In this paper, a power-constrained hybrid automatic repeat request (HARQ...
Homomorphic encryption (HE) enables computations on encrypted data by
co...
NVMe(Non-Volatile Memory Express) is an industry standard for solid-stat...
In the field of security, multi-objective security games (MOSGs) allow
d...
The visual modeling method enables flexible interactions with rich graph...
Lightweight neural networks for single-image super-resolution (SISR) tas...
Single-branch object detection methods use shared features for localizat...
Due to large reflection and diffraction losses in the THz band, it is
ar...
Existing approaches focus on using class-level features to improve seman...
In this paper, we present a fast, lightweight odometry method that uses ...
As an emerging service for in-browser content delivery, peer-assisted
de...
To extract channel characteristics and conduct channel modeling in
milli...
With abundant bandwidth resource, the Terahertz band (0.1 THz to 10 THz)...
Owning abundant bandwidth resource, the Terahertz (0.1-10 THz) band is a...
The Terahertz (0.1-10 THz) band has been envisioned as one of the promis...
IoT devices recently are utilized to detect the state transition in the
...
With extensive studies on backdoor attack and detection, still fundament...
Frequency-Modulated Continuous-Wave (FMCW) lidar is a recently emerging
...
The Terahertz (THz) band (0.1-10 THz), which supports Terabit-per-second...
Many organizations have access to abundant data but lack the computation...
Terahertz (THz) communications are envisioned as a promising technology ...
Event camera is a new type of sensor that is different from traditional
...
Event cameras are a new type of sensors that are different from traditio...
In this paper, we present a novel algorithm for point cloud registration...
Traffic sign detection is a challenging task for the unmanned driving sy...
Imperfect labels are ubiquitous in real-world datasets and seriously har...
Event cameras are a new type of sensors that are different from traditio...
Terahertz (THz) communications are envisioned as a key technology for si...
Packet routing is a fundamental problem in communication networks that
d...
Maintaining long-term exploration ability remains one of the challenges ...
Since the mapping relationship between definitized intra-interventional ...
TeraHertz (THz) communications are envisioned as a promising technology,...
In this paper, we investigate the problem of the inverse reinforcement
l...
TeraHertz (THz) communications are envisioned as a promising technology,...
Variable division and optimization (D&O) is a frequently utilized algori...
In this work, we develop practical user scheduling algorithms for downli...
Reverse-engineering bar charts extracts textual and numeric information ...
We consider the stochastic contextual bandit problem under the high
dime...
Adverse drug events (ADEs) are a serious health problem that can be
life...
A trusted execution environment (TEE) such as Intel Software Guard Exten...
Langevin diffusion is a powerful method for nonconvex optimization, whic...
Computer vision algorithms are being implemented across a breadth of
ind...
The fast growing ad-blocker usage results in large revenue decrease for
...
A lot of real-world applications could be modeled as the Mixed-Integer
N...
This paper first reviews the reversible data hiding scheme, of Liu et al...
This paper revisits the reversible data hiding scheme, of Liu et al. in ...
There exist many zero quantized discrete cosine transform (QDCT) coeffic...
Data in mobile cloud environment are mainly transmitted via wireless noi...
Asymmetry analysis based on the overlapping of thermal images proved abl...
The application of machine learning to bioinformatics problems is well
e...