Abstract: Internet of Things (IoT) devices are large in number, widely distributed, weak in protection ability, and vulnerable to various malicious attacks. Intrusion detection technology can provide ...
Abstract: Due to the high cost of sea trials and the variability of sea states, the duration of experiments is usually too short to fully verify underwater acoustic communication (UAC) performance in ...
Our method MI-GAN can produce plausible results both on complex scene images as well as on face images. The bubble chart on the right shows the advantage of our network over state-of-the-art ...
If any part of our paper and code is helpful to your work, please generously cite and star us 😘 😘 😘 ! @inproceedings{yan2021agg, author = {Zeng, Yanhong and Fu, Jianlong and Chao, Hongyang and Guo, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results