![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Deployment algorithms of multi-UAV-BS networks with frequency reuse and power optimization
Deploying unmanned aerial vehicle base stations (UAV-BSs) to provide wireless access for terrestrial users is an alternative solution in emergency scenarios. Due to the dynamic nature of UAV-BSs and strong lin...
-
Article
Open AccessOnline Learner Categories Recognition Based on MoE-LSTM Model
Online learner behaviour patterns are comprehensive indicators reflecting the learning status and learning outcomes of online learners, which have a guiding role in the design, implementation and improvement o...
-
Article
Adaptive vertical federated learning via feature map transferring in mobile edge computing
To bring more intelligence to edge systems, Federated Learning (FL) is proposed to provide a privacy-preserving mechanism to train a globally shared model by utilizing a massive amount of user-generated data o...
-
Chapter and Conference Paper
Reform and Practice of Programming Courses’ Construction
The design of course group is an important part of major construction. The construction of course group should be closely focused on the professional talent training objectives. The cultivation of talents for ...
-
Chapter and Conference Paper
SeHBPL: Behavioral Semantics-Based Patch Presence Test for Binaries
Patch presence testing is a critical component of risk and loss assessment for software vulnerabilities. By determining whether a patch has been applied to their software, organizations can better understand t...
-
Article
Knowledge distilled pre-training model for vision-language-navigation
Vision-language-navigation(VLN) is a challenging task that requires a robot to autonomously move to a destination based on visual observation following a human’s natural language instructions. To improve the p...
-
Chapter and Conference Paper
An Efficient Approach to Wireless Firmware Update Based on Erasure Correction Coding
Updating the firmware of the deployed nodes in a large sensor network can be time consuming and challenging. One way to perform these updates is through an over-the-air (OTA) protocol that utilizes repeated ro...
-
Chapter and Conference Paper
Fiber-Missing Tensor Completion for DOA Estimation with Sensor Failure
In this paper, we propose a fiber-missing tensor completion-based method for direction-of-arrival (DOA) estimation in sensor failure scenario, where the completion of a three-dimensional (3-D) incomplete tenso...
-
Chapter and Conference Paper
A Configuration Design Method for the Redundant Inertial Measurement Unit Based on the Distributed Salp Swarm Algorithm
In the redundant inertial measurement unit (RIMU), the sensors configuration is the essential factor to determine the performance. This paper proposes a novel configuration design method to optimize the precis...
-
Chapter and Conference Paper
Complex Shape Formation Control for Swarms Using Artificial Potentials
In this paper, we propose a decentralized control algorithm to solve the problem of shape formation in homogeneous swarms, which enables a swarm of agents to achieve a specific shape formation without collisio...
-
Chapter and Conference Paper
A Multi-modal System for Video Semantic Understanding
This paper proposes a video semantic understanding system based on multi-modal data fusion. The system includes two sub-models, the video classification tag model (VCT) and the video semantic tag model (VST), ...
-
Chapter and Conference Paper
Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement
Deep learning plays a vital role in malware detection. The Malconv is a well-known deep learning-based open source malware detection framework and is trained on raw bytes for malware binary detection. Research...
-
Chapter and Conference Paper
Multi-strategy Parallel Phasmatodea Population Evolution Algorithm for Public Transport Scheduling
The phasmatodea population evolution algorithm (PPE) is a novel algorithm to simulate population evolution. In this paper, a multi-strategy parallel phasmatodea population evolution algorithm (MPPPE) is propos...
-
Chapter and Conference Paper
A Novel Self-supervised Few-shot Network Intrusion Detection Method
Supervised models for network intrusion detection usually rely on many training samples, but the annotation costs are very high. Unlabeled network traffic data is relatively easy to obtain. However, there are ...
-
Chapter and Conference Paper
Drone Detection with Visual Transformer
The rapid growth of drones presents potential threats to public security and personal privacy, and it is vital to effectively detect the intruding drones. Prior work on visual-based drone detection using convo...
-
Chapter and Conference Paper
Clustering-Enhanced Knowledge Graph Embedding
Knowledge graph embedding (KGE) is a task to transform the symbolic entities and relations in Knowledge Graphs (KGs) into low-dimensional vectors, which facilitates the use of KGs in downstream applications. H...
-
Chapter and Conference Paper
Feature Map Transfer: Vertical Federated Learning for CNN Models
Federated learning provides a privacy-preserving mechanism for multiple participants to collaboratively train machine learning models without exchanging private data with each other. Existing federated learnin...
-
Chapter and Conference Paper
Research on Off-Path Exploits of Network Protocols
With the rapid development of the Internet industry, from a global perspective, the risks brought by network security are becoming increasingly prominent, and continue to penetrate into political, economic, cu...
-
Chapter and Conference Paper
A Robust IoT Device Identification Method with Unknown Traffic Detection
Internet of Things (IoT) device identification plays a basic and essential role in network management and cyberspace security. Previous device identification methods perform poorly in real-world networks where...
-
Chapter and Conference Paper
Reasoning About Iteration and Recursion Uniformly Based on Big-Step Semantics
A reliable technique for deductive program verification should be proven sound with respect to the semantics of the programming language. For each different language, the construction of a separate soundness p...