We propose a new scheduling policy for performance asymmetric multiprocessors that have identical instruction sets but different processing speeds. The difference between it and the original Pfair scheduling is that w...
详细信息
In the era of artificial intelligence generated content (AIGC), conditional multimodal synthesis technologies (e.g., text-to-image) are dynamically reshaping the natural content. Brain signals, serving as potential re...
详细信息
This paper proposes an anomaly detection algorithm based on Generative Adversarial Networks (GANs) for intrusion detection in Intelligent Connected Vehicles (ICVs). To address the imbalance between normal network traf...
详细信息
With the rapid development of modern high-speed circuit technology, electronic devices have the properties of high data transmission rates, steeper edge changing rates, and large-scale integration which can lead to in...
详细信息
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wirel...
详细信息
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wireless propagation environment and the broad coverage pose severe threats to the protection of private data. Emerging covert communications provides a promising solution to achieve robust communication security. Aiming at facilitating the practical implementation of covert communications in space/air networks, we present a tutorial overview of its potentials, scenarios, and key technologies. Specifically, first, the commonly used covertness constraint model, covert performance metrics, and potential application scenarios are briefly introduced. Then, several efficient methods that introduce uncertainty into the covert system are thoroughly summarized, followed by several critical enabling technologies, including joint resource allocation and deployment/trajectory design, multi-antenna and beamforming techniques, reconfigurable intelligent surface(RIS), and artificial intelligence algorithms. Finally, we highlight some open issues for future investigation.
Security of applications and data in a cloud setting has become a first-class design criterion. Hardware vendors have proposed trusted execution environments or TEEs where the hardware guarantees an application's ...
详细信息
Heart Disease is still an epidemic global health concern, so trustworthy prediction models are vital for risk assessment and early detection. In this research, we propose a comprehensive predictive framework leveragin...
详细信息
Voiceprint authentication is a growing field of biometric authentication. However, voiceprint authentication is vulnerable to spoofing attacks and suffers significant degradation in noisy environments. Employing lip m...
详细信息
This research introduces a new approach to radon detection in homes utilizing Decision Trees (DTs) enabled by the cloud in real-time. High radon levels, a natural radioactive gas, are dangerous to human health. Quick ...
详细信息
Spiking neural networks (SNNs) are deeply inspired by biological neural information systems. Compared to convolutional neural networks (CNNs), SNNs are low power consumption because of their spike based information pr...
详细信息
暂无评论