Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- rapid-communicationJanuary 2025
High-resolution multicomponent LFM parameter estimation based on deep learning
Signal Processing (SIGN), Volume 227, Issue Chttps://doi.org/10.1016/j.sigpro.2024.109714AbstractThis paper addresses the complex challenge of parameter estimation in multi-component Linear Frequency Modulation (LFM) signals by introducing an innovative approach to high-resolution Fractional Fourier Transform (FrFT) parameter estimation, ...
- short-paperDecember 2024
Real-time Wideband Software-defined Radio with Python Programmability based on RFSoC
ACM MobiCom '24: Proceedings of the 30th Annual International Conference on Mobile Computing and NetworkingPages 1772–1774https://doi.org/10.1145/3636534.3698855Next-generation wireless networks necessitate large signal bandwidth to support the growing demands of high data rates, which poses significant challenges in the design of real-time radio platforms. We demonstrate SPEAR, a realtime wideband software-...
- research-articleDecember 2024
SPEAR: Software-defined Python-Enhanced RFSoC for Wideband Radio Applications
ACM MobiCom '24: Proceedings of the 30th Annual International Conference on Mobile Computing and NetworkingPages 1834–1841https://doi.org/10.1145/3636534.3697310Next-generation wireless systems utilize large signal band-widths to meet the growing data rate demands of emerging applications and to provide enhanced resolution for wireless sensing and imaging. This poses significant challenges in the design of the ...
- research-articleNovember 2024
On the total energy consumption of scalable cache-aided multi-CPU cell-free massive MIMO systems
Digital Signal Processing (DISP), Volume 154, Issue Chttps://doi.org/10.1016/j.dsp.2024.104669AbstractIn conventional cell-free (CF) systems, the scalability and feasibility are hindered by the fact that a single central processing unit (CPU) manages all access points and the stringent synchronization requirement for coherent transmission (CT) ...
-
- research-articleOctober 2024
A Pair Programming Framework for Code Generation via Multi-Plan Exploration and Feedback-Driven Refinement
ASE '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software EngineeringPages 1319–1331https://doi.org/10.1145/3691620.3695506Large language models (LLMs) have achieved impressive performance on code generation. Although prior studies enhanced LLMs with prompting techniques and code refinement, they still struggle with complex programming problems due to rigid solution plans. ...
- research-articleNovember 2024
DMF2Net: Dynamic multi-level feature fusion network for heterogeneous remote sensing image change detection
Knowledge-Based Systems (KNBS), Volume 300, Issue Chttps://doi.org/10.1016/j.knosys.2024.112159AbstractWith the rapid development of remote sensing data fusion technology, heterogeneous remote sensing image (HRSI) change detection (CD) has become a frontier field. The powerful nonlinear information processing capability of deep neural network ...
- research-articleDecember 2024
Research on Equipment LCC Operation and Maintenance using Blockchain Technology
ICCSIE '24: Proceedings of the 2024 9th International Conference on Cyber Security and Information EngineeringPages 228–232https://doi.org/10.1145/3689236.3695388The State Grid has put forward the construction strategy of "ubiquitous power internet of things". Under the background of the state vigorously developing the block chain technology, blockchain technology will also become a key technology to be applied ...
- research-articleAugust 2024
Mastering Long-Tail Complexity on Graphs: Characterization, Learning, and Generalization
KDD '24: Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data MiningPages 3045–3056https://doi.org/10.1145/3637528.3671880In the context of long-tail classification on graphs, the vast majority of existing work primarily revolves around the development of model debiasing strategies, intending to mitigate class imbalances and enhance the overall performance. Despite the ...
- research-articleAugust 2024
POND: Multi-Source Time Series Domain Adaptation with Information-Aware Prompt Tuning
KDD '24: Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data MiningPages 3140–3151https://doi.org/10.1145/3637528.3671721Time series domain adaptation stands as a pivotal and intricate challenge with diverse applications, including but not limited to human activity recognition, sleep stage classification, and machine fault diagnosis. Despite the numerous domain adaptation ...
- ArticleAugust 2024
Formal Security Proofs via Doeblin Coefficients:: Optimal Side-Channel Factorization from Noisy Leakage to Random Probing
Advances in Cryptology – CRYPTO 2024Pages 389–426https://doi.org/10.1007/978-3-031-68391-6_12AbstractMasking is one of the most popular countermeasures to side-channel attacks, because it can offer provable security. However, depending on the adversary’s model, useful security guarantees can be hard to provide. At first, masking has been shown ...
