In this paper we address the problem of analyzing signals defined over graphs whose topology is known only with some uncertainty about the presence/absence of some edges. This situation arises in all cases where edges are associated to a set of elements (vertices), but the association rule may be affected by errors. Building on a small perturbation analysis of the graph Laplacian matrix and assuming a simple probabilistic model for the addition/deletion of edges, we derive an analytical model to deal with the perturbation that this uncertainty induces on the observed signal. Using this model, we propose different strategies to recover the underlying signal exploiting statistical knowledge about the probability of the presence/absence of the...
Performing signal processing over graphs requires knowledge of the underlying fixed topology. Howeve...
Recovering a graph signal from samples is a central problem in graph signal processing. Least mean s...
Attack graphs used in network security analysis are analyzed to determine sequences of exploits that...
International audienceSignal processing on graphs is a recent research domain that aims at generaliz...
We consider the problem of signal recovery on graphs. Graphs model data with complex structure assig...
In many applications of current interest, the observations are represented as a signal defined over ...
Graph signal processing is an emerging paradigm in signal processing which took birth in the search ...
This thesis addresses statistical estimation and testing of signals over a graph when measurements a...
International audienceMany tools from the field of graph signal processing exploit knowledge of the ...
Analysis of signals defined over graphs has been of interest in the recent years. In this regard, ma...
With the explosive growth of information and communication, data is being generated at an unpreceden...
Data in several applications can be represented as an uncertain graph whose edges are labeled with a...
Modern datasets are often massive due to the sharp decrease in the cost of collecting and storing da...
Traditional analysis of uncertainty of the result of data processing assumes that all measurement er...
The aim of this paper is to propose a method for online learning of time-varying graphs from noisy o...
Performing signal processing over graphs requires knowledge of the underlying fixed topology. Howeve...
Recovering a graph signal from samples is a central problem in graph signal processing. Least mean s...
Attack graphs used in network security analysis are analyzed to determine sequences of exploits that...
International audienceSignal processing on graphs is a recent research domain that aims at generaliz...
We consider the problem of signal recovery on graphs. Graphs model data with complex structure assig...
In many applications of current interest, the observations are represented as a signal defined over ...
Graph signal processing is an emerging paradigm in signal processing which took birth in the search ...
This thesis addresses statistical estimation and testing of signals over a graph when measurements a...
International audienceMany tools from the field of graph signal processing exploit knowledge of the ...
Analysis of signals defined over graphs has been of interest in the recent years. In this regard, ma...
With the explosive growth of information and communication, data is being generated at an unpreceden...
Data in several applications can be represented as an uncertain graph whose edges are labeled with a...
Modern datasets are often massive due to the sharp decrease in the cost of collecting and storing da...
Traditional analysis of uncertainty of the result of data processing assumes that all measurement er...
The aim of this paper is to propose a method for online learning of time-varying graphs from noisy o...
Performing signal processing over graphs requires knowledge of the underlying fixed topology. Howeve...
Recovering a graph signal from samples is a central problem in graph signal processing. Least mean s...
Attack graphs used in network security analysis are analyzed to determine sequences of exploits that...