Vulnerability detection is a critical problem in software security and
a...
Recent accidents involving self-driving cars call for extensive testing
...
With the rising emergence of decentralized and opportunistic approaches ...
Accurate and safety-quantifiable localization is of great significance f...
Sleep stage recognition is crucial for assessing sleep and diagnosing ch...
When developing autonomous driving systems (ADS), developers often need ...
Spatial-temporal data contains rich information and has been widely stud...
Existing Deep Neural Nets on crops growth prediction mostly rely on
avai...
Structured Light Illumination (SLI) systems have been used for reliable
...
Graph representation learning has drawn increasing attention in recent y...
We present a spatial-temporal federated learning framework for graph neu...
Autonomous driving shows great potential to reform modern transportation...
With the growing popularity of Android devices, Android malware is serio...
The rapid development of artificial intelligence, especially deep learni...
Pervasive computing applications commonly involve user's personal smartp...
Federated learning (FL) utilizes edge computing devices to collaborative...
To reduce uploading bandwidth and address privacy concerns, deep learnin...
The Internet of Vehicles (IoV) is an application of the Internet of thin...
The ever-increasing data traffic, various delay-sensitive services, and ...
Deep neural network models are widely used for perception and control in...
Deep learning technology has been widely used in edge computing. However...
In federated learning, machine learning and deep learning models are tra...
Privacy protection in electronic healthcare applications is an important...
Nowadays, Deep Learning as a service can be deployed in Internet of Thin...
Code clone is a serious problem in software and has the potential to sof...
Efficient and appropriate online customer service is essential to large
...
In the encrypted network traffic intrusion detection, deep learning base...
As 5G and Internet-of-Things (IoT) are deeply integrated into vertical
i...
Timely status updating is crucial for future applications that involve r...
Emerging applications in Internet of Things (IoT), such as remote monito...
Cyber security is one of the most significant challenges in connected
ve...
Timely status updates are crucial to enabling applications in massive
In...
Simulation especially real-time simulation have been widely used for the...
Internet of Things (IoT) is a novel paradigm, which not only facilitates...
Software as a Service (SaaS) is well established as an effective model f...
With the prevalence of applications in cloud, Database as a Service (DBa...
In a typical Internet of Things (IoT) application where a central contro...