|
|
|
Antonio Maci, Alessandro Santorsola, Antonio Coscia and Andrea Iannacone
Web phishing is a form of cybercrime aimed at tricking people into visiting malicious URLs to exfiltrate sensitive data. Since the structure of a malicious URL evolves over time, phishing detection mechanisms that can adapt to such variations are paramou...
ver más
|
|
|
|
|
|
Jing Zhang, Qiqi Wang and Rui Zhang
Spectrum-sensing algorithms are one of the effective solutions to the problem of the underwater spectrum resource constraint. However, because the underwater acoustic channel is one of the most complex channels, it has many characteristics, such as a lim...
ver más
|
|
|
|
|
|
Xu Han, Xianku Zhang and Hugan Zhang
Trajectory planning aims to provide a time-related control target that contains the concerned states. For an underactuated surface vehicle (USV), planning challenges include limitations on curvature, speed, acceleration, and jerk. These challenges are re...
ver más
|
|
|
|
|
|
Jinxiu Zhao, Li Su, Xiangyu Wang, Jinjian Li, Fan Yang, Na Jiang and Quan Hu
The event camera, a new bio-inspired vision sensor with low latency and high temporal resolution, has brought great potential and demonstrated a promising application in machine vision and artificial intelligence. Corner detection is a key step of object...
ver más
|
|
|
|
|
|
Eran Shachar, Israel Cohen and Baruch Berdugo
Acoustic echo in full-duplex telecommunication systems is a common problem that may cause desired-speech quality degradation during double-talk periods. This problem is especially challenging in low signal-to-echo ratio (SER) scenarios, such as hands-fre...
ver más
|
|
|