Intelligent surfaces for 6G wireless networks: A survey of optimization and performance analysis techniques
R Alghamdi, R Alhadrami, D Alhothali, H Almorad… - IEEE …, 2020 - ieeexplore.ieee.org
This paper surveys the optimization frameworks and performance analysis methods for large
intelligent surfaces (LIS), which have been emerging as strong candidates to support the …
intelligent surfaces (LIS), which have been emerging as strong candidates to support the …
Voltage and current measuring technologies for high voltage direct current supergrids: A technology review identifying the options for protection, fault location and …
After the occurrence of a DC-side feeder faults on HVDC transmission systems, protection
and fault detection systems are anticipated to minimize their onerous effects, by initiating …
and fault detection systems are anticipated to minimize their onerous effects, by initiating …
A novel approach for code smells detection based on deep leaning
T Lin, X Fu, F Chen, L Li - … in Computer and Communications: First EAI …, 2021 - Springer
Compared to software bugs, code smells are more significant in software engineering
research. It is not easy to detect code smells through traditional methods. In this work, we …
research. It is not easy to detect code smells through traditional methods. In this work, we …
Security operations center: A systematic study and open challenges
Since the introduction of Security Operations Centers (SOCs) around 15 years ago, their
importance has grown significantly, especially over the last five years. This is mainly due to …
importance has grown significantly, especially over the last five years. This is mainly due to …
Deep learning for IoT
T Lin - 2020 IEEE 39th International Performance Computing …, 2020 - ieeexplore.ieee.org
Deep learning and other machine learning approaches are deployed to many systems
related to Internet of Things or IoT. However, it faces challenges that adversaries can take …
related to Internet of Things or IoT. However, it faces challenges that adversaries can take …
99% false positives: A qualitative study of {SOC} analysts' perspectives on security alarms
In this work, we focus on the prevalence of False Positive (FP) alarms produced by security
tools, and Security Operation Centers (SOCs) practitioners' perception of their quality. In an …
tools, and Security Operation Centers (SOCs) practitioners' perception of their quality. In an …
Overview of the multiview and 3D extensions of high efficiency video coding
G Tech, Y Chen, K Müller, JR Ohm… - … on Circuits and …, 2015 - ieeexplore.ieee.org
The High Efficiency Video Coding (HEVC) standard has recently been extended to support
efficient representation of multiview video and depth-based 3D video formats. The multiview …
efficient representation of multiview video and depth-based 3D video formats. The multiview …
Traffic engineering in software-defined networking: Measurement and management
As the next generation network architecture, software-defined networking (SDN) has exciting
application prospects. Its core idea is to separate the forwarding layer and control layer of …
application prospects. Its core idea is to separate the forwarding layer and control layer of …
A Data Triage Retrieval System for Cyber Security Operations Center
T Lin - 2018 - etda.libraries.psu.edu
Triage analysis is a fundamental stage in cyber operations in Security Operations Centers
(SOCs). The massive data sources generate great demands on cyber security analysts' …
(SOCs). The massive data sources generate great demands on cyber security analysts' …
Matched and mismatched SOCs: A qualitative study on security operations center issues
Organizations, such as companies and governments, created Security Operations Centers
(SOCs) to defend against computer security attacks. SOCs are central defense groups that …
(SOCs) to defend against computer security attacks. SOCs are central defense groups that …