Results 31 to 40 of about 2,457,982 (249)
An EKF based overlapping coalition formation game for cooperative wireless network navigation
The problem of efficient link selections for cooperative navigation is investigated in dynamic wireless networks, using an extended Kalman filter based overlapping coalition formation (OCF) game approach.
Mingxing Ke +3 more
doaj +1 more source
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning [PDF]
Learning-based pattern classifiers, including deep networks, have shown impressive performance in several application domains, ranging from computer vision to cybersecurity.
Biggio, Battista, Roli, Fabio
core +2 more sources
2-D DOA Estimation of Wide-band Linear Frequency Modulation Signals with Spatial Under-sampling [PDF]
The wide bandwidth of wide-band Linear Frequency Modulation (LFM) signals will cause pressure on traditional data processing.To slove this problem,a method of 2-D DOA estimation for wide-band LFM signals with spatial under-sampling is proposed.Based on ...
FENG Haoran,RUAN Huailin
doaj +1 more source
Research on the NOX concentration inversion based on the W-V-A wavelength selection method
In view of the shortcomings of traditional wavelength selection algorithm in the processing of mixed NOX spectral data, combined with the absorption characteristics of engine exhaust component NO&NO2, the W-V-A (WPLS-VIP-ACO) spectral wavelength ...
Kai Zhang +4 more
doaj +1 more source
Due to the special hydrogeological features of the sea islands, the distribution of groundwater is difficult to assess. In order to improve the accuracy of the predicting groundwater potential assessment(GPA) in islands region.
Haoli Xu +10 more
doaj +1 more source
A Simhash-Based Integrative Features Extraction Algorithm for Malware Detection
In the malware detection process, obfuscated malicious codes cannot be efficiently and accurately detected solely in the dynamic or static feature space.
Yihong Li +3 more
doaj +1 more source
The present work introduced an adaptive beamformer based on a Fibonacci branch search (FBS) based heuristic algorithm is proposed for uniform linear arrays.
Haichuan Zhang, Fangling Zeng
doaj +1 more source
Effect of Cross-eye Jamming on the Active-passive Composite Monopulse Radar
Cross-eye jamming is an electronic countermeasure technology used to cause angular deviation of monopulse radar via multiple coherent sources. Despite a complex electromagnetic environment, using active-passive composite monopulse radar is a development ...
Dong LI +4 more
doaj +1 more source
Sequential Circuit Design for Embedded Cryptographic Applications Resilient to Adversarial Faults [PDF]
In the relatively young field of fault-tolerant cryptography, the main research effort has focused exclusively on the protection of the data path of cryptographic circuits.
Gaubatz, Gunnar +3 more
core +4 more sources
An Overview of Hardware Security and Trust: Threats, Countermeasures, and Design Tools
Hardware security and trust have become a pressing issue during the last two decades due to the globalization of the semiconductor supply chain and ubiquitous network connection of computing devices. Computing hardware is now an attractive attack surface
Wei Hu +5 more
semanticscholar +1 more source

