Picture for Naijin Liu

Naijin Liu

Adaptive Task Offloading for Space Missions: A State-Graph-Based Approach

Add code
Nov 16, 2022
Viaarxiv icon

Adversarial Jamming for a More Effective Constellation Attack

Add code
Jan 20, 2022
Figure 1 for Adversarial Jamming for a More Effective Constellation Attack
Viaarxiv icon

Low-Interception Waveform: To Prevent the Recognition of Spectrum Waveform Modulation via Adversarial Examples

Add code
Jan 20, 2022
Figure 1 for Low-Interception Waveform: To Prevent the Recognition of Spectrum Waveform Modulation via Adversarial Examples
Figure 2 for Low-Interception Waveform: To Prevent the Recognition of Spectrum Waveform Modulation via Adversarial Examples
Figure 3 for Low-Interception Waveform: To Prevent the Recognition of Spectrum Waveform Modulation via Adversarial Examples
Figure 4 for Low-Interception Waveform: To Prevent the Recognition of Spectrum Waveform Modulation via Adversarial Examples
Viaarxiv icon

RadioNet: Transformer based Radio Map Prediction Model For Dense Urban Environments

Add code
May 15, 2021
Figure 1 for RadioNet: Transformer based Radio Map Prediction Model For Dense Urban Environments
Figure 2 for RadioNet: Transformer based Radio Map Prediction Model For Dense Urban Environments
Figure 3 for RadioNet: Transformer based Radio Map Prediction Model For Dense Urban Environments
Figure 4 for RadioNet: Transformer based Radio Map Prediction Model For Dense Urban Environments
Viaarxiv icon

Mean Field MARL Based Bandwidth Negotiation Method for Massive Devices Spectrum Sharing

Add code
Apr 30, 2021
Figure 1 for Mean Field MARL Based Bandwidth Negotiation Method for Massive Devices Spectrum Sharing
Figure 2 for Mean Field MARL Based Bandwidth Negotiation Method for Massive Devices Spectrum Sharing
Figure 3 for Mean Field MARL Based Bandwidth Negotiation Method for Massive Devices Spectrum Sharing
Figure 4 for Mean Field MARL Based Bandwidth Negotiation Method for Massive Devices Spectrum Sharing
Viaarxiv icon

Noise Attention based Spectrum Anomaly Detection Method for Unauthorized Bands

Add code
Apr 17, 2021
Figure 1 for Noise Attention based Spectrum Anomaly Detection Method for Unauthorized Bands
Figure 2 for Noise Attention based Spectrum Anomaly Detection Method for Unauthorized Bands
Figure 3 for Noise Attention based Spectrum Anomaly Detection Method for Unauthorized Bands
Figure 4 for Noise Attention based Spectrum Anomaly Detection Method for Unauthorized Bands
Viaarxiv icon

Adversarial YOLO: Defense Human Detection Patch Attacks via Detecting Adversarial Patches

Add code
Mar 16, 2021
Figure 1 for Adversarial YOLO: Defense Human Detection Patch Attacks via Detecting Adversarial Patches
Figure 2 for Adversarial YOLO: Defense Human Detection Patch Attacks via Detecting Adversarial Patches
Figure 3 for Adversarial YOLO: Defense Human Detection Patch Attacks via Detecting Adversarial Patches
Figure 4 for Adversarial YOLO: Defense Human Detection Patch Attacks via Detecting Adversarial Patches
Viaarxiv icon

Blind Adversarial Pruning: Balance Accuracy, Efficiency and Robustness

Add code
Apr 10, 2020
Figure 1 for Blind Adversarial Pruning: Balance Accuracy, Efficiency and Robustness
Figure 2 for Blind Adversarial Pruning: Balance Accuracy, Efficiency and Robustness
Figure 3 for Blind Adversarial Pruning: Balance Accuracy, Efficiency and Robustness
Figure 4 for Blind Adversarial Pruning: Balance Accuracy, Efficiency and Robustness
Viaarxiv icon

Blind Adversarial Training: Balance Accuracy and Robustness

Add code
Apr 10, 2020
Figure 1 for Blind Adversarial Training: Balance Accuracy and Robustness
Figure 2 for Blind Adversarial Training: Balance Accuracy and Robustness
Figure 3 for Blind Adversarial Training: Balance Accuracy and Robustness
Figure 4 for Blind Adversarial Training: Balance Accuracy and Robustness
Viaarxiv icon