Posts
Source-Based Jamming for Physical-Layer Security on Unt...
Source-Based Jamming for Physical-Layer Security on Untrusted Full-Duplex Relay
Unified Confidence Estimation Networks for Robust Stere...
Unified Confidence Estimation Networks for Robust Stereo Matching
3G versus Wi-Fi technologies Easy Seminar Topic for CSE...
3G versus Wi-Fi technologies Easy Seminar Topic for CSE Students
Few-Shot Deep Adversarial Learning for Video-Based Pers...
Few-Shot Deep Adversarial Learning for Video-Based Person Re-Identification
Satisfied-User-Ratio Modeling for Compressed Video
Satisfied-User-Ratio Modeling for Compressed Video
A Novel Intelligent Fault Diagnosis Method Based on Var...
A Novel Intelligent Fault Diagnosis Method Based on Variational Mode Decompositi...
BBC Net Bounding Box Critic Network for Occlusion-Robus...
BBC Net Bounding Box Critic Network for Occlusion-Robust Object Detection
Denoising Autoencoder-Based Missing Value Imputation fo...
Denoising Autoencoder-Based Missing Value Imputation for Smart Meters
Hierarchical Symbol-Based Health-Status Analysis Using ...
Hierarchical Symbol-Based Health-Status Analysis Using Time-Series Data in a Cor...
Meet the Sherlock Holmes of Side Channel Leakage A Surv...
Meet the Sherlock Holmes of Side Channel Leakage A Survey of Cache SCA Detection...
R2BN An Adaptive Model for Keystroke-Dynamics-Based Edu...
R2BN An Adaptive Model for Keystroke-Dynamics-Based Educational Level Classifica...
Transfer Learning as a Tool for Reducing Simulation Bia...
Transfer Learning as a Tool for Reducing Simulation Bias Application to Inertial...
An Information Theoretic Approach to Power-Substation L...
An Information Theoretic Approach to Power-Substation Level Dynamic State Estima...
Instantaneous Flux and Current Control for a Three-Phas...
Instantaneous Flux and Current Control for a Three-Phase Dual-Active Bridge DC–D...