Traffic Aware Beamformer Design for Flexible TDD-Based Integrated Access and Backhaul
Integrated access and backhaul (IAB) network consists of base station (BS), relay nodes (RNs), and user-equipments (UEs), where BS and RNs exchange […]
New approaches in component design for dye-sensitized solar cells
The present perspective presents a number of issues related to the current direction of DSSC research, with emphasis on the transition from […]
Guiding Monocular Depth Estimation Using Depth-Attention Volume
Recovering the scene depth from a single image is an ill-posed problem that requires additional priors, often referred to as monocular depth […]
Towards Metaphors for Cascading AI
In the future, more and more systems will be powered by AI. This may exacerbate existing blind spots in explainability research, such […]
Edge-supported Microservice-based Resource Discovery for Mist Computing
Mist computing extends the Internet of Things computing infrastructures to the IoT devices at the edges of the networks. The dynamic characteristics […]
Scavenger Hunt
Distributed Ledger Technology, has been gaining enormous attention in areas beyond cryptocurrency. Industries such as energy, transportation, and healthcare are already integrating […]
Highly efficient key agreement for remote patient monitoring in MEC-enabled 5G networks
Remote patient monitoring is one of the cornerstones to enable Ambient Assisted Living. Here, a set of devices provide their corresponding input, […]
Average AoI in Multi-Source Systems with Source-Aware Packet Management
We study the information freshness under three different source aware packet management policies in a status update system consisting of two independent […]
NAS-FAS
Face anti-spoofing (FAS) plays a vital role in securing face recognition systems. Existing methods heavily rely on the expert-designed networks, which may […]
Face Anti-Spoofing with Human Material Perception
Face anti-spoofing (FAS) plays a vital role in securing the face recognition systems from presentation attacks. Most existing FAS methods capture various […]