Wireless power transmission has been widely used to replenish energy for wireless sensor networks, where the energy consumption rate of sensor nodes is usually time varying and indefinite. However, few works have inve...
详细信息
Few-shot text classification involves transferring knowledge from a limited dataset to perform classification tasks in unseen domains. Existing metric-based meta-learning models, such as prototypical networks, have sh...
详细信息
The secured access is studied in this paper for the network of the image remote *** sensor in this network encounters the information security when uploading information of the images wirelessly from the sensor to the...
详细信息
The secured access is studied in this paper for the network of the image remote *** sensor in this network encounters the information security when uploading information of the images wirelessly from the sensor to the central collection *** order to enhance the sensing quality for the remote uploading,the passive reflection surface technique is *** one eavesdropper that exists nearby this sensor is keeping on accessing the same networks,he may receive the same image from this *** goal in this paper is to improve the SNR of legitimate collection unit while cut down the SNR of the eavesdropper as much as possible by adaptively adjust the uploading power from this sensor to enhance the security of the remote sensing *** order to achieve this goal,the secured energy efficiency performance is theoretically analyzed with respect to the number of the passive reflection elements by calculating the instantaneous performance over the channel fading *** on this theoretical result,the secured access is formulated as a mathematical optimization problem by adjusting the sensor uploading power as the unknown variables with the objective of the energy efficiency maximization while satisfying any required maximum data rate of the eavesdropper ***,the analytical expression is theoretically derived for the optimum uploading *** simulations verify the design approach.
The percentage of encrypted network traffic has constantly increased as network security has been continuously improved. Attackers can, however, utilize encrypted DNS over HTTPS (DoH) to conceal their malicious traffi...
详细信息
Frequent road incidents cause significant physical harm and economic losses globally. The key to ensuring road safety lies in accurately perceiving surrounding road incidents. However, the highly dynamic nature o...
详细信息
As the applications and services within vehicular networking systems become increasingly diverse, vehicles with limited computing resources face challenges in handling these computationally intensive and latency-sensi...
详细信息
The deployment of Unmanned Aerial Vehicle (UAV) cluster is an available solution for object detection missions. In the harsh environment, UAV cluster could suffer from some significant threats (e.g., forest fire hazar...
详细信息
Recently, self-supervised learning has garnered significant attention for its ability to extract high-quality features from unlabeled data. However, existing research indicates that backdoor attacks can pose significa...
详细信息
Generative models have attracted considerable attention for speech separation tasks, and among these, diffusion-based methods are being explored. Despite the notable success of diffusion techniques in generation tasks...
详细信息
Graph machine learning (GML) has made great progress in node classification, link prediction, graph classification, and so on. However, graphs in reality are often structurally imbalanced, that is, only a few hub node...
详细信息
暂无评论