Generating realistic and controllable motions for virtual characters is ...
Aiming at the problem that GNSS-RTK technology cannot effectively monito...
Decentralized federated learning (DFL) is an effective approach to train...
Spectrum coexistence is essential for next generation (NextG) systems to...
The opacity of FRTE depends on not only the material temperature but als...
Multi-scale detection plays an important role in object detection models...
Rich semantics inside an image result in its ambiguous relationship with...
NextG networks are intended to provide the flexibility of sharing the
sp...
Federated learning (FL) offers a decentralized learning environment so t...
Recent development in brain-machine interface technology has made seizur...
Nanobodies are small antibody fragments derived from camelids that
selec...
We consider adversarial machine learning based attacks on power allocati...
An over-the-air membership inference attack (MIA) is presented to leak
p...
GAN-based neural vocoders, such as Parallel WaveGAN and MelGAN have attr...
The majority of Chinese characters are monophonic, i.e.their pronunciati...
Network slicing manages network resources as virtual resource blocks (RB...
Reinforcement learning (RL) for network slicing is considered in the 5G ...
Machine learning provides automated means to capture complex dynamics of...
In this paper, we will develop a class of high order asymptotic preservi...
The paper presents a reinforcement learning solution to dynamic resource...
We present an end-to-end method for object detection and trajectory
pred...
The spoofing attack is critical to bypass physical-layer signal
authenti...
This paper presents how to leak private information from a wireless sign...
Existing communication systems exhibit inherent limitations in translati...
Wireless systems are vulnerable to various attacks such as jamming and
e...
Coherent communications aim to support higher data rates and extended
co...
A cross-layer cognitive radio system is designed to support unicast and
...
An adversarial deep learning approach is presented to launch over-the-ai...
The problem of quality of service (QoS) and jamming-aware communications...
Dynamic spectrum access (DSA) benefits from detection and classification...
Machine learning finds rich applications in Internet of Things (IoT) net...
The paper presents a novel approach of spoofing wireless signals by usin...
Machine learning has been widely applied in wireless communications. How...
As online systems based on machine learning are offered to public or pai...
Machine learning has been applied to a broad range of applications and s...
An adversarial machine learning approach is introduced to launch jamming...
Hashing is one of the most popular and powerful approximate nearest neig...