The research Unmanned Aerial Vehicles (UAV) has been considerably advanced. This work is interested principally in dynamic modeling of the four rotor mini aircraft named as a quadrotor. The dynamical model is obtained...
详细信息
Though deep learning methods have achieved the state-of-the-art performance for hyperspectral image (HSI) classification, they often highly rely on large amount of samples for training, and introduce few-shot challeng...
Though deep learning methods have achieved the state-of-the-art performance for hyperspectral image (HSI) classification, they often highly rely on large amount of samples for training, and introduce few-shot challenge due to the lack of labeled samples. In this paper, a self-supervised method is presented for HSI classification in the few-shot scenario, where masked autoencoder is employed to reconstruct the masked bands in spectral domain for model pretraining with limited labeled sample, namely Spectral-MAE. The proposed method not only avoids the overfitting via the pretraining, but also provides the model’s ability for effective feature extraction while avoiding the high spatial redundancy. Experiments conducted verify the effectiveness of the proposed method for HSI classification in few-shot situation as compared with other methods.
Multiple-Input Multiple-Output Radar with Element-Pulse Coding (EPC) is a novel way to address the performance degradation caused by range ambiguity in space-time adaptive processing. In this paper, we use the sparse ...
详细信息
Multiple-Input Multiple-Output Radar with Element-Pulse Coding (EPC) is a novel way to address the performance degradation caused by range ambiguity in space-time adaptive processing. In this paper, we use the sparse recovery method to solve the problem that EPC-MIMO has a large demand for independent and identically distributed (IID) samples. On the one hand, we use the Sparse Bayesian Learning (SBL) to achieve space-time spectral estimation under the small sample condition, and on the other hand, the use of prior knowledge, reduce the redundancy of the sparse recovery dictionary and improve the computational efficiency of the algorithm. The simulation results demonstrate the effectiveness of the proposed method.
Convolutional neural networks (CNN) have shown excellent capability in synthetic aperture radar (SAR) target recognition. However, obtaining sufficient training samples for improving network recognition is difficult d...
详细信息
A time-frequency diagram is a commonly used visualization for observing the time-frequency distribution of radio signals and analyzing their time-varying patterns of communication states in radio monitoring and manage...
详细信息
In this paper, artificial neural network-based adaptive optimal threshold estimation for a two-dimensional optical code division multiple access conventional correlation receiver is proposed. A multilayer perceptron n...
详细信息
This study addresses the consensus problem for nonlinear multi-agent systems (MASs) under the exogenous disturbances over cooperation-competition networks. Firstly, for judging the disturbances produced by the exogeno...
详细信息
Target detection and recognition of bistatic SAR image has been widely studied in recently. However, how to accurately detect and recognize targets with low-resolution and small size in the image is still a problem. I...
详细信息
Specific emitter identification (SEI) is an identification technique that identify the transmitting device with the hardware imperfection. However, the identification features are influenced by the receiver distortion...
详细信息
Private Tor network is essential for analyzing security issues both for Tor project as well as for numerous researchers. However, current research work mainly focus on improving scalability and efficiency by simulatin...
详细信息
ISBN:
(数字)9781728151816
ISBN:
(纸本)9781728151823
Private Tor network is essential for analyzing security issues both for Tor project as well as for numerous researchers. However, current research work mainly focus on improving scalability and efficiency by simulating traffic discretely with single node and restoration level by deploying a complete private network with high cost. In this paper, we propose a novel methodology constructing real private tor network by editing and controlling Raspberry Pis, called Tor anonymity attack experiment platform. Compared with other platforms of the same type, the platform has the advantages of low cost, easy to scale, high quality of real-time data transmission, high degree of network protocol restoration as well as convenient configuration. In order to demonstrate the platform can be used as a private and complete Tor anonymous network experiment environment, we conduct a source tracing attack as a study case. Experimental results and theoretical analysis both show that the platform can support researchers to carry out numerous Tor network security research with high degree of restoration efficiently and cheaply.
暂无评论