-
Chapter and Conference Paper
Optimal Deception Attacks on Remote State Estimation with Heterogeneous Vulnerabilities
This study explores optimal deception attacks on remote state estimation, focusing on scenarios with heterogeneous vulnerabilities. Acknowledging the limitations of attackers’ resources and defenders’ capabili...
-
Chapter and Conference Paper
GES: An Efficient Evaluation Experts Selecting Strategy Based on Genetic Algorithm
In the evaluation of technology projects, multiple experts need to be selected to evaluate a group of projects each of which covers different technology fields. However, each expert has his own advantage field...
-
Chapter and Conference Paper
A Proposed Language Model Based on LSTM
In view of the shortcomings of language model N-gram, this paper presents a Long Short-Term Memory (LSTM)-based language model based on the advantage that LSTM can theoretically utilize any long sequence of in...
-
Chapter and Conference Paper
Large-Scale Fading Measurement and Comparison for O2I Channels at Three Frequencies
Channel measurement and modeling are fundamental and critical for the analysis and simulations of communication systems. For the fifth generation (5G) cellular network, the wireless channel characterization in...
-
Chapter and Conference Paper
Analysis of Sustainable Development in Guilin by Using the Theory of Ecological Footprint
This study is a project which calculates ecological footprint of Guilin in the past decade by theory of ecological footprint. The results showed that: from 1999 to 2008, per-capita biological capacity was stab...
-
Chapter and Conference Paper
Late Mesozoic-Cenozoic tectono-sedimentary evolution and sandstone-hosted uranium mineralization of the Erlian basin
The tectono-sedimentary evolution of the Erlian basin can be divided into 3 stages: continental extension and down-faulting, transformation of down-faulting to down-war**, weak compression and differential u...