-
Chapter and Conference Paper
A Facial Modeling and Animation System Based on Single Image
In this paper, a facial modeling and animation system based on single image is proposed to generate the natural modeling and animation. First, a Mophable Model has been established offline. Then in the facial ...
-
Article
Automatically synthesizing DoS attack traces using generative adversarial networks
Artificial intelligence (AI) technology ruling people is still the scene in the science fiction film, but hackers using AI technology against existing security measures is an inescapable trend. Network intrusi...
-
Article
An actor-critic reinforcement learning-based resource management in mobile edge computing systems
Reinforcement learning (RL) as an effective tool has attracted great attention in wireless communication field nowadays. In this paper, we investigate the offloading decision and resource allocation problem in...
-
Article
The impact of propagation delay to different selfish miners in proof-of-work blockchains
Selfish mining is an attack on the integrity of a blockchain network. Inspired by J. Göbel’s selfish mining model in the presence of propagation delay, we propose a competition model based on spatial Poisson p...
-
Article
Synchrotron-Based Temperature-Dependent Terahertz and Far-Infrared Spectroscopy of Aerographite and Single-Walled Carbon Nanotube Aerogel
Synchrotron-based terahertz and far-infrared spectra of aerographite and single-walled carbon nanotube aerogel were acquired using the terahertz/far-infrared beamline at the Australian Synchrotron in the frequ...
-
Article
ECC-based lightweight authentication and access control scheme for IoT E-healthcare
The E-healthcare system has a complex architecture, diverse business types, and sensitive data security. To meet the secure communication and access control requirements in the user–medical server, user–patien...
-
Chapter and Conference Paper
Design of Brake Disc Dust Cover Based on Multidisciplinary Optimization Method
Modal, stiffness, vibration durability and other multidisciplinary properties need to be considered in the structural design of brake disc dust cover
-
Article
Android malware adversarial attacks based on feature importance prediction
In the last decade, malicious Android applications have increased rapidly because of the popularity of Android mobile devices. In particular, some Android malware starts to use the adversarial examples generat...