Abstract: Permutation codes are extensively studied because of applications such as frequency-shift keying modulation for power line communication (PLC). In PLC ...
Abstract: In recent years, neural network models have been widely used in many tasks, however, tampering operations from malicious attackers, e.g., backdoor attacks and parameter malicious tampering, ...