Skip to main content

previous disabled Page of 24
and
  1. No Access

    Article

    Optimal replication strategy for mitigating burst traffic in information-centric satellite networks: a focus on remote sensing image transmission

    Information-centric satellite networks play a crucial role in remote sensing applications, particularly in the transmission of remote sensing images. However, the occurrence of burst traffic poses significant ...

    Ziyang **ng 邢紫阳, **aoqiang Di 底晓**, Hui Qi 祁晖 in Frontiers of Information Technology & Elec… (2024)

  2. No Access

    Article

    Transformer in reinforcement learning for decision-making: a survey

    Reinforcement learning (RL) has become a dominant decision-making paradigm and has achieved notable success in many real-world applications. Notably, deep neural networks play a crucial role in unlocking RL’s ...

    Weilin Yuan 袁唯淋, Jiaxing Chen 陈佳星 in Frontiers of Information Technology & Elec… (2024)

  3. No Access

    Article

    SEVAR: a stereo event camera dataset for virtual and augmented reality

    In this paper, we present a precisely synchronized event-based dataset, designed especially for multi-sensor fusion in SLAM applications, with a particular emphasis on VR and AR scenarios. Alongside setting up...

    Yuda Dong 董宇达, Zetao Chen 陈泽涛, **n He 何欣 in Frontiers of Information Technology & Elec… (2024)

  4. Article

    Coordination of networking and computing: toward new information infrastructure and new services mode

    **aoyun Wang 王晓云, Tao Sun 孙滔, Yong Cui 崔勇 in Frontiers of Information Technology & Elec… (2024)

  5. Article

    Open Access

    A novel trusted hardware-based scalable security framework for IoT edge devices

    The Internet of Things (IoT) devices are pervasively deployed and embedded into our daily lives. Over several years, the massive assimilation of IoT devices has given rise to smart cities, smart factories, sma...

    Mohd Khan, Mohsen Hatami, Wenfeng Zhao, Yu Chen in Discover Internet of Things (2024)

  6. No Access

    Article

    Multi-exit self-distillation with appropriate teachers

    Multi-exit architecture allows early-stop inference to reduce computational cost, which can be used in resource-constrained circumstances. Recent works combine the multi-exit architecture with self-distillatio...

    Wujie Sun 孙武杰, Defang Chen 陈德仿, Can Wang 王灿 in Frontiers of Information Technology & Elec… (2024)

  7. No Access

    Article

    An anti-collision algorithm for robotic search-and-rescue tasks in unknown dynamic environments

    This paper deals with the search-and-rescue tasks of a mobile robot with multiple interesting targets in an unknown dynamic environment. The problem is challenging because the mobile robot needs to search for ...

    Yang Chen 陈洋, Dianxi Shi 史殿** in Frontiers of Information Technology & Elec… (2024)

  8. Article

    Erratum to: A visual analysis approach for data imputation via multi-party tabular data correlation strategies

    Haiyang Zhu, Dongming Han, Jiacheng Pan in Frontiers of Information Technology & Elec… (2024)

  9. No Access

    Article

    A visual analysis approach for data imputation via multi-party tabular data correlation strategies

    Data imputation is an essential pre-processing task for data governance, aimed at filling in incomplete data. However, conventional data imputation methods can only partly alleviate data incompleteness using i...

    Haiyang Zhu, Dongming Han, Jiacheng Pan in Frontiers of Information Technology & Elec… (2024)

  10. No Access

    Article

    Low-rank matrix recovery with total generalized variation for defending adversarial examples

    Low-rank matrix decomposition with first-order total variation (TV) regularization exhibits excellent performance in exploration of image structure. Taking advantage of its excellent performance in image denoi...

    Wen Li **文, Hengyou Wang 王恒友, Lianzhi Huo 霍连志 in Frontiers of Information Technology & Elec… (2024)

  11. No Access

    Article

    Outlier-resistant distributed fusion filtering for nonlinear discrete-time singular systems under a dynamic event-triggered scheme

    This paper investigates the problem of outlier-resistant distributed fusion filtering (DFF) for a class of multi-sensor nonlinear singular systems (MSNSSs) under a dynamic event-triggered scheme (DETS). To rel...

