Picture for Hamid Behroozi

Hamid Behroozi

Emo3D: Metric and Benchmarking Dataset for 3D Facial Expression Generation from Emotion Description

Add code
Oct 02, 2024
Figure 1 for Emo3D: Metric and Benchmarking Dataset for 3D Facial Expression Generation from Emotion Description
Figure 2 for Emo3D: Metric and Benchmarking Dataset for 3D Facial Expression Generation from Emotion Description
Figure 3 for Emo3D: Metric and Benchmarking Dataset for 3D Facial Expression Generation from Emotion Description
Figure 4 for Emo3D: Metric and Benchmarking Dataset for 3D Facial Expression Generation from Emotion Description
Viaarxiv icon

Secure Deep-JSCC Against Multiple Eavesdroppers

Add code
Aug 05, 2023
Viaarxiv icon

Intelligent Reflecting Surface Assisted Secret Key Generation Under Spatially Correlated Channels in Quasi-Static Environments

Add code
Dec 03, 2022
Viaarxiv icon

Secure SWIPT in STAR-RIS Aided Downlink MISO Rate-Splitting Multiple Access Networks

Add code
Nov 16, 2022
Viaarxiv icon

Secrecy Rate of the Cooperative RSMA-Aided UAV Downlink Relying on Optimal Relay Selection

Add code
Oct 08, 2022
Figure 1 for Secrecy Rate of the Cooperative RSMA-Aided UAV Downlink Relying on Optimal Relay Selection
Figure 2 for Secrecy Rate of the Cooperative RSMA-Aided UAV Downlink Relying on Optimal Relay Selection
Figure 3 for Secrecy Rate of the Cooperative RSMA-Aided UAV Downlink Relying on Optimal Relay Selection
Figure 4 for Secrecy Rate of the Cooperative RSMA-Aided UAV Downlink Relying on Optimal Relay Selection
Viaarxiv icon

Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel

Add code
Sep 26, 2022
Figure 1 for Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel
Figure 2 for Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel
Figure 3 for Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel
Figure 4 for Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel
Viaarxiv icon

Temporal Action Localization Using Gated Recurrent Units

Add code
Aug 07, 2021
Figure 1 for Temporal Action Localization Using Gated Recurrent Units
Figure 2 for Temporal Action Localization Using Gated Recurrent Units
Figure 3 for Temporal Action Localization Using Gated Recurrent Units
Figure 4 for Temporal Action Localization Using Gated Recurrent Units
Viaarxiv icon

DTW-Merge: A Novel Data Augmentation Technique for Time Series Classification

Add code
Mar 01, 2021
Figure 1 for DTW-Merge: A Novel Data Augmentation Technique for Time Series Classification
Figure 2 for DTW-Merge: A Novel Data Augmentation Technique for Time Series Classification
Figure 3 for DTW-Merge: A Novel Data Augmentation Technique for Time Series Classification
Figure 4 for DTW-Merge: A Novel Data Augmentation Technique for Time Series Classification
Viaarxiv icon

Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning

Add code
Jan 07, 2021
Figure 1 for Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning
Figure 2 for Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning
Figure 3 for Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning
Figure 4 for Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning
Viaarxiv icon