Facilitated by messaging protocols (MP), many home devices are connected...
One intriguing property of adversarial attacks is their "transferability...
Code retrieval is to find the code snippet from a large corpus of source...
While the celebrated graph neural networks yield effective representatio...
Recognizing surfaces based on their vibration signatures is useful as it...
In this paper, we propose to use commercial off-the-shelf (COTS) monosta...
With the advent of the era of big data, deep learning has become a preva...
In wireless sensor networks (WSNs), the opportunistic routing has better...
The sketch is one of the typical and widely used data structures for
est...
In the wireless network applications, such as routing decision, network
...
Mobile edge computing (MEC) has emerged for reducing energy consumption ...
Home Digital Voice Assistants (HDVAs) are getting popular in recent year...