sparse vectors to recover them from signif... View full abstract»
-
Distributed Linearized ADMM for Network Cost Minimization
Publication Year: 2018, Page(s): 1In this work, we study a generic network cost minimization problem, in which every node has a local decision vector to determine. Each node incurs a cost depending on its decision vector and each link also incurs a cost depending on the decision vectors of its two end nodes. All nodes cooperate to minimize the overall network cost. The formulated network cost minimization problem has broad applica... View full abstract»
-
Localization in Mobile Networks via Virtual Convex Hulls
Publication Year: 2018, Page(s):188 - 201In this paper, we develop a distributed algorithm to localize an arbitrary number of agents moving in a bounded region of interest. We assume that the network contains at least one agent with known location (hereinafter referred to as an anchor), and each agent measures a noisy version of its motion and the distances to the nearby agents. We provide a geometric approach, which allows each agent to... View full abstract»
-
Estimation and Fusion for Tracking Over Long-Haul Links Using Artificial Neural Networks
Publication Year: 2017, Page(s):760 - 770
Cited by: Papers (1)In a long-haul sensor network, sensors are remotely deployed over a large geographical area to perform certain tasks, such as tracking and/or monitoring of one or more dynamic targets. A remote fusion center fuses the information provided by these sensors so that a final estimate of certain target characteristics-such as the position-is expected to possess much improved quality. In this work, we p... View full abstract»
-
Learning Heat Diffusion Graphs
Publication Year: 2017, Page(s):484 - 499Information analysis of data often boils down to properly identifying their hidden structure. In many cases, the data structure can be described by a graph representation that supports signals in the dataset. In some applications, this graph may be partly determined by design constraints or predetermined sensing arrangements. In general though, the data structure is not readily available nor easil... View full abstract»
-
Secure Information Sharing in Adversarial Adaptive Diffusion Networks
Konstantinos Ntemos ; Jorge Plata-Chaves ; Nicholas Kolokotronis ; Nicholas Kalouptsidis ; Marc MoonenPublication Year: 2018, Page(s):111 - 124In this paper, information sharing over adversarial adaptive networks is considered. Defense against adversarial attacks is enforced by an attack detection mechanism that guides the diffusion strategy in the parameter estimation task and the transmission decisions of agents. The latter are taken to maximize long-term rewards, expressed in terms of estimation performance, communication cost, and il... View full abstract»
-
Decentralized Dynamic Optimization for Power Network Voltage Control
Publication Year: 2017, Page(s):568 - 579
Cited by: Papers (1)Voltage control in power distribution networks has been greatly challenged by the increasing penetration of volatile and intermittent devices. These devices can also provide limited reactive power resources that can be used to regulate the network-wide voltage. A decentralized voltage control strategy can be designed by minimizing a quadratic voltage mismatch error objective using gradient-project... View full abstract»
-
Detecting Convoys Using License Plate Recognition Data
Publication Year: 2016, Page(s):391 - 405
Cited by: Papers (3)License plate recognition (LPR) sensors are embedded camera systems that monitor road traffic. When a vehicle passes by a sensor, the vehicle's license plate, the location, and the time of observation are recorded. Given a stream of such observations from a collection of sensors spread around the road network, our goal is to detect convoys: groups of two or more vehicles traveling with highly corr... View full abstract»
-
A New Representation of fMRI Signal by a Set of Local Meshes for Brain Decoding
Publication Year: 2017, Page(s):683 - 694
Cited by: Papers (1)How neurons influence each other's firing depends on the strength of synaptic connections among them. Motivated by the highly interconnected structure of the brain, in this study, we propose a computational model to estimate the relationships among voxels and employ them as features for cognitive state classification. We represent the sequence of functional Magnetic Resonance Imaging (fMRI) measur... View full abstract»
-
Compressed Sensing in Wireless Sensor Networks Without Explicit Position Information
Publication Year: 2017, Page(s):404 - 415Reconstruction in compressed sensing relies on knowledge of a sparsifying transform. In a setting where a sink reconstructs a field based on measurements from a wireless sensor network, this transform is tied to the locations of the individual sensors, which may not be available to the sink during reconstruction. In contrast to previous works, we do not assume that the sink knows the position of e... View full abstract»
-
Sparse Signal Detection With Compressive Measurements via Partial Support Set Estimation
Publication Year: 2017, Page(s):46 - 60
Cited by: Papers (2)In this paper, we consider the problem of sparse signal detection based on partial support set estimation with compressive measurements in a distributed network. Multiple nodes in the network are assumed to observe sparse signals, which share a common but unknown support. While in the traditional compressive sensing framework, the goal is to recover the complete sparse signal, in sparse signal det... View full abstract»
-
End-to-End Throughput in Multi-Hop Wireless Networks With Random Relay Deployment
Publication Year: 2018, Page(s): 1This paper investigates the effect of relay randomness on the end-to-end throughput in multi-hop wireless networks using stochastic geometry. We model the nodes as Poisson Point Processes and calculate the spatial average of the throughput over all potential geometrical patterns of the nodes. More specifically, for problem tractability, we first start with the simple nearest neighbor (NN) routing ... View full abstract»
-
A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks
