Aiming at providing wireless communication systems with
environment-perc...
Deep learning techniques have achieved specific results in recording dev...
Most Deep Learning (DL) based Compressed Sensing (DCS) algorithms adopt ...
Digital audio tampering detection can be used to verify the authenticity...
The existing source cell-phone recognition method lacks the long-term fe...
The black-box nature of Deep Neural Networks (DNNs) severely hinders its...
Rate splitting multiple access (RSMA) is a promising solution to improve...
With the development of the Internet, more and more people get accustome...
Time-division-duplexing massive multiple-input multiple-output (MIMO) sy...
Federated learning is a communication-efficient training process that
al...
Computer vision techniques allow automated detection of sky pixels in ou...
For future wireless networks, enormous numbers of interconnections are
r...
In this paper, we consider the issue of covert communications with rando...
On the time-varying channel estimation, the traditional downlink (DL) ch...
Massive numbers of nodes will be connected in future wireless networks. ...
Future networks are expected to connect an enormous number of nodes
wire...
RGB-Thermal (RGB-T) object tracking receives more and more attention due...
Psychological studies indicate that emotional states are expressed in th...