بحث بسيط
السجلات المعروضة 1 -- 8 من 8
Deep Reinforcement Learning Algorithm for Smart Data Compression under NOMA-Uplink Protocol
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
One of the highly promising radio access strategies for enhancing performance in the next generation cellular communications is non-orthogonal multiple access (NOMA). NOMA offers a number of advantages including better ...
Deep Learning for RF-Based Drone Detection and Identification: A Multi-Channel 1-D Convolutional Neural Networks Approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Commercial unmanned aerial vehicles, or drones, are getting increasingly popular in the last few years. The fact that these drones are highly accessible to public may bring a range of security and technical issues to ...
VisDrone-CC2020: The Vision Meets Drone Crowd Counting Challenge Results
(
Springer Science and Business Media Deutschland GmbH
, 2020 , Conference Paper)
Crowd counting on the drone platform is an interesting topic in computer vision, which brings new challenges such as small object inference, background clutter and wide viewpoint. However, there are few algorithms focusing ...
On Optimizing the Secrecy Performance of RIS-Assisted Cooperative Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Employing reconfigurable intelligent surfaces (RIS) is emerging as a game-changer candidate, thanks to their unique capabilities in improving the power efficiency and supporting the ubiquity of future wireless communication ...
Design and Implementation of a RF Based Anti-Drone System
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Drones or unmanned aerial vehicles are having an increased popularity in all fields of applications such as transportation, traffic monitoring, military surveillance etc. However, this technology can be used for destruction ...
Combating jamming attacks in multi-channel IoT networks using game theory
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Jamming attacks are among the most widely used techniques to block and disturb legitimate communications. Several techniques are used in the literature to combat these attacks. However, most of them either require the ...
IoT Anti-Jamming Strategy Using Game Theory and Neural Network
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread and its heterogeneity. In such networks, jamming attacks are widely used by malicious users to compromise the private and ...
Securing IoT Cooperative Networks Using Energy Harvesting.
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
An energy efficient and secure Internet of Things (IoT) healthcare system is proposed in this paper. By exploiting spatial diversity, energy harvesting and physical layer security techniques, the proposed approach secures ...