News
Abstract: There are still various challenges in remote sensing semantic segmentation due to objects diversity and complexity. Transformer-based models have significant advantages in capturing global ...
Abstract: The advent of modern communication systems has led to the widespread application of deep learning-based automatic modulation recognition (DL-AMR) in wireless communications. However, ...
Abstract: Oriented object detection in aerial images has made significant advancements propelled by well-developed detection frameworks and diverse representation approaches to oriented bounding boxes ...
Abstract: Optical and synthetic aperture radar (SAR) remote sensing are crucial for ship detection. Integrating SAR’s all-weather imaging with optical data’s shape recognition enhances downstream ...
Abstract: Convolutional neural networks (CNNs) and Transformers have made impressive progress in the field of remote sensing change detection (CD). However, both architectures have inherent ...
Abstract: Automatic medical image segmentation is a crucial topic in the medical domain and successively a critical counterpart in the computer-aided diagnosis paradigm. U-Net is the most widespread ...
Abstract: Mathematical optimization is now widely regarded as an indispensable modeling and solution tool for the design of wireless communications systems. While optimization has played a significant ...
Abstract: In this letter, an in-band full-duplex integrated sensing and communications (ISAC) system based on orthogonal frequency division multiplexing (OFDM) modulation is proposed. We introduce a ...
Abstract: This work proposes an incremental Generalized Iterative Closest Point (GICP) based tightly-coupled LiDAR-inertial odometry (LIO), iG-LIO, which integrates the GICP constraints and inertial ...
Abstract: The definition of the language syntax and semantics for SystemVerilog, which is a unified hardware design, specification, and verification language, is provided. This standard includes ...
Abstract: Nowadays traffic on the Internet has been widely encrypted to protect its confidentiality and privacy. However, traffic encryption is always abused by attackers to conceal their malicious ...
Abstract: Multiview subspace clustering aims to discover the inherent structure of data by fusing multiple views of complementary information. Most existing methods first extract multiple types of ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results