Fifth-generation (5G) networks are expected to revolutionize wireless communication by enabling faster and more reliable data transfer rates. However, the use of millimeter-wave frequencies in 5G networks introduces u...
详细信息
Field programmable gate arrays (FPGAs) serve as a convenient tool for prototyping and debugging developed digital circuits. Their circuitry is optimized for synchronous unit implementation. computer-aided design syste...
详细信息
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control *** state estimation(RSE)...
详细信息
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control *** state estimation(RSE)is an indispensable functional module of ***,it has been demonstrated that malicious agents can manipulate data packets transmitted through unreliable channels of RSE,leading to severe estimation performance *** paper aims to present an overview of recent advances in cyber-attacks and defensive countermeasures,with a specific focus on integrity attacks against ***,two representative frameworks for the synthesis of optimal deception attacks with various performance metrics and stealthiness constraints are discussed,which provide a deeper insight into the vulnerabilities of ***,a detailed review of typical attack detection and resilient estimation algorithms is included,illustrating the latest defensive measures safeguarding RSE from ***,some prevalent attacks impairing the confidentiality and data availability of RSE are examined from both attackers'and defenders'***,several challenges and open problems are presented to inspire further exploration and future research in this field.
The widespread dissemination of misinformation and propaganda has become a crucial issue in societal conversations. This study presents an innovative framework to counter propaganda within information warfare using a ...
详细信息
The paper considers the construction of asymptotic expansions in a singularly perturbed weakly nonlinear control problem to design an approximate controller. The asymptotic expansions are used to construct interpolati...
详细信息
Data is an important aspect of modern deep learning research, particularly in Place Recognition, which plays a pivotal role in various applications such as robotics, augmented reality, and autonomous navigation. In th...
详细信息
Path planning is crucial for various robots, including manipulators, that autonomously perform non-repetitive tasks in obstacle-rich environments. In this paper we focus on path planning for an n-DoF (degrees of ...
详细信息
Traditional Reinforcement Learning (RL) methods often require careful algorithm design, hyper-parameter tuning, and experimentation to perform optimally across multiple tasks. Multi-task models, however, offer increas...
详细信息
This paper covers the research of self-assembly phenomenon implementation problems within the recurrent-dynamic approach to the construction of computing architectures. The self-assembly phenomenon that occurs during ...
详细信息
In the rapidly evolving realm of cyber-security, the detection of network anomalies serves as a pivotal line of defense against a myriad of malicious activities and cyberthreats. This research undertakes the task of e...
详细信息
暂无评论