— In recent years, many different kinds of wireless access networks have been deployed for the Internet and have become inseparable parts of the Internet. But TCP, the most widel...
Oriented patterns, e.g. fingerprints, consist of smoothly
varying flow-like patterns, together with important singular
points (i.e. cores and deltas) where the orientation change...
Qijun Zhao (The Hong Kong Polytechnic University),...
Supply chain management is a critically significant strategy that enterprises depend on in meeting the challenges of today's highly competitive and dynamic business environme...
Luis Rabelo, Magdy Helal, Chalermmon Lertpattarapo...
Abstract— We propose an enhanced physical-layer authentication scheme for multi-carrier wireless systems, where transmission bursts consist of multiple frames. More specifically...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
In this paper, we propose a new approach to anomaly detection by looking at the latent variable space to make the first step toward latent anomaly detection. Most conventional app...