From AI-assisted art creation to large language model (LLM)-powered ChatGPT, AI-generated contents and services are becoming a transforming force. It calls for the telecom industry to embrace the prospects of AIGC ser...
详细信息
The need for aerial platforms capable of sustained operation is critical in fields such as surveillance, agricultural monitoring, disaster response, and temporary telecommunication systems. Traditional unmanned aerial...
详细信息
Recurrent Neural Networks (RNNs) are commonly used in data-driven approaches to estimate the Remaining Useful Lifetime (RUL) of power electronic devices. RNNs are preferred because their intrinsic feedback mechanisms ...
详细信息
This paper proposes a novel learning-based framework for autonomous driving based on the concept of maximal safety probability. Efficient learning requires rewards that are informative of desirable/undesirable states,...
详细信息
The integration of machine learning (ML) into mobile applications presents unique challenges, particularly in resource-constrained environments such as iOS devices. Skin lesion classification is a critical task in der...
详细信息
While fairness-aware machine learning algorithms have been receiving increasing attention, the focus has been on centralized machine learning, leaving decentralized methods underexplored. Federated Learning is a decen...
详细信息
Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)***,several security vulnerabilities and att...
详细信息
Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)***,several security vulnerabilities and attacks have plagued previous generations of communication systems;thus,physical layer security,especially against eavesdroppers,is vital,especially for upcoming 6G *** this regard,UAVs have appeared as a winning candidate to mitigate security *** this paper,we leverage UAVs to propose two *** first method utilizes a UAV as Decode-and-Forward(DF)relay,whereas the second method utilizes a UAV as a jammer to mitigate eavesdropping attacks for URLLC between transmitter and receiver ***,we present a low-complexity algorithm that outlines the two aforementioned methods of mitigating interception,*** secrecy rate,and we compare them with the benchmark null method in which there is a direct communication link between transmitter and receiver without the UAV DF ***,simulation results show the effectiveness of such methods by improving the secrecy rate and its dependency on UAV height,blocklength,decoding error probability and transmitter-receiver separation ***,we recommend the best method to enhance the secrecy rate in the presence of an eavesdropper based on our simulations.
This work investigates cyber attacks targeting cyber-physical systems in the framework of discrete event systems. From intruders’ perspective, we propose a concept called k-step attackability to explore attack scenar...
详细信息
We derive and validate a generalization of the two-point visual control model, an accepted cognitive science model for human steering behavior. The generalized model is needed as current steering models are either ins...
详细信息
In the era of big data, traditional data trading methods designed for one-time queries on static databases fail to meet the demands of continuous query-based trading on streaming data, often resulting in repeated and ...
详细信息
暂无评论