SPS Feed

You are here

Top Reasons to Join SPS Today!

1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.

The Latest News, Articles, and Events in Signal Processing

The IEEE Signal Processing Society has developed guidelines related to SPS Chapter social media and Chapter Activities.

The Nominations and Appointments Subcommittee for each Technical Committee is currently seeking nominations for new Members, as well as the Vice Chair position for some Technical Committees. Nominations for both positions should be submitted directly to each Technical Committee’s Nominations and Appointments Subcommittee. Please provide the name, contact information and biography with the nomination.

In an effort to continue our programs and services during this difficult time, the SPS Awards Board is now accepting nominations for all Society level awards, from paper awards to the major society awards. Nominations are due by 1 September 2021.

April 17-21, 2023
Location: Cartagena, Colombia
CFP - TBD
Website - TBD

Portland State University

The Computational Imaging Lab in the Department of Computer Science at Portland State University is hiring a graduate student starting Winter/Spring 2022. This is a fully funded PhD student position and includes a monthly stipend and tuition waiver. The position will be for 1 year, initially, and will be renewed for up to a maximum of 5 years (subject to satisfactory progress and availability of funding).

IEEE Transactions on Signal Processing

This paper addresses the problem of target detection against a background of Gaussian clutter by using frequency snapshots with reduced degrees of freedom (DOF). We derive the optimal detector and detection performance under the Neyman-Pearson criterion for general frequency snapshot selection with arbitrary DOF. When the clutter statistics are unknown, we use a uniformly random frequency snapshot selection method and show how the DOF employed affects the detection performance. 

IEEE Transactions on Signal Processing

Time-frequency analysis is often used to study non stationary multicomponent signals, which can be viewed as the surperposition of modes. To understand such signals, it is essential to identify the ridges associated with the modes in the time-frequency plane.

IEEE Transactions on Signal Processing

Spatial registration and track-to-track association (which are mutually coupled) are essential parts in the process of multi-sensor information fusion. The quality of the spatial registration and track association algorithm directly influences the subsequent fusion performance.

IEEE Transactions on Signal and Information Processing over Networks

This paper considers the problem of decentralized consensus optimization over a network, where each node holds a strongly convex and twice-differentiable local objective function. Our goal is to minimize the sum of the local objective functions and find the exact optimal solution using only local computation and neighboring communication.

IEEE Transactions on Signal and Information Processing over Networks

Novel Monte Carlo estimators are proposed to solve both the Tikhonov regularization (TR) and the interpolation problems on graphs. These estimators are based on random spanning forests (RSF), the theoretical properties of which enable to analyze the estimators’ theoretical mean and variance.

IEEE Transactions on Multimedia

The video captioning task aims to describe video content using several natural-language sentences. Although one-step encoder-decoder models have achieved promising progress, the generations always involve many errors, which are mainly caused by the large semantic gap between the visual domain and the language domain and by the difficulty in long-sequence generation.

IEEE Transactions on Multimedia

The prevailing use of both images and text to express opinions on the web leads to the need for multimodal sentiment recognition. Some commonly used social media data containing short text and few images, such as tweets and product reviews, have been well studied. However, it is still challenging to predict the readers’ sentiment after reading online news articles, since news articles often have more complicated structures, e.g., longer text and more images.

IEEE Transactions on Multimedia

Recently, dense video captioning has made attractive progress in detecting and captioning all events in a long untrimmed video. Despite promising results were achieved, most existing methods do not sufficiently explore the scene evolution within an event temporal proposal for captioning, and therefore perform less satisfactorily when the scenes and objects change over a relatively long proposal. To address this problem, we propose a graph-based partition-and-summarization (GPaS) framework for dense video captioning within two stages.

IEEE Transactions on Image Processing

Diversity “multiple description” (MD) source coding promises graceful degradation in the presence of a priori unknown number of erased packets in the channel. A simple coding scheme for the case of two packets consists of oversampling the source by a factor of two and delta-sigma quantization. This approach was applied successfully to JPEG-based image coding over a lossy packet network, where the interpolation and splitting into two descriptions are done in the discrete cosine transform (DCT) domain.

IEEE Transactions on Image Processing

Video surveillance and its applications have become increasingly ubiquitous in modern daily life. In video surveillance system, video coding as a critical enabling technology determines the effective transmission and storage of surveillance videos. In order to meet the real-time or time-critical transmission requirements of video surveillance systems, the low-delay (LD) configuration of the advanced high efficiency video coding (HEVC) standard is usually used to encode surveillance videos.

IEEE Transactions on Image Processing

RGB-thermal salient object detection (SOD) aims to segment the common prominent regions of visible image and corresponding thermal infrared image that we call it RGBT SOD. Existing methods don’t fully explore and exploit the potentials of complementarity of different modalities and multi-type cues of image contents, which play a vital role in achieving accurate results.

IEEE Transactions on Image Processing

We propose a neural network model to estimate the current frame from two reference frames, using affine transformation and adaptive spatially-varying filters. The estimated affine transformation allows for using shorter filters compared to existing approaches for deep frame prediction. The predicted frame is used as a reference for coding the current frame.

IEEE Transactions on Information Forensics and Security

Machine learning techniques have been widely applied to various applications. However, they are potentially vulnerable to data poisoning attacks, where sophisticated attackers can disrupt the learning procedure by injecting a fraction of malicious samples into the training dataset. Existing defense techniques against poisoning attacks are largely attack-specific: they are designed for one specific type of attacks but do not work for other types, mainly due to the distinct principles they follow.

IEEE Transactions on Information Forensics and Security

This paper presents a signal processing and machine learning (ML) based methodology to leverage Electromagnetic (EM) emissions from an embedded device to remotely detect a malicious application running on the device and classify the application into a malware family. We develop Fast Fourier Transform (FFT) based feature extraction followed by Support Vector Machine (SVM) and Random Forest (RF) based ML models to detect a malware. 

IEEE Transactions on Information Forensics and Security

Deep learning-based person re-identification (Re-ID) has made great progress and achieved high performance recently. In this paper, we make the first attempt to examine the vulnerability of current person Re-ID models against a dangerous attack method, i.e. , the universal adversarial perturbation (UAP) attack, which has been shown to fool classification models with a little overhead.

Pages

SPS on Twitter

SPS Videos


Signal Processing in Home Assistants

 


Multimedia Forensics


Careers in Signal Processing             

 


Under the Radar