Abstract: Permutation codes are extensively studied because of applications such as frequency-shift keying modulation for power line communication (PLC). In PLC ...
Abstract: In recent years, neural network models have been widely used in many tasks, however, tampering operations from malicious attackers, e.g., backdoor attacks and parameter malicious tampering, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results