This article presents a leak localization methodology based on state
est...
Speculative attacks are still an active threat today that, even if initi...
Cyberthreats are a permanent concern in our modern technological world. ...
Many applications like audio and image processing show that sparse
repre...
In this paper, we propose a data-driven leak localization method for wat...
Several decades ago the Proximal Point Algorithm (PPA) stated to
gain a ...
Separable, or Kronecker product, dictionaries provide natural decomposit...
Stochastic optimization lies at the core of most statistical learning mo...
Fault detection and isolation in water distribution networks is an activ...
We investigate the possibilities of employing dictionary learning to add...
Supported by the recent contributions in multiple branches, the first-or...
Anomaly detection in networks often boils down to identifying an underly...
Financial fraud detection represents the challenge of finding anomalies ...
Dictionary training for sparse representations involves dealing with lar...