This work studied (for the first time) the eavesdropping attack on an OFDM-based, multi-hop UWASN. We performed joint optimal node selection for data forwarding and power allocation (across the OFDM sub-carriers) to maximize the secrecy capacity at …
Consider an OFDM based, multi-hop underwater acoustic sensor network with $M+1$ underwater sensing nodes that report their sensed data to a sink node…
Charge transport properties in organic semiconductors are determined by two kinds of microscopic disorders, namely energetic disorder related to the …
Multipathing in communication networks is gaining momentum due to its attractive features of increased reliability, throughput, fault tolerance, and …
Trained generative models have shown remarkable performance as priors for inverse problems in imaging. For example, Generative Adversarial Network pr…
Current cross-modal retrieval systems are evaluated using R@K measure which does not leverage semantic relationships rather strictly follows the manu…
Technology is an extremely potent tool that can be leveraged for human development and social good. Owing to the great importance of environment and …
The problem of identifying important players in a given network is of pivotal importance for viral marketing, public health management, network secur…
Social discrimination is considered illegal and unethical in the modern world. Such discrimination is often implicit in observed decisions' datasets,…
Video object segmentation is a fundamental step in many advanced vision applications. Most existing algorithms are based on handcrafted features such…
In this paper, we study the relationship between two crucial properties in linear dynamical networks of diffusively coupled agents -- controllability…
The surface morphology of metal influences its optical absorptivity. Recent experiments have demonstrated that the femtosecond laser induced surface …
This study uses the article content and metadata of four important computer networking periodicals-IEEE Communications Surveys and Tutorials (COMST),…
Automatic detection of firearms is important for enhancing security and safety of people, however, it is a challenging task owing to the wide variati…
We consider the task of recovering two real or complex $m$-vectors from phaseless Fourier measurements of their circular convolution. Our method is a…
The main contribution of this paper is that we identify “resource pooling” as a general unifying principle underpinning a wide variety of wireless technologies. We advance the state of the art by demonstrating the generality of the concept of resour…
We live in a world in which there is a great disparity between the lives of the rich and the poor. Technology offers great promise in bridging this g…
Deep Reinforcement Learning (DRL) has numerous applications in the real world thanks to its outstanding ability in quickly adapting to the surroundin…
Recent advancements in deep learning has created a lot of opportunities to solve those real world problems which remained unsolved for more than a de…
Rapid progress in adversarial learning has enabled the generation of realistic-looking fake visual content. To distinguish between fake and real visu…
By signing up you accept our content policy
Already have an account? Sign in
No a member yet? Create an account