News
Facial micro-expressions indicate brief and subtle facial movements that appear during emotional communication. In comparison to macro-expressions, micro-expressions are more challenging to be ...
Time-series anomaly detection has gained considerable prominence in numerous practical applications across various domains. Nonetheless, the scarcity of labels leads to the neglect of anomalous ...
This study presents a comprehensive survey on Quantum Machine Learning (QML) along with its current status, challenges, and perspectives. QML combines quantum computing and machine learning to solve ...
Fifth generation (5G) mobile communication systems have entered the stage of commercial deployment, providing users with new services, improved user experiences as well as a host of novel ...
Device-to-device (D2D) communication is one of the most promising technologies in wireless cellular networks that can be employed to improve spectral and energy efficiency, increase data rates, and ...
Hyperspectral images (HSIs) with high spatial resolution are challenging to obtain directly due to sensor limitations. Deep learning is able to provide an end-to-end reconstruction solution from low ...
With the development of e-commerce, the types of logistics services have become diverse. In response to the logistics requirements in urban environments, this paper introduces a logistics system that ...
Attacks on speech recognition systems often use adversarial or inaudible commands. However, a challenge is that adversarial perturbations typically fall within the audible frequency range, making it ...
This paper introduces a novel optimized hybrid model combining Long Short-Term Memory (LSTM) and Transformer deep learning architectures designed for power load forecasting. It leverages the strengths ...
Multisource remote sensing images (RSIs) can capture the complementary information of ground objects for use in semantic segmentation. However, there can be inconsistency and interference noise among ...
Cryptographic techniques are reviewed in this literature review, with particular attention paid to their applicability, importance, contributions, and field strengths. These algorithms include DES, ...
Abstract: Notwithstanding the tremendous success of deep neural networks in a range of realms, previous studies have shown that these learning models are exposed to an inherent hazard called ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results