An EAP-Based Mutual Authentication Protocol for WLAN-Connected IoT Devices
Several symmetric and asymmetric encryption based authentication protocols have been developed for the wireless local area networks (WLANs). However, recent findings reveal […]
AI-based Autonomic & Scalable Security Management Architecture for Secure Network Slicing in B5G
The vital importance of securing 5G and beyond networks while meeting their stringent performance requirements has promoted the recent shift towards fully […]
Non-Contact Atrial Fibrillation Detection From Face Videos by Learning Systolic Peaks
Objective: We propose a non-contact approach for atrial fibrillation (AF) detection from face videos. nn Methods: Our proposed method can accurately extract […]
Analysis and Design of Capacitive Voltage Distribution Stacked MOS Millimeter-Wave Power Amplifiers
Stacked MOS power amplifiers (PA) are commonly used in SOI nodes but also have the potential to be realized in bulk CMOS […]
Time-Triggered Federated Learning Over Wireless Networks
The newly emerging federated learning (FL) framework offers a new way to train machine learning models in a privacy-preserving manner. However traditional […]
Statistical Digital Predistortion of 5G Millimeter-Wave RF Beamforming Transmitter Under Random Amplitude Variations
The nonlinearity of the fifth-generation (5G) millimeter-wave (mmWave) phased array transmitter (TX) depends on the variations in the beamforming coefficients e.g. due […]
Multi-class random access wireless network
This paper presents new analytical results for evaluating the ALOHA-like multi-class random access wireless network’s performance. The proposed model is motivated by […]
Hyperspectral Estimation of Soil Copper Concentration Based on Improved TabNet Model in the Eastern Junggar Coalfield
China is the largest coal consumer in the world. The massive exploitation and utilization of coal resources have resulted in serious problems […]
Contrastive Context-Aware Learning for 3D High-Fidelity Mask Face Presentation Attack Detection
Face presentation attack detection (PAD) is essential to secure face recognition systems primarily from high-fidelity mask attacks. Most existing 3D mask PAD […]
Learning How to Configure LoRa Networks With No Regret
Long range (LoRa) is one of the most popular technologies for low-power wide area networks. It offers long-range communication with a low […]