Increased capacity in the access network poses capacity challenges on th...
The various benefits of multi-tenanting, such as higher device utilizati...
This technical report presents our solution to Ball Action Spotting in
v...
Platooning technologies enable trucks to drive cooperatively and
automat...
This paper presents a hybrid blockchain-edge architecture for managing
E...
Blockchain-based IoT systems can manage IoT devices and achieve a high l...
Blockchain-based IoT systems can manage IoT devices and achieve a high l...
Consensus algorithms play a critical role in blockchains and directly im...
Platooning technologies enable trucks to drive cooperatively and
automat...
Network-controlled repeater (NCR) has been recently considered as a
stud...
Norm discovery is important for understanding and reasoning about the
ac...
Integrated access and backhaul (IAB) is one of the promising techniques ...
On the one hand, there is a growing demand for high throughput which can...
Supply Chain Platforms (SCPs) provide downstream industries with numerou...
Reinforcement learning (RL) is a machine learning paradigm where an
auto...
Stealthy hardware Trojans (HTs) inserted during the fabrication of integ...
Insertion of hardware Trojans (HTs) in integrated circuits is a pernicio...
In presence of spatial heterogeneity, models applied to geographic data ...
Ensemble methods have been widely used to improve the performance of mac...
Internet-of-vehicle (IoV) is a general concept referring to, e.g., auton...
Stochastic weight averaging (SWA) is recognized as a simple while one
ef...
Recent non-local self-attention methods have proven to be effective in
c...
The non-local network has become a widely used technique for semantic
se...
Moving relay (MR), which is a candidate solution for supporting in-vehic...
In future wireless networks, one of the use-cases of interest is
Interne...
Ocean fronts can cause the accumulation of nutrients and affect the
prop...
Many AI-related tasks involve the interactions of data in multiple
modal...
Recently the crowd counting has received more and more attention. Especi...
Semantic segmentation of nighttime images plays an equally important rol...
ExploitDB is one of the important public websites, which contributes a l...
In future wireless systems, a large number of users may access wireless
...
The on-demand mobility market, including ridesharing, is becoming
increa...
In future wireless networks, we anticipate that a large number of device...
More personal consumer loan products are emerging in mobile banking APP....
Software vulnerabilities have been continually disclosed and documented....
Vehicle communication is one of the most important use cases in the fift...
Predictor antenna (PA) system is referred to as a system with two sets o...
Predictor antenna (PA) system is referred to as a system with two sets o...
In this work, we study the performance of predictor antenna (PA) systems...
The global Electronic Health Record (EHR) market is growing dramatically...
Attribute-based Encryption (ABE) is an information centric security solu...
Attribute-Based Encryption (ABE) has emerged as an information-centric
p...
First-order Marcum Q-function is observed in various problem formulation...
As deep networks are applied to an ever-expanding set of computer vision...
The global Electronic Health Record (EHR) market is growing dramatically...
Attribute-based access control makes access control decisions based on t...
Indicators of Compromise (IOCs) are artifacts observed on a network or i...
Autonomous vehicles are capable of sensing their environment and navigat...
Region-based Convolutional Neural Networks (R-CNNs) have achieved great
...