Speaker identification is used for identifying an individual based on their voice. Signal processing and deep neural networks are used for feature extraction. This paper presents a method that combines CNN and LSTM fo...
详细信息
A design method of generating multiple transmission zeros (TZs) is proposed by introducing feeding-forward transconductance amplifiers for the cascaded Q-enhanced reconfigurable bandpass filters (BPFs) in this article...
详细信息
Dynamic light fields provide a richer, more realistic 3D representation of a moving scene. However, this leads to higher data rates since excess storage and transmission requirements are needed. We propose a novel app...
详细信息
In the 6G era,Space-Air-Ground Integrated Network(SAGIN)are anticipated to deliver global coverage,necessitating support for a diverse array of emerging applications in high-mobility,hostile *** such conditions,conven...
详细信息
In the 6G era,Space-Air-Ground Integrated Network(SAGIN)are anticipated to deliver global coverage,necessitating support for a diverse array of emerging applications in high-mobility,hostile *** such conditions,conventional orthogonal frequency division multiplexing(OFDM)modulation,widely employed in cellular and Wi-Fi communication systems,experiences performance degradation due to significant Doppler *** overcome this obstacle,a novel twodimensional(2D)modulation approach,namely orthogonal time frequency space(OTFS),has emerged as a key enabler for future high-mobility use ***,OTFS modulates information within the delay-Doppler(DD)domain,as opposed to the timefrequency(TF)domain utilized by *** offers advantages such as Doppler and delay resilience,reduced signaling latency,a lower peak-to-average ratio(PAPR),and a reduced-complexity *** studies further indicate that the direct interplay between information and the physical world in the DD domain positions OTFS as a promising waveform for achieving integrated sensing and communications(ISAC).In this article,we present an in-depth review of OTFS technology in the context of the 6G era,encompassing fundamentals,recent advancements,and future *** objective is to provide a helpful resource for researchers engaged in the field of OTFS.
The Global Navigation Satellite System (GNSS) plays a crucial role in critical infrastructure by delivering precise timing and positional data. Nonetheless, the civilian segment of the GNSS remains susceptible to vari...
详细信息
With the rapid growth of wireless medical sensor networks (WMSNs) based healthcare applications, protecting both the privacy and security from illegitimate users, are major concern issues since patient’s precise info...
详细信息
In this age, we introduce an application that aims to revolutionize the management of government buildings. With a commitment, to supporting Digital India initiative, proposed project addresses the changing needs of g...
详细信息
The proliferation of Internet of Things(IoT)rapidly increases the possiblities of Simple Service Discovery Protocol(SSDP)reflection *** DDoS attack defence strategies deploy only to a certain type of devices in the at...
详细信息
The proliferation of Internet of Things(IoT)rapidly increases the possiblities of Simple Service Discovery Protocol(SSDP)reflection *** DDoS attack defence strategies deploy only to a certain type of devices in the attack chain,and need to detect attacks in advance,and the detection of DDoS attacks often uses heavy algorithms consuming lots of computing *** paper proposes a comprehensive DDoS attack defence approach which combines broad learning and a set of defence strategies against SSDP attacks,called Broad Learning based Comprehensive Defence(BLCD).The defence strategies work along the attack chain,starting from attack sources to *** defends against attacks without detecting attacks or identifying the roles of IoT devices in SSDP reflection *** also detects suspicious traffic at bots,service providers and victims by using broad learning,and the detection results are used as the basis for automatically deploying defence strategies which can significantly reduce DDoS *** evaluations,we thoroughly analyze attack traffic when deploying BLCD to different defence *** show that BLCD can reduce the number of packets received at the victim to 39 without affecting the standard SSDP service,and detect malicious packets with an accuracy of 99.99%.
Human intelligence tasks(HITs),such as labeling images for machine learning,are widely utilized for crowdsourcing human *** crowdsourcing platforms face challenges of a single point of failure and a lack of service **...
详细信息
Human intelligence tasks(HITs),such as labeling images for machine learning,are widely utilized for crowdsourcing human *** crowdsourcing platforms face challenges of a single point of failure and a lack of service *** blockchain-based crowdsourcing approaches overlook the low scalability problem of permissionless blockchains or inconveniently rely on existing ground-truth data as the root of trust in evaluating the quality of workers’*** propose a blockchain-based crowdsourcing scheme for ensuring dual fairness(i.e.,preventing false reporting and free riding)and improving on-chain efficiency concerning on-chain storage and smart contract *** proposed scheme does not rely on trusted authorities but rather depends on a public blockchain to guarantee dual *** efficient and publicly verifiable truth discovery scheme is designed based on majority voting and cryptographic *** truth discovery scheme aims at inferring ground truth from workers’*** ground truth is further utilized to estimate the quality of workers’***,a novel blockchain-based protocol is designed to further reduce on-chain costs while ensuring *** scheme has O(n)complexity for both on-chain storage and smart contract computation,regardless of the number of questions,where𝑛denotes the number of *** security analysis is provided,and extensive experiments are conducted to evaluate its effectiveness and performance.
Object detection models have been widely deployed in physical world applications, and they are vulnerable to adversarial attacks. However, most adversarial attacks are implemented in a glass box setting, and under ide...
详细信息
暂无评论