We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 10,000 results
  1. Research on Fuzzy Weighted Controller for Battery Discharge of Dual-Channel Dual-Active Bridge

    Aiming at the dual closed-loop control of dual-active bridge (DAB) charging and discharging circuits in energy storage devices, which is difficult to...
    Kai**n Shu, Yu Fang, ... Xuehua Wang in Applied Intelligence
    Conference paper 2024
  2. Experimental evaluation of MU-MIMO in TDD environment for 5G NR using exploiting channel reciprocity

    5G New Radio (NR) operates in two frequency ranges viz. Frequency Range 1 (sub-6 GHz band) and Frequency Range 2 (millimeter wave communication). It...

    Rajesh Kumar, Deepak Sinwar, Vijander Singh in International Journal of Information Technology
    Article 04 June 2024
  3. Using Machine Learning for Detecting Timing Side-Channel Attacks in SDN

    Software-Defined Networking (SDN) is a networking technology that allows for the programming and efficient management of networks. Due to the...
    Faizan Shoaib, Yang-Wai Chow, ... Chau Nguyen in Mobile Internet Security
    Conference paper 2023
  4. No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis

    Deep learning is a powerful direction for profiling side-channel analysis as it can break targets protected with countermeasures even with a...

    Maikel Kerkhof, Lichao Wu, ... Stjepan Picek in Journal of Cryptographic Engineering
    Article Open access 28 May 2023
  5. Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption

    Payment channel path information includes node identity and balance. With this public information, an attacker can initiate a recurring transaction...
    Ming Liu, Mingyue Zhang, ... Bo Lan in Information Security and Cryptology
    Conference paper 2024
  6. Lightweight Alpha Matting Network Using Distillation-Based Channel Pruning

    Recently, alpha matting has received a lot of attention because of its usefulness in mobile applications such as selfies. Therefore, there has been a...
    Donggeun Yoon, **sun Park, Donghyeon Cho in Computer Vision – ACCV 2022
    Conference paper 2023
  7. Open-Set Sensor Human Activity Recognition Based on Reciprocal Time Series

    Human activity recognition (HAR) using wearable sensors has witnessed significant advancements in recent years. However, the traditional closed-set...
    Yingjie Chen, Wenxuan Cui, ... Tao Zhu in Intelligent Information Processing XII
    Conference paper 2024
  8. An Effective Channel Selection Solution for Reliable Scheduling in Industrial IoT Networks

    The IEEE 802.15.4 Time Slotted Channel Hop** (TSCH) communication mode is a key standard in the Industrial Internet of Things (IIoT). To schedule...

    Mohamed Mohamadi, Badis Djamaa, ... Riad Laribi in Journal of Network and Systems Management
    Article 19 July 2022
  9. HANCaps: A Two-Channel Deep Learning Framework for Fake News Detection in Thai

    The rapid advancement of internet technology, widespread smartphone usage, and the rise of social media platforms have drastically transformed the...
    Krishanu Maity, Shaubhik Bhattacharya, ... Kitsuchart Pasupa in Neural Information Processing
    Conference paper 2024
  10. Correction to: Machine-Learning-Based Control of Perturbed and Heated Channel Flows

    Chapter “Machine-Learning-Based Control of Perturbed and Heated Channel Flows” was previously published non-open access. It has now been changed to...
    Mario Rüttgers, Moritz Waldmann, ... Andreas Lintermann in High Performance Computing
    Conference paper Open access 2022
  11. Spatio-Channel Attention Blocks for Cross-modal Crowd Counting

    Crowd counting research has made significant advancements in real-world applications, but it remains a formidable challenge in cross-modal settings....
    Youjia Zhang, Soyun Choi, Sungeun Hong in Computer Vision – ACCV 2022
    Conference paper 2023
  12. Dual channel group-aware graph convolutional networks for collaborative filtering

    Among the existing collaborative filtering approaches, graph-based collaborative filtering models that adopt graph convolutional networks for...

    **song Zhao, Kaiwen Huang, ** Li in Applied Intelligence
    Article 09 August 2023
  13. DNN Model Theft Through Trojan Side-Channel on Edge FPGA Accelerator

    In this paper, we present a novel hardware trojan assisted side-channel attack to reverse engineer DNN architectures on edge FPGA accelerators. In...
    Srivatsan Chandrasekar, Siew-Kei Lam, Srikanthan Thambipillai in Applied Reconfigurable Computing. Architectures, Tools, and Applications
    Conference paper 2023
  14. Distributed Multi-agent Negotiation for Wi-Fi Channel Assignment

    Channel allocation in dense, decentralized Wi-Fi networks is a challenging due to the highly nonlinear solution space and the difficulty to estimate...
    Marino Tejedor-Romero, Pradeep K. Murukannaiah, ... Catholijn M. Jonker in Recent Advances in Agent-Based Negotiation: Applications and Competition Challenges
    Conference paper 2023
  15. CPU-Doctor: when a device’s heart-beat can be an acoustic side-channel disassembler

    In recent years, the ever increasing need of computing has lead to design of modern embedded computing devices that are dedicated to provide enhanced...

    Oswa Amro, Vishesh Mishra, ... Urbi Chatterjee in Journal of Cryptographic Engineering
    Article 06 July 2023
  16. A Scalable Solution for the Extended Multi-channel Facility Location Problem

    We study the extended version of the non-uniform, capacitated facility location problem with multiple fulfilment channels between the facilities and...
    Etika Agarwal, Karthik S. Gurumoorthy, ... Shantala Manchenahally in Machine Learning and Knowledge Discovery in Databases: Research Track
    Conference paper 2023
  17. Graph Intelligence Enhanced Bi-Channel Insider Threat Detection

    For an organization, insider intrusion generally poses far more detrimental threats than outsider intrusion. Traditionally, insider threat is...
    Wei Hong, Jiao Yin, ... Ming Liu in Network and System Security
    Conference paper 2022
  18. Marketing in the metaverse era: toward an integrative channel approach

    The development pace of digital socialization has accelerated drastically in the past decade, especially with the COVID-19 pandemic. Through that...

    Zahy Ramadan in Virtual Reality
    Article 17 March 2023
  19. A prospective approach for human-to-human interaction recognition from Wi-Fi channel data using attention bidirectional gated recurrent neural network with GUI application implementation

    Human Activity Recognition (HAR) research has gained significant momentum due to recent technological advancements, artificial intelligence...

    Md Mohi Uddin Khan, Abdullah Bin Shams, Mohsin Sarker Raihan in Multimedia Tools and Applications
    Article 12 January 2024
  20. Building a YouTube Channel for Science Communication

    Sharing results of research projects with the public and transferring solutions into practice is part of research projects. Typical ways are...
    Frank Elberzhager, Patrick Mennig, Phil Stüpfert in Database and Expert Systems Applications - DEXA 2022 Workshops
    Conference paper 2022
Did you find what you were looking for? Share feedback.