In this paper, we propose to utilise diffusion models for data augmentat...
Non-speech emotion recognition has a wide range of applications includin...
Flexible resources in built environments are seen as a low-cost opportun...
In recent years, there has been an increasing interest in incorporating
...
Cyber Threat Intelligence (CTI) is the knowledge of cyber and physical
t...
6G is envisioned to enable futuristic technologies, which exhibit more
c...
Despite the recent progress in speech emotion recognition (SER),
state-o...
Despite the recent advancement in speech emotion recognition (SER) withi...
In object detection, false negatives arise when a detector fails to dete...
Digital twins, being the virtual replicas of their physical counterparts...
In recent years blockchain technology has received tremendous attention....
The complexity of cyberattacks in Cyber-Physical Systems (CPSs) calls fo...
Real-world applications in healthcare and supply chain domains produce,
...
In recent years Industrial Control Systems (ICS) have been targeted
incr...
Intrusion Detection Systems (IDS) have been the industry standard for
se...
This paper explores the performance of Google's Edge TPU on feed forward...
The salient features of blockchain, such as decentralisation and
transpa...
Supply chain applications operate in a multi-stakeholder setting, demand...
With the rapid development of wireless sensor networks, smart devices, a...
Blockchain has received tremendous attention as a secure, distributed, a...
In this work, we propose a privacy-preservation framework, TradeChain, w...
The proliferation of digitization and complexity of connectivity in
Cybe...
Blockchain offers traceability and transparency to supply chain event da...
The recent advancement of cloud technology offers unparallel strength to...
Authorization or access control limits the actions a user may perform on...
This paper explores Google's Edge TPU for implementing a practical netwo...
Industrial processes rely on sensory data for decision-making processes,...
Automated cattle activity classification allows herders to continuously
...
Industrial processes rely on sensory data for critical decision-making
p...
Due to the rise of Industrial Control Systems (ICSs) cyber-attacks in th...
Long range wide area networks (LoRaWAN) technology provides a simple sol...
The ubiquity of connecting technologies in smart vehicles and the increm...
Peer-to-Peer (P2P) energy trading can facilitate integration of a large
...
Blockchain has received tremendous attention in non-monetary application...
Speech emotion recognition systems (SER) can achieve high accuracy when ...
Generative adversarial networks (GANs) have shown potential in learning
...
Infectious diseases are still a major global burden for modern society
c...
An Intrusion Detection System (IDS) aims to alert users of incoming atta...
Personal data is a new economic asset that individuals can trade to gene...
Research on speech processing has traditionally considered the task of
d...
Heterogeneous and dynamic IoT environments require a lightweight, scalab...
Cyberphysical Systems (CPS) are transforming the way we interact with th...
Despite the widespread use of supervised deep learning methods for affec...
Blockchain is a promising technology for establishing trust in IoT netwo...
Traceability and integrity are major challenges for the increasingly com...
Fully autonomous vehicles are emerging vehicular technologies that have
...
Speech emotion recognition is a challenging task and heavily depends on
...
In recent years blockchain has received tremendous attention as a means ...
Security and privacy in Direct Load Control (DLC) is a fundamental chall...
Blockchain is increasingly being used as a distributed, anonymous, trust...