Filter bank multicarrier with offset quadrature amplitude modulation
(FB...
Quantifying the performance bound of an integrated localization and
comm...
In this paper, we study the spatial bandwidth for line-of-sight (LOS)
ch...
This paper proposes an interpretable user-behavior-based (UBB) network
t...
In this paper, a multipath component aggregation (MCA) mechanism is
intr...
We present a path loss model that accurately predicts the path loss with...
The backdoor attack poses a new security threat to deep neural networks....
Evaluating a building's wireless performance during the building design
...
Multi-process concurrency is effective in improving program efficiency a...
The fog-radio-access-network (F-RAN) has been proposed to address the st...
This paper proposes a time-efficient mechanism to decrease the on-line
c...
For wireless communications using linear large-scale antenna arrays, we
...
Rowhammer has drawn much attention from both academia and industry in th...
Over 80
gas, and electricity, wireless communication is becoming one of ...
This work provides the community with a timely comprehensive review of
b...
This paper presents a part of our ground-breaking work on evaluation of
...
In this paper, we present the design and implementation of a Systematic
...
Code reuse attack (CRA) is a powerful attack that reuses existing codes ...
Audio is an important medium in people's daily life, hidden information ...
With the advent of the era of artificial intelligence(AI), deep neural
n...
As the threat of malicious software (malware) becomes urgently serious,
...
In many Internet of Things (IoT) applications, resources like CPU, memor...
It is a challenging task to deploy lightweight security protocols in
res...
Strong physical unclonable function (PUF) is a promising solution for de...
Strong physical unclonable function (PUF) is a promising solution for de...
Recently, code reuse attacks (CRAs), such as return-oriented programming...