Issue Date | Title | Author(s) |
2023-01-05 | A Novel GAPG Approach to Automatic Property Generation for Formal Verification: The GAN Perspective | Gao, H; Dai, B; Miao, H; Yang, X; Barroso, RJD; Walayat, H |
2023-01-01 | Reinforcement Learning-Based Physical Cross-Layer Security and Privacy in 6G | Lu, X; Xiao, L; Li, P; Ji, X; Xu, C; Yu, S; Zhuang, W |
2023-01-01 | TIC: text-guided image colorization using conditional generative model | Ghosh, S; Roy, P; Bhattacharya, S; Pal, U; Blumenstein, M |
2023-11-01 | Making DeepFakes More Spurious: Evading Deep Face Forgery Detection via Trace Removal Attack | Liu, C; Chen, H; Zhu, T; Zhang, J; Zhou, W |
2023-01-01 | Similarity-based Secure Deduplication for IIoT Cloud Management System | Gao, Y; Chen, L; Han, J; Yu, S; Fang, H |
2023-09-01 | Performance Evaluation of a Novel Intrusion Detection System in Next Generation Networks | Sood, K; Nguyen, DDN; Nosouhi, MR; Kumar, N; Jiang, F; Chowdhury, M; Doss, R |
2023-01-01 | You Can Glimpse but You Cannot Identify: Protect IoT Devices from Being Fingerprinted | Tan, S; Yu, S; Liu, W; He, D; Chan, S |
2023-04-01 | Optimal placement of applications in the fog environment: A systematic literature review | Islam, MM; Ramezani, F; Lu, HY; Naderpour, M |
2024 | A Human-Centric Metaverse Enabled by Brain-Computer Interface: A Survey | Zhu, HY; Hieu, NQ; Hoang, DT; Nguyen, DN; Lin, C-T |
2023-06-01 | DTE-RR: Dynamic Topology Evolution-Based Reliable Routing in VANET | Han, Z; Xu, C; Ma, S; Hu, Y; Zhao, G; Yu, S |