Securing Public Safety Communications on Commercial and Tactical 5G Networks
The forthcoming communication networks for public safety authorities rely on the fifth generation (5G) of mobile networking technologies. Police officers, paramedics, border […]
Adaptive Subcarrier, Parameter, and Power Allocation for Partitioned Edge Learning Over Broadband Channels
In this paper, we consider partitioned edge learning (PARTEL), which implements parameter-server training, a well known distributed learning method, in a wireless […]
A novel multi-level pyramid co-variance operators for estimation of personality traits and job screening scores
Recently, automatic personality analysis is becoming an interesting topic for computer vision. Many attempts have been proposed to solve this problem using […]
Modeling and performance evaluation of antennas coated using monolayer graphene in the millimeter and sub-millimeter wave bands
In the applications of millimeter and sub-millimeter wave, the conductivity of metal parts in electronic devices can easily degrade when conventional metals […]
Latency Minimization in Intelligent Reflecting Surface Assisted D2D Offloading Systems
In this letter, we investigate an intelligent reflecting surface (IRS) aided device-to-device (D2D) offloading system, where an IRS is employed to assist […]
A Survey of Virtual Private LAN Services (VPLS)
Virtual Private LAN services (VPLS) is a Layer 2 Virtual Private Network (L2VPN) service that has gained immense popularity due to a […]
Extremely Interactive and Low-Latency Services in 5G and Beyond Mobile Systems
This article provides an overview on extremely interactive and low-latency immersive services as well as the relevant industry and standardization activities. Immersive […]
Data expansion using back translation and paraphrasing for hate speech detection
With proliferation of user generated contents in social media platforms, establishing mechanisms to automatically identify toxic and abusive content becomes a prime […]
Meta-Teacher For Face Anti-Spoofing
Face anti-spoofing (FAS) secures face recognition from presentation attacks (PAs). Existing FAS methods usually supervise PA detectors with handcrafted binary or pixel-wise […]
3D Skeletal Gesture Recognition via Discriminative Coding on Time-Warping Invariant Riemannian Trajectories
Learning 3D skeleton-based representation for gesture recognition has progressively stood out because of its invariance to the viewpoint and background dynamics of […]