Fifth-generation (5G) networks are prone to jamming attacks, which are particularly dangerous in mission-critical applications such as factory automation. In this paper, we present a simple method to detect jamming at...
详细信息
Human Activity Recognition (HAR) is a research area that involves wearable devices integrating inertial and/or physiological sensors to classify human actions and status across various application domains, such as hea...
详细信息
Grid-connected inverters play a pivotal role in integrating renewable energy sources into modern power systems. However, the presence of unbalanced grid conditions poses significant challenges to the stable operation ...
详细信息
Traffic sign detection and recognition (TSDR) is a pivotal component of contemporary transportation systems, designed to enhance road safety and operational efficiency. In an era where automation is indispensable, TSD...
详细信息
Deep neural operators have seen much attention in the scientific machine learning community over the last couple of years due to their capability of efficiently learning the nonlinear operators mapping from input func...
详细信息
Industry 4.0's emergence necessitates reliable communication systems. Millimeter-wave (mmWave) communication is a promising solution, but challenges like limited coverage and atmospheric absorption persist. The In...
详细信息
Nowadays, the Internet of Things (IoT) system is vulnerable to spoofing attacks that can easily where attackers can easily pose as a legal entity of the network. A 'spoofing attack' refers to a type of cyber-a...
详细信息
The kidneys have the important function of filtering waste products and toxins from the blood in the human body. Any problems affecting the kidneys can potentially impact their efficiency and overall function. Kidney ...
详细信息
The rapid rise of commercially available drones, driven by miniaturization and affordability, has introduced potential security risks alongside numerous societal benefits. While drones serve various industries, their ...
详细信息
Cellular networks are potential targets of jamming attacks to disrupt wireless communications. Since the fifth generation (5G) of cellular networks enables mission-critical applications, such as autonomous driving or ...
详细信息
暂无评论