New approaches in component design for dye-sensitized solar cells
The present perspective presents a number of issues related to the current direction of DSSC research, with emphasis on the transition from […]
Traffic Aware Beamformer Design for Flexible TDD-Based Integrated Access and Backhaul
Integrated access and backhaul (IAB) network consists of base station (BS), relay nodes (RNs), and user-equipments (UEs), where BS and RNs exchange […]
Guiding Monocular Depth Estimation Using Depth-Attention Volume
Recovering the scene depth from a single image is an ill-posed problem that requires additional priors, often referred to as monocular depth […]
Edge-supported Microservice-based Resource Discovery for Mist Computing
Mist computing extends the Internet of Things computing infrastructures to the IoT devices at the edges of the networks. The dynamic characteristics […]
Towards Metaphors for Cascading AI
In the future, more and more systems will be powered by AI. This may exacerbate existing blind spots in explainability research, such […]
Scavenger Hunt
Distributed Ledger Technology, has been gaining enormous attention in areas beyond cryptocurrency. Industries such as energy, transportation, and healthcare are already integrating […]
NAS-FAS
Face anti-spoofing (FAS) plays a vital role in securing face recognition systems. Existing methods heavily rely on the expert-designed networks, which may […]
Average AoI in Multi-Source Systems with Source-Aware Packet Management
We study the information freshness under three different source aware packet management policies in a status update system consisting of two independent […]
Attention-Weighted Federated Deep Reinforcement Learning for Device-to-Device Assisted Heterogeneous Collaborative Edge Caching
In order to meet the growing demands for multimedia service access and release the pressure of the core network, edge caching and […]
Face Anti-Spoofing with Human Material Perception
Face anti-spoofing (FAS) plays a vital role in securing the face recognition systems from presentation attacks. Most existing FAS methods capture various […]