Abstract: To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEIs) has emerged as pivotal.
Abstract: With the exponential growth of digital data, ensuring efficient and secure online file transmission has become a significant challenge. This study presents a comprehensive analysis of hybrid ...
Abstract: This paper introduces a cooperative and decentralized collision avoidance algorithm (CoDe) for small-scale UAV swarms consisting of up to three UAVs. CoDe improves energy efficiency of UAVs ...
Abstract: Flying ad hoc networks (FANETs) use unmanned aerial vehicles (UAVs) to build a wireless network with special properties. The transmission of data between UAVs in FANETs has become a key area ...
Abstract: The electromagnetic environment in modern battlefields is highly complex, particularly due to active forwarding signals based on digital radio frequency memory (DRFM), which significantly ...
Abstract: The steel industry is one of the world's highest energy consumption. It is important to improve its energy efficiency. Energy consumption prediction can help steel industry better plan and ...
Abstract: Coding metasurfaces, composed of artificial meta-atoms with digital encoded electromagnetic (EM) responses, have great potential for numerous information applications due to their advanced ...
Abstract: Mobile way communication over the Internet requires error detection and correction. The detection of error at the data link layer can be controlled by ...
Abstract: A data compression scheme is said to be smooth if it preserves similarity. That is, under small changes in its input, the output changes little. In this paper, we focus on the smoothness of ...
Abstract: Community coding algorithms have these days been applied to cell Wi-Fi networks to improve system performance. Those algorithms permit efficient record transfer and minimize the effect of ...
Abstract: The rapid development of cloud gaming puts tremendous pressure on network bandwidth, highlighting the crucial role of video coding technology. Considering substantial disparities in video ...
Abstract: Deep code models are vulnerable to adversarial attacks, making it possible for semantically identical inputs to trigger different responses. Current black-box attack methods typically ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results