We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 41-60 of 10,000 results
  1. Communication efficiency optimization of federated learning for computing and network convergence of 6G networks

    Federated learning effectively addresses issues such as data privacy by collaborating across participating devices to train global models. However,...

    Yizhuo Cai, Bo Lei, ... **ng Zhang in Frontiers of Information Technology & Electronic Engineering
    Article 01 May 2024
  2. Federated learning on non-IID and long-tailed data via dual-decoupling

    Federated learning (FL), a cutting-edge distributed machine learning training paradigm, aims to generate a global model by collaborating on the...

    Zhaohui Wang, Hongjiao Li, ... Bao** Wang in Frontiers of Information Technology & Electronic Engineering
    Article 01 May 2024
  3. Target parameter estimation for OTFS-integrated radar and communications based on sparse reconstruction preprocessing

    Orthogonal time–frequency space (OTFS) is a new modulation technique proposed in recent years for high Doppler wireless scenes. To solve the...

    Zhenkai Zhang, **aoke Shang, Yue **ao in Frontiers of Information Technology & Electronic Engineering
    Article 01 May 2024
  4. A novel trusted hardware-based scalable security framework for IoT edge devices

    The Internet of Things (IoT) devices are pervasively deployed and embedded into our daily lives. Over several years, the massive assimilation of IoT...

    Mohd Khan, Mohsen Hatami, ... Yu Chen in Discover Internet of Things
    Article Open access 27 April 2024
  5. Optimal replication strategy for mitigating burst traffic in information-centric satellite networks: a focus on remote sensing image transmission

    Information-centric satellite networks play a crucial role in remote sensing applications, particularly in the transmission of remote sensing images....

    Ziyang **ng, **aoqiang Di, ... **nghan Huo in Frontiers of Information Technology & Electronic Engineering
    Article 18 April 2024
  6. Hierarchical non-dominated sort: analysis and improvement

    Pareto dominance-based multiobjective evolutionary algorithms use non-dominated sorting to rank their solutions. In the last few decades, various...

    Ved Prakash, Sumit Mishra in Genetic Programming and Evolvable Machines
    Article 16 April 2024
  7. Architecture search of accurate and lightweight CNNs using genetic algorithm

    Convolutional neural networks (CNNs) are popularly-used in various AI fields, yet the design of CNN architectures heavily depends on domain...

    Jiayu Liang, Hanqi Cao, ... Mingming Su in Genetic Programming and Evolvable Machines
    Article 01 April 2024
  8. Secure resource allocation against colluding eavesdrop** in a user-centric cell-free massive multiple-input multiple-output system

    We investigate the resource allocation problem of a cell-free massive multiple-input multiple-output system under the condition of colluding...

    Na Li, Yuanyuan Gao, ... Yueyue Zhang in Frontiers of Information Technology & Electronic Engineering
    Article 01 April 2024
  9. FaSRnet: a feature and semantics refinement network for human pose estimation

    Due to factors such as motion blur, video out-of-focus, and occlusion, multi-frame human pose estimation is a challenging task. Exploiting temporal...

    Yuanhong Zhong, Qianfeng Xu, ... Shanshan Wang in Frontiers of Information Technology & Electronic Engineering
    Article 01 April 2024
  10. An anti-collision algorithm for robotic search-and-rescue tasks in unknown dynamic environments

    This paper deals with the search-and-rescue tasks of a mobile robot with multiple interesting targets in an unknown dynamic environment. The problem...

    Yang Chen, Dianxi Shi, ... Zhen Wang in Frontiers of Information Technology & Electronic Engineering
    Article 01 April 2024
  11. Design and verification of an FPGA programmable logic element based on Sense-Switch pFLASH

    This paper proposes a kind of programmable logic element (PLE) based on Sense-Switch pFLASH technology. By programming Sense-Switch pFLASH, all...

    Zhengzhou Cao, Guozhu Liu, ... Yuting Xu in Frontiers of Information Technology & Electronic Engineering
    Article 01 April 2024
  12. Towards sustainable adversarial training with successive perturbation generation

    Adversarial training with online-generated adversarial examples has achieved promising performance in defending adversarial attacks and improving...

    Article 01 April 2024
  13. A new representation in 3D VLSI floorplan: 3D O-Tree

    The size of the implemented circuit plays a vital role in maximizing the performance of the chip. Hence, researchers are looking to utilize the extra...

    Rohin Gupta, Sandeep Singh Gill in Genetic Programming and Evolvable Machines
    Article 01 April 2024
  14. A spaceborne advanced storage system for remote sensing microsatellites

    With the development of satellite miniaturization and remote sensing, the establishment of microsatellite constellations is an inevitable trend. Due...

    Shilei Tu, Huiquan Wang, ... Zhonghe ** in Frontiers of Information Technology & Electronic Engineering
    Article 01 April 2024
  15. Availability evaluation of controller area networks under the influence of intermittent connection faults

    Controller area networks (CANs), as one of the widely used fieldbuses in the industry, have been extended to the automation field with strict...

    Longkai Wang, Leiming Zhang, Yong Lei in Frontiers of Information Technology & Electronic Engineering
    Article 01 April 2024
  16. Novel design of a compact tunable dual band wireless power transfer (TDB-WPT) system for multiple WPT applications

    In this study we present the design and realization of a tunable dual band wireless power transfer (TDB-WPT) coupled resonator system. The frequency...

    Hany A. Atallah, Rasha Hussein Ahmed, Adel B. Abdel-Rahman in Frontiers of Information Technology & Electronic Engineering
    Article 01 April 2024
  17. Securing multi-chain consensus against diverse miner behavior attacks in blockchain networks

    As cross-chain technologies enable interactions among different blockchains (hereinafter “chains”), multi-chain consensus is becoming increasingly...

    Wenbo Zhang, Tao Wang, ... **gyu Feng in Frontiers of Information Technology & Electronic Engineering
    Article 01 April 2024
  18. Multi-exit self-distillation with appropriate teachers

    Multi-exit architecture allows early-stop inference to reduce computational cost, which can be used in resource-constrained circumstances. Recent...

    Wujie Sun, Defang Chen, ... Chun Chen in Frontiers of Information Technology & Electronic Engineering
    Article 01 April 2024
Did you find what you were looking for? Share feedback.