Abstract: In semantic communication, model inversion attacks and adversarial attacks pose a major threat to both data privacy and system mission performance. This article adopts an attacker-centric ...
Pull requests help you collaborate on code with other people. As pull requests are created, they’ll appear here in a searchable and filterable list. To get started, you should create a pull request.
Abstract: We propose a new algorithm to identify a Wiener-Hammerstein system. This model represents a communication channel where two linear filters are separated by a non-linear function modelling an ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results