supported by National Key Research and Development Project(Grant Nos.2022YFB3305800-5,2023YFB3307300);National Natural Science Foundation of China(Grant Nos.62125301,62373014,92267107);Beijing Youth Scholar(Grant No.037)。
Feature selection is a crucial step in data preprocessing because feature selection reduces the dimensionality of data by eliminating irrelevant and redundant features.Since manual labeling is expensive,unsupervised f...
supported by National Natural Science Foundation of China (Grant Nos. 61662009, 61772008);Science and Technology Major Support Program of Guizhou Province (Grant No. 20183001);Key Program of National Natural Science Union Foundation of China (Grant No. U1836205);Science and Technology Program of Guizhou Province (Grant No. [2019]1098);Project of High-level Innovative Talents of Guizhou Province (Grant No. [2020]6008);Science and Technology Program of Guiyang (Grant No. [2021]1-5)
Dear editor,Key security is of great practical significance and demand to guarantee the security of digital assets in the blockchain system.At present,users prefer to escrow their assets on centralized institutions,bu...
supported in part by National Natural Science Foundation of China (Grant Nos. 62176139, 61872225, 61876098);Major Basic Research Project of Natural Science Foundation of Shandong Province (Grant No. ZR2021ZD15)。
Bridging neural network learning and symbolic reasoning is crucial for strong AI. Few pioneering studies have made some progress on logical reasoning tasks that require partitioned inputs of instances(e.g.,sequential ...
supported in part by National Natural Science Foundation of China (Grant Nos. 61901379, 61941119, 62071223, 62031012);in part by National Key Research and Development Project (Grant No. 2020YFB1807602);in part by Young Elite Scientist Sponsorship Program by CAST;in part by Open Research Fund of National Mobile Communications Research Laboratory, Southeast University (Grant No. 2020D04);in part by Foundation of the Science, Technology, and Innovation Commission of Shenzhen Municipality (Grant No. JCYJ20190806160218174)。
In this paper, we investigate secure communication in a two-hop wireless network, where multiple buffer-aided relays assist to securely forward data from the sender to the destination threatened by a passive eavesdrop...
supported in part by Shenzhen Fundamental Research Program(Grant Nos.JCYJ202001091-10208764,JCYJ20200109110420626);in part by National Natural Science Foundation of China(Grant Nos.U1813204,61802385,62072468);Natural Science Foundation of Guangdong(Grant No.2021A1515012604);in part by Guangdong Basic and Applied Basic Research Foundation(Grant No.2019A1515111106)。
Parkinson’s disease(PD)is treated effectively by deep brain stimulation(DBS)of the subthalamic nucleus(STN),using an electrode inserted into the head of a PD patient.The electrode has multiple electrical contacts alo...
supported by National Key R&D Program of China (Grant No. 2018YFB1800800);National Natural Science Foundation of China (Grant No. 61671131);Project from the Science and Technology on Communication Networks Laboratory;the 54th Research Institute of China Electronics Technology Group Corporation (CETC) (Grant No. 6142104180407)。
In this paper, a novel directional modulation with distributed receiver selection(DM-DRS)scheme is proposed for secure wireless communications. In DM-DRS, a particular subset of receivers is activated and part of the ...
supported in part by National Natural Science Foundation of China(Grant No.61871211);Natural Science Foundation of Jiangsu Province Youth Project(Grant No.BK20180329);Innovation and Entrepreneurship of Jiangsu Province High-level Talent Program,Summit of the Six Top Talents Program of Jiangsu Province。
With the significant development of unmanned aerial vehicles(UAVs)technologies,a rapid increase on the use of UAV swarms in a wide range of civilian and emergency applications has been witnessed.However,how to efficie...
Most studies on the selection techniques of projection-based VR systems are dependent on users wearing complex or expensive input devices, however there are lack of more convenient selection techniques.In this paper, ...
supported by National Natural Science Foundation of China (Grants Nos. U1536109, 61671282, 61373151, 61525305)
Dear editor,Steganography is an important method of covert communication. Steganalysis, an advanced antisteganographic technique can detect steganographic behavior and even reveal the stego key in a certain steganogra...
partially supported by Innovation Foundation of NUDT for Postgraduate (Grant No. B130503)
Dear editor, Query suggestion is a widely known and well em- bedded mechanism in modern search systems to facilitate the task of formulating queries. The goal is to accurately predict user's intended query with only ...