Malicious communication behavior is the network communication behavior
g...
HTTP-based Trojan is extremely threatening, and it is difficult to be
ef...
Trojans are one of the most threatening network attacks currently. HTTP-...
A Mobility Digital Twin is an emerging implementation of digital twin
te...
In recent years, the problem of fuzzy clustering has been widely concern...
Artificial intelligence (AI) has enabled a new paradigm of smart applica...
Most of the existing clustering methods are based on a single granularit...
3GPP has introduced Private 5G to support the next-generation industrial...
It is crucial to evaluate the quality and determine the optimal number o...
The emerging vehicular connected applications, such as cooperative autom...
The purpose of cluster analysis is to classify elements according to the...
Today very few deep learning-based mobile augmented reality (MAR)
applic...
Applying deep learning to object detection provides the capability to
ac...
As vehicles playing an increasingly important role in people's daily lif...