UM

Browse/Search Results:  1-10 of 19 Help

Selected(0)Clear Items/Page:    Sort:
Privacy-Preserving Control for 2-D Systems With Guaranteed Probability Journal article
Zhu, Kaiqun, Wang, Zidong, Ding, Derui, Dong, Hongli, Han, Qing-Long. Privacy-Preserving Control for 2-D Systems With Guaranteed Probability[J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54(8), 4999-5011.
Authors:  Zhu, Kaiqun;  Wang, Zidong;  Ding, Derui;  Dong, Hongli;  Han, Qing-Long
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:8.6/8.7 | Submit date:2024/10/09
Dynamic Coding-decoding Rule  Guaranteed Probability  Privacy-preserving Mechanism (Ppm)  Two-dimensional (2-d) Systems  
Dynamic-Encoding-Based Sliding Mode Control Under Round-Robin Protocol Conference paper
Zhang, Pengcheng, Cao, Zhiru, Zhu, Kaiqun. Dynamic-Encoding-Based Sliding Mode Control Under Round-Robin Protocol[C]:Institute of Electrical and Electronics Engineers Inc., 2024, 556-561.
Authors:  Zhang, Pengcheng;  Cao, Zhiru;  Zhu, Kaiqun
Favorite | TC[Scopus]:0 | Submit date:2024/09/03
Dynamic Encoding-decoding Scheme  Round-robin Protocol  Sliding Mode Control  
A Theory of Semantic Communication Journal article
Shao, Yulin, Cao, Qi, Gunduz, Deniz. A Theory of Semantic Communication[J]. IEEE Transactions on Mobile Computing, 2024, 1-18.
Authors:  Shao, Yulin;  Cao, Qi;  Gunduz, Deniz
Favorite | TC[Scopus]:3  IF:7.7/6.5 | Submit date:2024/07/04
Semantic Communication  Joint Source-channel Coding  Semantic Decoding  Semantic Encoding  Large Language Model  
Modality-specific impacts of distractors on visual and auditory categorical decision-making: an evidence accumulation perspective Journal article
Li, Jianhua, Hua, Lin, Deng, Sophia W.. Modality-specific impacts of distractors on visual and auditory categorical decision-making: an evidence accumulation perspective[J]. Frontiers in Psychology, 2024, 15, 1380196.
Authors:  Li, Jianhua;  Hua, Lin;  Deng, Sophia W.
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:2.6/3.3 | Submit date:2024/06/05
Categorical Decision-making  Eeg Decoding  Evidence Accumulation Processes  Hierarchical Drift Diffusion Modeling  Multisensory Perception  
Broadband Digital Over-the-Air Computation for Wireless Federated Edge Learning Journal article
You, Lizhao, Zhao, Xinbo, Cao, Rui, Shao, Yulin, Fu, Liqun. Broadband Digital Over-the-Air Computation for Wireless Federated Edge Learning[J]. IEEE Transactions on Mobile Computing, 2024, 23(5), 5212 - 5228.
Authors:  You, Lizhao;  Zhao, Xinbo;  Cao, Rui;  Shao, Yulin;  Fu, Liqun
Favorite | TC[WOS]:2 TC[Scopus]:5  IF:7.7/6.5 | Submit date:2024/02/23
Atmospheric Modeling  Channel Codes  Data Models  Decoding  Federated Edge Learning  Multiple Access  Ofdm  Over-the-air Computation  Real-time Implementation  Real-time Systems  Servers  Symbols  
MaskCAE: Masked Convolutional AutoEncoder via Sensor Data Reconstruction for Self-Supervised Human Activity Recognition Journal article
Cheng, Dongzhou, Zhang, Lei, Qin, Lutong, Wang, Shuoyuan, Wu, Hao, Song, Aiguo. MaskCAE: Masked Convolutional AutoEncoder via Sensor Data Reconstruction for Self-Supervised Human Activity Recognition[J]. IEEE Journal of Biomedical and Health Informatics, 2024, 28(5), 2687-2698.
