Abstract: Preserving the privacy of transactions and ensuring the regulatory compliance of transactions are two important requirements for blockchain-based financial applications. However, these two ...
Abstract: Problems involving the classical linear partial differential equations of mathematical physics can be reduced to algebraic ones of a very much simpler structure by replacing the ...
Abstract: Measurements of the equivalent parallel conductance of metal-insulator-semiconductor (MIS) capacitors are shown to give more detailed and accurate information about interface states than ...
Abstract: Motion planning is critical to realize the autonomous operation of mobile robots. As the complexity and randomness of robot application scenarios increase, the planning capability of the ...
Abstract: Federated learning (FL) has emerged as a popular distributed machine-learning paradigm. It involves many rounds of iterative communication between nodes to exchange model parameters. With ...
Abstract: As 5G networks proliferate globally, the need for accurate, reliable, and scalable positioning solutions has become increasingly critical across industries, such as Internet of Things (IoT), ...
Abstract: Wireless sensor networks (WSNs) represent a critical research domain within the Internet of Things (IoT) technology. The distributed Kalman filter (DKF) has garnered significant attention as ...
Abstract: In this paper, we investigate a novel integrated sensing and communication (ISAC) system aided by movable antennas (MAs). A bistatic radar system, in which the base station (BS) is ...
Abstract: Vision systems that see and reason about the compositional nature of visual scenes are fundamental to understanding our world. The complex relations between objects and their locations, ...
Abstract: Extreme events can interrupt both electricity and gas supply in an integrated electric-gas distribution system (IEGDS). This work proposes a two-stage resilient preparation and restoration ...
Abstract: Generating mobile traffic in urban environments is important for network planning and optimization. However, existing models show weakness in capturing spatial-temporal dynamics between ...
Abstract: CRYSTALS-Kyber has been standardized as the only key-encapsulation mechanism (KEM) scheme by NIST to withstand attacks by large-scale quantum computers. However, the side-channel attacks ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results