News
Abstract: Recent studies have integrated convolutions into transformers to introduce inductive bias and improve generalization performance. However, the static nature of conventional convolution ...
Abstract: Building the next-generation wireless systems that could support services such as the metaverse, digital twins (DTs), and holographic teleportation is challenging to achieve exclusively ...
Abstract: The advent of modern communication systems has led to the widespread application of deep learning-based automatic modulation recognition (DL-AMR) in wireless communications. However, ...
Abstract: To better characterize the differences in category features in Facial Expression Recognition (FER) tasks, and improve inter-class separability and intra-class compactness, we propose a ...
Abstract: Automatic medical image segmentation is a crucial topic in the medical domain and successively a critical counterpart in the computer-aided diagnosis paradigm. U-Net is the most widespread ...
Abstract: Mathematical optimization is now widely regarded as an indispensable modeling and solution tool for the design of wireless communications systems. While optimization has played a significant ...
Abstract: Time series are the primary data type used to record dynamic system measurements and generated in great volume by both physical sensors and online processes (virtual sensors). Time series ...
Abstract: In large smart factories, massive microservices compose complicated modular IT systems, providing various service functions. However, large microservices-based IT systems incur sophisticated ...
Abstract: Convolutional neural networks (CNNs) and Transformers have made impressive progress in the field of remote sensing change detection (CD). However, both architectures have inherent ...
Abstract: The rapid development of autonomous driving technology has driven continuous innovation in perception systems, with 4D millimeter-wave (mmWave) radar being one of the key sensing devices.
Abstract: Nowadays traffic on the Internet has been widely encrypted to protect its confidentiality and privacy. However, traffic encryption is always abused by attackers to conceal their malicious ...
Abstract: The definition of the language syntax and semantics for SystemVerilog, which is a unified hardware design, specification, and verification language, is provided. This standard includes ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results