Authors:  Cheng, Dongzhou;  Zhang, Lei;  Qin, Lutong;  Wang, Shuoyuan;  Wu, Hao; et al.
Favorite | TC[WOS]:2 TC[Scopus]:2  IF:6.7/7.1 | Submit date:2024/05/16
Convolution  Convolutional Autoencoder  Data Models  Decoding  Feature Extraction  Human Activity Recognition  Human Activity Recognition  Masked Reconstruction  Self-supervised Learning  Self-supervised Learning  Sensor  Task Analysis  
BLER Analysis and Optimal Power Allocation of HARQ-IR for Mission-Critical IoT Communications Journal article
He, Fuchao, Shi, Zheng, Zhou, Binggui, Yang, Guanghua, Li, Xiaofan, Ye, Xinrong, Ma, Shaodan. BLER Analysis and Optimal Power Allocation of HARQ-IR for Mission-Critical IoT Communications[J]. IEEE Internet of Things Journal, 2024.
Authors:  He, Fuchao;  Shi, Zheng;  Zhou, Binggui;  Yang, Guanghua;  Li, Xiaofan; et al.
Favorite | TC[WOS]:0 TC[Scopus]:1  IF:8.2/9.0 | Submit date:2024/09/03
Block Error Rate  Decoding  Deep Reinforcement Learning  Fading Channels  Harq-ir  Internet Of Things  Markov Decision Process  Reliability Theory  Resource Management  Short Packet Communications  Signal To Noise Ratio  Throughput  
On the Mathematical Modeling and Optimization for the Energy Efficiency Performance of CSMA-NOMA Random Access Networks with Channel Inversion Journal article
Cao, Shengbin, Hou, Fen. On the Mathematical Modeling and Optimization for the Energy Efficiency Performance of CSMA-NOMA Random Access Networks with Channel Inversion[J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22(4), 2867-2884.
Authors:  Cao, Shengbin;  Hou, Fen
Favorite | TC[WOS]:1 TC[Scopus]:4 | Submit date:2022/12/31
Non-orthogonal Multiple Access (Noma)  Decoding  Mathematical Models  Wireless Communication  Optimization  Power Control  Multiaccess Communication  Energy Efficiency  Csma  Ca  Difference Of Convex Programming (Dcp)  Random Access  Performance Analysis  Complementary Geometric Programming (Cgp)  
Anti-rounding Image Steganography with Separable Fine-tuned Network Journal article
Yin,Xiaolin, Wu,Shaowu, Wang,Ke, Lu,Wei, Zhou,Yicong, Huang,Jiwu. Anti-rounding Image Steganography with Separable Fine-tuned Network[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2023, 33(11), 7066-7079.
Authors:  Yin,Xiaolin;  Wu,Shaowu;  Wang,Ke;  Lu,Wei;  Zhou,Yicong; et al.
Favorite | TC[WOS]:4 TC[Scopus]:5  IF:8.3/7.1 | Submit date:2023/08/03
Anti-rounding  Data Mining  Decoding  Feature Extraction  Generative Adversarial Networks  Generators  Image Steganography  Precision Loss  Separable Fine-tuned Network  Steganography  Training  
Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes with DNA Coding and Nonlinear Dynamics Journal article
Zhang,Chengrui, Chen,Junxin, Chen,Dongming, Wang,Wei, Zhang,Yushu, Zhou,Yicong. Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes with DNA Coding and Nonlinear Dynamics[J]. IEEE Transactions on Multimedia, 2023, 26, 1114-1128.
Authors:  Zhang,Chengrui;  Chen,Junxin;  Chen,Dongming;  Wang,Wei;  Zhang,Yushu; et al.
Favorite | TC[WOS]:4 TC[Scopus]:6  IF:8.4/8.0 | Submit date:2023/08/03
Chosen-plaintext Attack  Ciphers  Decoding  Dna  Dna Coding  Encoding  Encryption  Image Coding  Image Encryption  S-box Matrix  Security