Neural Computing for Advanced Applications
Third International Conference, NCAA 2022, **an, China, July 8–10, 2022, Proceedings, Part I
Article
The future communication network will be composed of ground-based, sea based, air-based and space-based networks to build a distributed air, space and sea integrated global intelligent network across regions, ...
Article
Internet of things technology can not only improve people’s lives, but also bring great changes and innovations to the industry and promote the rapid development of economy. The future communication system wil...
Article
Copy-move forgery is a common audio tampering technique in which users copy the contents of one speech and paste them into another region of the same speech signal, thus achieving the effect of tampering with ...
Chapter and Conference Paper
With the development of deep learning, DNN models have become more complex. Large-scale model parameters enhance the level of AI by improving the accuracy of DNN models. However, they also present more severe ...
Chapter and Conference Paper
Federated learning (FL) enables multiple client medical institutes collaboratively train a deep learning (DL) model with privacy protection. However, the performance of FL can be constrained by the limited ava...
Chapter and Conference Paper
Intellectual property protection of deep neural networks is receiving attention from more and more researchers, and the latest research applies model watermarking to generative models for image processing. How...
Article
Motivated by improvement of convergence rate and throughput performance, this work develops a systematic high-speed VLSI implementation of the adaptive filter based on the improved 2-parallel delayed LMS (PDLM...
Article
Massive MIMO(Multiple-Input Multiple-Output) technology is one of the most important physical layer technologies in 5 g and even 6G. In the process of wireless transmission, due to the complexity of the propag...
Article
Anomaly detection of surveillance video has become a critical concern in computer vision. It can be used for real-time monitoring and the timely generation of alarms and is widely applied in transportation sys...
Chapter and Conference Paper
Blockchain has the characteristics of smart contract, distributed decision-making, collaborative autonomy, tamper proof high security, openness and transparence. It is suitable for the power spot trading marke...
Book and Conference Proceedings
Third International Conference, NCAA 2022, **an, China, July 8–10, 2022, Proceedings, Part I
Article
A well-known Itô formula for finite-dimensional processes, given in terms of stochastic integrals with respect to Wiener processes and Poisson random measures, is revisited and is revised. The revised formula,...
Chapter and Conference Paper
As wireless network has developed rapidly in recent years, especially with the maturity and wide application of 5G wireless system, millions of mobile users have been able to quickly exchange large amounts of ...
Chapter and Conference Paper
In the multi-user scenario of 5G intelligent wireless system, the users can’t get the fair transmission opportunity because of the different service packet length, transmission delay and channel environment of...
Chapter and Conference Paper
A decentralized smart beamformer based on artificial intelligence is proposed. Transmission weights adjustment of different users are described as a multi-users game. The existence and uniqueness of the Nash e...
Chapter and Conference Paper
In order to solve the system interference problem caused by beamforming technology of multi-antenna system, an anti-jamming solution based on artificial intelligence technology is proposed, and a multi antenna...
Chapter and Conference Paper
With the continuous development of intelligent power grid, how to boost the prediction ability of the future operating mode of information equipment and set the dynamic provision for prediction intervals to ad...
Article
Vehicular fog computing (VFC) has been envisioned as a promising paradigm for enabling a variety of emerging intelligent transportation systems (ITS). However, due to inevitable as well as non-negligible issue...
Article
Data hiding aims to embed a secret payload into a cover object without introducing significant degradation of the cover. The resulting object containing hidden information, typically also called stego, will no...
Chapter and Conference Paper
Embedding data into texture or high-frequency region will not arouse noticeable artifacts, meaning that, a low distortion can be achieved when suited region for data embedding is selected. It motivates us to e...