Search
Search Results
-
End-to-End No-wait Scheduling for Time-Triggered Streams in Mixed Wired-Wireless Networks
Proprietary communication technologies for time-critical communication in industrial environments are being gradually replaced by Time-sensitive...
-
Adaptive context-aware access control for IoT environments leveraging fog computing
The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...
-
Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system
Software can be vulnerable to various types of interference. The production of cyber threat intelligence for closed source software requires...
-
IAFPN: interlayer enhancement and multilayer fusion network for object detection
Feature pyramid network (FPN) improves object detection performance by means of top-down multilevel feature fusion. However, the current FPN-based...
-
Non-uniform magnetic fields for collective behavior of self-assembled magnetic pillars
Programmable and self-assembled magnetic pillars are essential to expanding the application domain of magnetic microparticle collectives. Typically,...
-
GOA-net: generic occlusion aware networks for visual tracking
Occlusion is a frequent phenomenon that hinders the task of visual object tracking. Since occlusion can be from any object and in any shape, data...
-
Online camera auto-calibration appliable to road surveillance
Camera calibration is an essential prerequisite for road surveillance applications, which determines the accuracy of obtaining three-dimensional...
-
Exploring AI-driven approaches for unstructured document analysis and future horizons
In the current industrial landscape, a significant number of sectors are grappling with the challenges posed by unstructured data, which incurs...
-
Trust management in the internet of vehicles: a systematic literature review of blockchain integration
The Internet of Vehicles (IoV) promises to revolutionize transportation in smart cities, but its interconnectedness raises critical security and...
-
Expediting the design and development of secure cloud-based mobile apps
The adoption and popularity of mobile devices by end-users is partially driven by the increasing development and availability of mobile applications...
-
Tree-managed network ensembles for video prediction
This paper presents an innovative approach that leverages a tree structure to effectively manage a large ensemble of neural networks for tackling...
-
Poly-cam: high resolution class activation map for convolutional neural networks
The demand for explainable AI continues to rise alongside advancements in deep learning technology. Existing methods such as convolutional neural...
-
New custom rating for improving recommendation system performance
Recommendation system is currently attracting the interest of many explorers. Various new businesses have surfaced with the rise of online marketing...
-
Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes
Chameleon-hash functions, introduced by Krawczyk and Rabin (NDSS’00), are trapdoor collision-resistant hash functions parametrized by a public key....
-
Multi-party codebook distribution strategy based on secret sharing
The paper addresses the issue of secure distribution of codebooks in the field of information security, particularly in the domain of covert...
-
Several families of q-ary cyclic codes with length \(q^m-1\)
It is very hard to construct an infinite family of cyclic codes of rate close to one half whose minimum distances have a good bound. Tang-Ding codes...
-
The viability of domain constrained coalition formation for robotic collectives
Applications, such as military and disaster response, can benefit from robotic collectives’ ability to perform multiple cooperative tasks (e.g.,...
-
Towards scanning electron microscopy image denoising: a state-of-the-art overview, benchmark, taxonomies, and future direction
Scanning electron microscope (SEM) enables imaging of micro-nano scale objects. It is an analytical tool widely used in the material, earth and life...
-
Adversarial defence by learning differentiated feature representation in deep ensemble
Deep learning models have been shown to be vulnerable to critical attacks under adversarial conditions. Attackers are able to generate powerful...
-
Minimizing cache usage with fixed-priority and earliest deadline first scheduling
Cache partitioning is a technique to reduce interference among tasks running on the processors with shared caches. To make this technique effective,...