Abstract: The application of gesture recognition technology in human-computer interaction fields is widespread. However, issues such as the size of the model parameter space and the occurrence of ...
Abstract: Jamming attacks continue to pose a significant threat to next-generation wireless networks, including Beyond 5G (B5G) and 6 G, by disrupting communication through intentional interference.