Trust evaluation assesses trust relationships between entities and
facil...
Domain adaptation (DA) adapts a training dataset from a source domain fo...
Deep learning (DL) techniques are highly effective for defect detection ...
5G is the 5th generation cellular network protocol. It is the
state-of-t...
Modern smart TVs often communicate with their remote controls (including...
Increasing use of machine learning (ML) technologies in privacy-sensitiv...
In order to support a variety of missions and deal with different flight...
Federated learning enables a global machine learning model to be trained...
A fundamental premise of SMS One-Time Password (OTP) is that the used
ps...
By all measures, wireless networking has seen explosive growth over the ...
Many proximity-based tracing (PCT) protocols have been proposed and depl...
The rise of Artificial Intelligence (AI) will bring with it an
ever-incr...
The Internet of Things (IoT) and edge computing applications aim to supp...
Increasing use of ML technologies in privacy-sensitive domains such as
m...
Technology advances in areas such as sensors, IoT, and robotics, enable ...
Cellular networks represent a critical infrastructure and their security...
`Anytime, Anywhere' data access model has become a widespread IT policy ...