Publication Year: 2017, Page(s): 1We address the problem of centralized detection of a binary event in the presence of fraction falsifiable sensor nodes (SNs) (i.e., controlled by an attacker) for a bandwidthconstrained under attack spatially uncorrelated distributed wireless sensor network (WSN). The SNs send their one-bit test statistics over orthogonal channels to the fusion center (FC), which linearly combines them t... View full abstract»
-
Signal Recovery on Graphs: Fundamental Limits of Sampling Strategies
Publication Year: 2016, Page(s):539 - 554
Cited by: Papers (6)This paper builds theoretical foundations for the recovery of a newly proposed class of smooth graph signals, approximately bandlimited graph signals, under three sampling strategies: uniform sampling, experimentally designed sampling, and active sampling. We then state minimax lower bounds on the maximum risk for the approximately bandlimited class under these three sampling strategies and show t... View full abstract»
-
Data Falsification Attacks on Consensus-Based Detection Systems
Publication Year: 2017, Page(s):145 - 158This paper considers the problem of signal detection in distributed networks in the presence of data falsification (Byzantine) attacks. Detection approaches considered in the paper are based on fully distributed consensus algorithms, where all of the nodes exchange information only with their neighbors in the absence of a fusion center. For such networks, we first characterize the negative effect ... View full abstract»
-
Multiuser Wireless Power Transfer via Magnetic Resonant Coupling: Performance Analysis, Charging Control, and Power Region Characterization
Publication Year: 2016, Page(s):72 - 83
Cited by: Papers (3)Magnetic resonant coupling (MRC) is an efficient method for realizing the near-field wireless power transfer (WPT). Although the MRC-enabled WPT (MRC-WPT) with a single pair of transmitter and receiver has been thoroughly studied in the literature, there is limited work on the general setup with multiple transmitters and/or receivers. In this paper, we consider a point-to-multipoint MRC-WPT system... View full abstract»
-
Learning the Interference Graph of a Wireless Network
Publication Year: 2017, Page(s):631 - 646A key challenge in wireless networking is the management of interference between transmissions. Identifying which transmitters interfere with each other is a crucial first step. In this paper, we cast the task of estimating the wireless interference environment as a graph learning problem. Nodes represent transmitters and edges represent the presence of interference between pairs of transmitters. ... View full abstract»
-
Graph Sampling for Covariance Estimation
Publication Year: 2017, Page(s):451 - 466In this paper, the focus is on subsampling as well as reconstructing the second-order statistics of signals residing on nodes of arbitrary undirected graphs. Second-order stationary graph signals may be obtained by graph filtering zero-mean white noise and they admit a well-defined power spectrum whose shape is determined by the frequency response of the graph filter. Estimating the graph power sp... View full abstract»
-
Admissible Hierarchical Clustering Methods and Algorithms for Asymmetric Networks
Publication Year: 2017, Page(s):711 - 727This paper characterizes hierarchical clustering methods that abide by two previously introduced axioms-thus, denominated admissible methods-and proposes tractable algorithms for their implementation. We leverage the fact that, for asymmetric networks, every admissible method must be contained between reciprocal and nonreciprocal clustering, and describe three families of intermediate methods. Gra... View full abstract»
Aims & Scope
The IEEE Transactions on Signal and Information Processing over Networks publishes high-quality papers that extend the classical notions of processing of signals defined over vector spaces (e.g. time and space) to processing of signals and information (data) defined over networks, potentially dynamically varying. In signal processing over networks, the topology of the network may define structural relationships in the data, or may constrain processing of the data. Topics include distributed algorithms for filtering, detection, estimation, adaptation and learning, model selection, data fusion, and diffusion or evolution of information over such networks, and applications of distributed signal processing.
Meet Our Editors
Editor-in-Chief
Petar Djuric
Stony Brook University, Electrical & Computer Engineering
Light Engineering, Room 245
Stony Brook, NY
11794-2350
USA
+1 631-632-8423
Fax: +1 631-632-8494
petar.djuric@stonybrook.edu
Further Links
Aims & Scope
The IEEE Transactions on Signal and Information Processing over Networks publishes high-quality papers that extend the classical notions of processing of signals defined over vector spaces (e.g. time and space) to processing of signals and information (data) defined over networks, potentially dynamically varying. In signal processing over networks, the topology of the network may define structural relationships in the data, or may constrain processing of the data. Topics include distributed algorithms for filtering, detection, estimation, adaptation and learning, model selection, data fusion, and diffusion or evolution of information over such networks, and applications of distributed signal processing.
Persistent Link: https://ieeexplore.ieee.org/servlet/opac?punumber=6884276 More »
Frequency: 4
ISSN: 2373-776X (2373-7778 CDROM)
Publication Details: IEEE Transactions on Signal and Information Processing over Networks
Subjects
- Signal Processing & Analysis
Editor-in-Chief
Petar Djuric
Stony Brook University, Electrical & Computer Engineering
Light Engineering, Room 245
Stony Brook, NY
11794-2350
USA
+1 631-632-8423
Fax: +1 631-632-8494
petar.djuric@stonybrook.edu
About this Journal
Author Resources
Sponsor

Contacts
Editor-in-Chief
Petar Djuric
Stony Brook University, Electrical & Computer Engineering
Light Engineering, Room 245
Stony Brook, NY
11794-2350
USA
+1 631-632-8423
Fax: +1 631-632-8494
petar.djuric@stonybrook.edu