Cloud-native architecture is becoming increasingly crucial for today's c...
The efficacy of availability poisoning, a method of poisoning data by
in...
The widespread adoption of the large language model (LLM), e.g. Generati...
Unlearnable example attacks are data poisoning techniques that can be us...
Open software supply chain attacks, once successful, can exact heavy cos...
Edge-assisted vehicle-to-everything (V2X) motion planning is an emerging...
Integrated sensing and communication (ISAC) represents a paradigm shift,...
As one of the most useful online processing techniques, the theta-join
o...
Cloud computing has been regarded as a successful paradigm for IT indust...
Accurate prediction of short-term OD Matrix (i.e. the distribution of
pa...
Accurate traffic state prediction is the foundation of transportation co...
As a key technology in the 5G era, Mobile Edge Computing (MEC) has devel...
The huge success of deep learning in computer vision and natural languag...
Stock price movement prediction is commonly accepted as a very challengi...