    Zhibin Hu 胡志斌, Jun Hu 胡军, Cai Chen 陈才 in Frontiers of Information Technology & Elec… (2024)

  12. No Access

    Article

    Empowering smart city situational awareness via big mobile data

    Smart city situational awareness has recently emerged as a hot topic in research societies, industries, and governments because of its potential to integrate cutting-edge information technology and solve urgen...

    Zhiguang Shan 单志广, Lei Shi 时磊, Bo Li **博 in Frontiers of Information Technology & Elec… (2024)

  13. No Access

    Article

    Deep3DSketch-im: rapid high-fidelity AI 3D model generation by single freehand sketches

    The rise of artificial intelligence generated content (AIGC) has been remarkable in the language and image fields, but artificial intelligence (AI) generated three-dimensional (3D) models are still under-explo...

    Tianrun Chen 陈天润, Runlong Cao 曹润龙 in Frontiers of Information Technology & Elec… (2024)

  14. No Access

    Article

    A geometric semantic macro-crossover operator for evolutionary feature construction in regression

    Evolutionary feature construction has been successfully applied to various scenarios. In particular, multi-tree genetic programming-based feature construction methods have demonstrated promising results. Howev...

    Hengzhe Zhang, Qi Chen, Bing Xue in Genetic Programming and Evolvable Machines (2023)

  15. No Access

    Article

    Max-min rate optimization for multi-user MISO-OFDM systems assisted by RIS with a wideband model

    Reconfigurable intelligent surfaces (RISs) have the capability to change the wireless environment smartly Considering the attenuation of subchannels and crowding users involved in the wideband system, we intro...

    Yonghua Quan 全永桦, Zhong Tian 田中 in Frontiers of Information Technology & Elec… (2023)

  16. No Access

    Article

    Beamforming design for RIS-aided amplify-and-forward relay networks

    The use of a reconfigurable intelligent surface (RIS) in the enhancement of the rate performance is considered to involve the limitation of the RIS being a passive reflector. To address this issue, we propose ...

    Xuehui Wang 王雪辉, Feng Shu 束锋 in Frontiers of Information Technology & Elec… (2023)

  17. No Access

    Article

    Pattern-reconfigurable antenna-assisted secret key generation from multipath fading channels

    Physical layer key generation (PKG) technology leverages reciprocal channel randomness to generate shared secret keys. However, multipath fading at the receiver may degrade the correlation between legitimate u...

    Zheng Wan 万政, Mengyao Yan 闫梦瑶 in Frontiers of Information Technology & Elec… (2023)

  18. No Access

    Article

    Uncertainty-aware complementary label queries for active learning

    In this paper, we tackle the problem of ALCL (Liu et al., 2023). The objective of ALCL is to directly reduce the cost of annotation actions in AL, while providing a feasible approach for obtaining complementar...

    Shengyuan Liu 刘圣源, Ke Chen 陈珂 in Frontiers of Information Technology & Elec… (2023)

  19. No Access

    Article

    Attention-based efficient robot grasp detection network

    To balance the inference speed and detection accuracy of a grasp detection algorithm, which are both important for robot gras** tasks, we propose an encoder–decoder structured pixel-level grasp detection neu...

    **aofei Qin 秦晓飞, Wenkai Hu 胡文凯, Chen **ao 肖晨 in Frontiers of Information Technology & Elec… (2023)

  20. No Access

    Article

    RFPose-OT: RF-based 3D human pose estimation via optimal transport theory

    This paper introduces a novel framework, i.e., RFPose-OT, to enable three-dimensional (3D) human pose estimation from radio frequency (RF) signals. Different from existing methods that predict human poses from...

    Cong Yu 俞聪, Dongheng Zhang 张东恒, Zhi Wu 武治 in Frontiers of Information Technology & Elec… (2023)

previous disabled Page of 24