Prompt-based pre-trained language models (PLMs) paradigm have succeeded
...
Adversarial training (AT) is widely considered the state-of-the-art tech...
Self-assembled InAs/GaAs quantum dots (QDs) have properties highly valua...
Quantized Neural Networks (QNNs) receive increasing attention in
resourc...
Reinforcement learning (RL) agents are known to be vulnerable to evasion...
Due to the model aging problem, Deep Neural Networks (DNNs) need updates...
Taking full advantage of the excellent performance of StyleGAN, style
tr...
Machine-Generated Text (MGT) detection, a task that discriminates MGT fr...
The security of artificial intelligence (AI) is an important research ar...
We propose covert beamforming design frameworks for integrated radar sen...
Intelligent reflecting surface (IRS) and device-to-device (D2D) communic...
Backdoor learning is an emerging and important topic of studying the
vul...
With Deep Neural Network (DNN) being integrated into a growing number of...
People are not always receptive to their voice data being collected and
...
Symbol-level precoding (SLP) based on the concept of constructive
interf...
Deepfake detection automatically recognizes the manipulated medias throu...
In this paper, we propose a constructive interference (CI)-based block-l...
In this paper, we consider a smart factory scenario where a set of actua...
Adversarial attacks against commercial black-box speech platforms, inclu...
In this paper, we consider covert beamforming design for intelligent
ref...
This paper investigates a joint beamforming design in a multiuser
multip...
Transfer learning has become a common solution to address training data
...
Face authentication usually utilizes deep learning models to verify user...
Transfer learning eases the burden of training a well-performed model fr...
In this paper, a relay-aided two-phase transmission protocol for the sma...
In this paper, we investigate the worst-case robust beamforming design a...
Facing the sparsity of user attributes on social networks, attribute
inf...
Knowledge graph (KG), as the side information, is widely utilized to lea...
Numerous resource-limited smart objects (SOs) such as sensors and actuat...
Multi-access edge computing (MEC) can enhance the computing capability o...
Deep Neural Networks are well known to be vulnerable to adversarial atta...
In commercial buildings, about 40
is attributed to Heating, Ventilation,...
Semi-supervised graph embedding methods represented by graph convolution...
In this paper, we consider the power minimization problem of joint physi...
While spectral embedding is a widely applied dimension reduction techniq...
In this paper, we aim to design an adaptive power allocation scheme to
m...
Collaborative learning allows multiple clients to train a joint model wi...
Machine Learning systems are vulnerable to adversarial attacks and will
...
Machine Learning as a Service (MLaaS) allows clients with limited resour...
Mobile edge computing (MEC) can enhance the computing capability of mobi...
This paper aims to enhance the physical layer security against potential...
Comparing with other biometrics, gait has advantages of being unobtrusiv...
This paper investigates energy-efficient resource allocation for the two...
In this paper, a novel joint design of beamforming and power allocation ...
Local covariance structure under the manifold setup has been widely appl...
In a full-duplex (FD) multi-user network, the system performance is not ...
In this paper, we consider a scenario where an unmanned aerial vehicle (...
This paper investigates an energy-efficient non-orthogonal transmission
...
The growing trend of using wearable devices for context-aware computing ...