Picture for Peter Gerstoft

Peter Gerstoft

Scale-covariant spiking wavelets

Add code
Feb 02, 2026
Viaarxiv icon

When Bayesian Tensor Completion Meets Multioutput Gaussian Processes: Functional Universality and Rank Learning

Add code
Dec 25, 2025
Viaarxiv icon

Differentiable physics for sound field reconstruction

Add code
Oct 06, 2025
Viaarxiv icon

Real, Fake, or Manipulated? Detecting Machine-Influenced Text

Add code
Sep 18, 2025
Viaarxiv icon

Scaling Continuous Kernels with Sparse Fourier Domain Learning

Add code
Sep 15, 2024
Figure 1 for Scaling Continuous Kernels with Sparse Fourier Domain Learning
Figure 2 for Scaling Continuous Kernels with Sparse Fourier Domain Learning
Figure 3 for Scaling Continuous Kernels with Sparse Fourier Domain Learning
Figure 4 for Scaling Continuous Kernels with Sparse Fourier Domain Learning
Viaarxiv icon

Efficient Sound Field Reconstruction with Conditional Invertible Neural Networks

Add code
Apr 10, 2024
Viaarxiv icon

Non-uniform Array and Frequency Spacing for Regularization-free Gridless DOA

Add code
Jan 12, 2024
Figure 1 for Non-uniform Array and Frequency Spacing for Regularization-free Gridless DOA
Figure 2 for Non-uniform Array and Frequency Spacing for Regularization-free Gridless DOA
Figure 3 for Non-uniform Array and Frequency Spacing for Regularization-free Gridless DOA
Figure 4 for Non-uniform Array and Frequency Spacing for Regularization-free Gridless DOA
Viaarxiv icon

SD-PINN: Deep Learning based Spatially Dependent PDEs Recovery

Add code
Oct 17, 2023
Figure 1 for SD-PINN: Deep Learning based Spatially Dependent PDEs Recovery
Figure 2 for SD-PINN: Deep Learning based Spatially Dependent PDEs Recovery
Figure 3 for SD-PINN: Deep Learning based Spatially Dependent PDEs Recovery
Figure 4 for SD-PINN: Deep Learning based Spatially Dependent PDEs Recovery
Viaarxiv icon

Spoofing Attack Detection in the Physical Layer with Robustness to User Movement

Add code
Oct 17, 2023
Figure 1 for Spoofing Attack Detection in the Physical Layer with Robustness to User Movement
Figure 2 for Spoofing Attack Detection in the Physical Layer with Robustness to User Movement
Figure 3 for Spoofing Attack Detection in the Physical Layer with Robustness to User Movement
Figure 4 for Spoofing Attack Detection in the Physical Layer with Robustness to User Movement
Viaarxiv icon

Spoofing Attack Detection in the Physical Layer with Commutative Neural Networks

Add code
Nov 08, 2022
Viaarxiv icon