Practical object detection application can lose its effectiveness on ima...
A novel learning solution to image steganalysis based on the green learn...
It is widely reported that deep generative models can classify
out-of-di...
We propose a new security framework for physical layer security (PLS) in...
Recent studies have shown that higher accuracy on ImageNet usually leads...
In a transfer-based attack against Automatic Speech Recognition (ASR)
sy...
With the development of deep learning technology, the facial manipulatio...
How to provide information security while fulfilling ultra reliability a...
The extreme requirements for high reliability and low latency in
Beyond-...
Out-Of-Distribution (OOD) detection has received broad attention over th...
Enabling ultra-reliable and low-latency communication services while
pro...
Out-of-distribution (OOD) detection is a critical task for ensuring the
...
To support ultra-reliable and low-latency services for mission-critical
...
Adversarial Training (AT), which is commonly accepted as one of the most...
The deployment of multi-access edge computing (MEC) is paving the way to...
A novel method for detecting CNN-generated images, called Attentive Pixe...
Recently, some works found an interesting phenomenon that adversarially
...
Emerging wireless control applications demand for extremely high closed-...
Entity alignment which aims at linking entities with the same meaning fr...
It is becoming increasingly clear that an important task for wireless
ne...
As an emerging metric of communication systems, Age of Information (AoI)...
As an emerging metric for the timeliness of information delivery,
Age-of...
Incompleteness is a common problem for existing knowledge graphs (KGs), ...
The freshness or timeliness of data at server is a significant key
perfo...
An interpretable generative model for handwritten digits synthesis is
pr...
Gaussian processes (GPs) provide a nonparametric representation of funct...