- research-articleNovember 2024
Predictive maintenance system for high-end equipment in nuclear power plant under limited degradation knowledge
- Xue Liu,
- Wei Cheng,
- Ji Xing,
- Xuefeng Chen,
- Linying Li,
- Yuxin Guan,
- Baoqing Ding,
- Zelin Nie,
- Rongyong Zhang,
- Yifan Zhi
Advanced Engineering Informatics (ADEI), Volume 61, Issue Chttps://doi.org/10.1016/j.aei.2024.102506AbstractTo ensure the safe operation of high-end equipment, the three-stage maintenance strategy comprising unplanned shutdown, temporary shutdown, and scheduled shutdown is currently employed in nuclear power plants. However, this strategy hinders the ...
Highlights- The predictive maintenance framework and system are established.
- The system consists of anomaly detection, sensor selection, degradation trend prediction and RUL prediction.
- The system works under limited degradation knowledge.
- research-articleJanuary 2025
DFA-RAG: conversational semantic router for large language model with definite finite automaton
ICML'24: Proceedings of the 41st International Conference on Machine LearningArticle No.: 1914, Pages 47033–47055This paper introduces the retrieval-augmented large language model with Definite Finite Automaton (DFA-RAG), a novel framework designed to enhance the capabilities of conversational agents using large language models (LLMs). Traditional LLMs face ...
- research-articleJuly 2024
Statistical Higher-Order Correlation Attacks Against Code-Based Masking
IEEE Transactions on Computers (ITCO), Volume 73, Issue 10Pages 2364–2377https://doi.org/10.1109/TC.2024.3424208Masking is one of the most well-established methods to thwart side-channel attacks. Many masking schemes have been proposed in the literature, and code-based masking emerges and unifies several masking schemes in a coding-theoretic framework. In this work,...
- research-articleJune 2024
Closer in time and higher correlation: disclosing the relationship between citation similarity and citation interval
Scientometrics (SPSCI), Volume 129, Issue 7Pages 4495–4512https://doi.org/10.1007/s11192-024-05080-6AbstractInvestigating the intricate relationship between citation similarity and the citation interval offers vital insights for refining citation recommendation systems and enhancing citation evaluation models. This is also a new perspective for ...
- research-articleJuly 2024
Be My Guesses: The interplay between side-channel leakage metrics
Microprocessors & Microsystems (MSYS), Volume 107, Issue Chttps://doi.org/10.1016/j.micpro.2024.105045AbstractIn a theoretical context of side-channel attacks, optimal bounds between success rate, guessing entropy and statistical distance are derived with a simple majorization (Schur-concavity) argument. They are further theoretically refined for ...
- research-articleApril 2024
Resource Management for Active RIS Aided Multi-Cluster SWIPT Cooperative NOMA Networks
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 4Pages 4421–4434https://doi.org/10.1109/TNSM.2024.3395298Active reconfigurable intelligent surface (RIS) has attracted a lot of attention due to its ability to drastically change the communication environment by adjusting the phase shift and amplifying the amplitude of signals. In this paper, we consider to ...
- research-articleAugust 2024
Research on wind power consumption electricity price model considering demand side
ASENS '24: Proceedings of the International Conference on Algorithms, Software Engineering, and Network SecurityPages 485–488https://doi.org/10.1145/3677182.3677268The peak-valley time-of-use electricity pricing strategy serves as a robust approach to optimize the power load curve, thereby effectively guaranteeing the stability and cost-efficiency of the power system. This article develops a pricing model for peak-...
- research-articleJuly 2024
Immediate vs. Delayed Corrective Feedback in Online English Learning: Analyzing Emotional Engagement through Facial Expressions
ICEDS '24: Proceedings of the 2024 5th International Conference on Education Development and StudiesPages 65–70https://doi.org/10.1145/3669947.3669960This study examines the emotional engagement of 8 adult EFL learners divided into two groups receiving either immediate or delayed corrective feedback. Utilizing deep learning-based facial recognition technology, the study quantifies the learners' ...
- research-articleMarch 2024
Infrared and visible image fusion in a rolling guided filtering framework based on deep feature extraction
Wireless Networks (WIRE), Volume 30, Issue 9Pages 7561–7568https://doi.org/10.1007/s11276-024-03716-2AbstractTo preserve rich detail information and high contrast, a novel image fusion algorithm is proposed based on rolling-guided filtering combined with deep feature extraction. Firstly, input images are filtered to acquire various scales decomposed ...