
-
Consenting to Internet of Things Across Different Social Settings
Devices connected to the Internet of Things (IoT) are rapidly becoming u...
read it
-
Ultra-dense Low Data Rate (UDLD) Communication in the THz
In the future, with the advent of Internet of Things (IoT), wireless sen...
read it
-
SHINE (Strategies for High-frequency INdoor Environments) with Efficient THz-AP Placement
The increasing demand for ultra-high throughput in ultra-dense networks ...
read it
-
Green Security Game with Community Engagement
While game-theoretic models and algorithms have been developed to combat...
read it
-
An Analytical Model for Efficient Indoor THz Access Point Deployment
Ultra-densification of user equipment (UE) and access points (APs) are a...
read it
-
MOTH- Mobility-induced Outages in THz: A Beyond 5G (B5G) application
5G will enable the growing demand for Internet of Things (IoT), high-res...
read it
-
Reliable THz Communications for Outdoor based Applications- Use Cases and Methods
Future (beyond 5G) wireless networks will demand high throughput and low...
read it
-
Parameter Modeling for Small-Scale Mobility in Indoor THz Communication
Despite such challenges as high path loss and equipment cost, THz commun...
read it
-
Stay Ahead of Poachers: Illegal Wildlife Poaching Prediction and Patrol Planning Under Uncertainty with Field Test Evaluations
Illegal wildlife poaching threatens ecosystems and drives endangered spe...
read it
-
Applying SVGD to Bayesian Neural Networks for Cyclical Time-Series Prediction and Inference
A regression-based BNN model is proposed to predict spatiotemporal quant...
read it
-
Deep Reinforcement Learning for Green Security Games with Real-Time Information
Green Security Games (GSGs) have been proposed and applied to optimize p...
read it
-
Pyro: Deep Universal Probabilistic Programming
Pyro is a probabilistic programming language built on Python as a platfo...
read it
-
Designing the Game to Play: Optimizing Payoff Structure in Security Games
Effective game-theoretic modeling of defender-attacker behavior is becom...
read it