Motivated by modern network communication applications which require low...
Surgery is the only viable treatment for cataract patients with visual a...
Finding optimal message quantization is a key requirement for low comple...
We propose a precoder codebook construction and feedback encoding scheme...
Many common instances of power control problems for cellular and cell-fr...
Low-volume Denial-of-Service (μDoS) attacks have been demonstrated to
fu...
Anomaly detection for indoor air quality (IAQ) data has become an import...
The effectiveness of machine learning models is significantly affected b...
The network intrusion detection task is challenging because of the imbal...
In this work, we propose a joint adaptive codebook construction and feed...
In this paper, we consider the transmit and receive antenna array gain o...
A new polar coding scheme for higher order modulation is presented. The
...
A distribution matcher (DM) encodes a binary input data sequence into a
...
We consider the reciprocity of the information theoretic channel of Time...
A distribution matcher (DM) encodes a binary input data sequence into a
...
A probabilistic shaping method for multi-level coding (MLC) is presented...
Intel memory protection keys (MPK) is a new hardware feature to support
...
A modification to 5G New Radio (NR) polar code is proposed, which improv...
Ultimate goal of next generation Vehicle-to-everything (V2X) communicati...