217 results on '"Xiang Cheng"'
Search Results
2. Reputation-Based Collaborative Decision-Making in Hierarchical Blockchain-Enabled Vehicular Networks.
3. Autonomous Intersection Management with Heterogeneous Vehicles: A Multi-Agent Reinforcement Learning Approach.
4. A Fast Transient Response Capless LDO Regulator Achieving -78 dB of PSR Up to 2 MHz.
5. Semantic-Oriented Feature Compression for Resource-Constrained Distributed Sensor Networks.
6. Propagation Characterization and Channel Modeling for UAV Communications
7. Transformers Implement Functional Gradient Descent to Learn Non-Linear Functions In Context.
8. Linear attention is (maybe) all you need (to understand Transformer optimization).
9. A New Dataset for Intelligent Multi-Modal Sensing-Communication Integration in Low-Altitude Scenarios.
10. HELSA: Hierarchical Reinforcement Learning with Spatiotemporal Abstraction for Large-Scale Multi-Agent Path Finding.
11. Global Map Assisted Multi-Agent Collision Avoidance via Deep Reinforcement Learning around Complex Obstacles.
12. A Multi-scene Webpage Fingerprinting Method Based on Multi-head Attention and Data Enhancement.
13. An Android Malware Detection Method Using Better API Contextual Information.
14. Cross-Regional Task Offloading with Multi-Agent Reinforcement Learning for Hierarchical Vehicular Fog Computing.
15. A DGA Domain Name Detection Method Based on Two-Stage Feature Reinforcement.
16. EAMDM: An Evolved Android Malware Detection Method Using API Clustering.
17. AEX-Notify: Thwarting Precise Single-Stepping Attacks through Interrupt Awareness for Intel SGX Enclaves.
18. Joint Uplink and Downlink NOMA for UAV Relaying Network with Multi-Pair Users.
19. Demonstration of 5G-Underlay Signal Co-existence.
20. Enhanced Non-preemptive Support of URLLC using Spread Spectrum Underlay Signalling.
21. Underlay-based 5G Sidelink with Co-channel Interference Cancellation.
22. A Client-Side Watermarking with Private-Class in Federated Learning.
23. A Fake News Detection Method Based on a Multimodal Cooperative Attention Network.
24. An Improved Capsule Network for DGA Domain Detection.
25. A Rule-Based Unstructured Information Extraction Model for Announcements of Listed Companies' Stock Increase or Decrease.
26. mmWave Massive MIMO Vehicular Communications
27. MIA-Leak: Exploring Membership Inference Attacks in Federated Learning Systems.
28. Creating concise and efficient dynamic analyses with ALDA.
29. Federated Spatio-Temporal Traffic Flow Prediction Based on Graph Convolutional Network.
30. Bootstrapping Joint Entity and Relation Extraction with Reinforcement Learning.
31. Energy Efficiency Aware Collaborative Multi-UAV Deployment for Intelligent Traffic Surveillance.
32. PRISM: Prefix-Sum based Range Queries Processing Method under Local Differential Privacy.
33. OCVC: An Overlapping-Enabled Cooperative Computing Protocol in Vehicular Fog Computing.
34. Source Code Vulnerability Detection Using Vulnerability Dependency Representation Graph.
35. Dynamic Many-to-Many Task Offloading in Vehicular Fog Computing: A Multi-Agent DRL Approach.
36. A Contract-Based Computing-Charging Protocol for Electric Vehicles with Vehicular Fog Computing.
37. Artificial Neural Network-assisted Amplitude Thresholding Improves Spike Detection.
38. 5G Physical Layer Resiliency Enhancements with NB-IoT Use Case Study.
39. Public Data Assisted Differential Private Deep Learning.
40. Collecting Individual Trajectories under Local Differential Privacy.
41. Differentially Private Distributed Multi-Task Relationship Learning.
42. Method of Accessing the Urban Public Space from GF-2 Image by Indicator SDG 11.7.1.
43. Transformers learn to implement preconditioned gradient descent for in-context learning.
44. Fast Conditional Mixing of MCMC Algorithms for Non-log-concave Distributions.
45. Restart Sampling for Improving Generative Processes.
46. Optimal dimension dependence of the Metropolis-Adjusted Langevin Algorithm.
47. Pose Correction of Autonomous Vehicles with Edge Computing.
48. A 3D Cluster-Based Channel Model with Time-Space Consistency (Invited Paper).
49. Differentially Private Correlation Alignment for Domain Adaptation.
50. Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.