Picture for Hao Dai

Hao Dai

CAAP: Class-Dependent Automatic Data Augmentation Based On Adaptive Policies For Time Series

Add code
Apr 01, 2024
Figure 1 for CAAP: Class-Dependent Automatic Data Augmentation Based On Adaptive Policies For Time Series
Figure 2 for CAAP: Class-Dependent Automatic Data Augmentation Based On Adaptive Policies For Time Series
Figure 3 for CAAP: Class-Dependent Automatic Data Augmentation Based On Adaptive Policies For Time Series
Figure 4 for CAAP: Class-Dependent Automatic Data Augmentation Based On Adaptive Policies For Time Series
Viaarxiv icon

Open Set Dandelion Network for IoT Intrusion Detection

Add code
Nov 19, 2023
Figure 1 for Open Set Dandelion Network for IoT Intrusion Detection
Figure 2 for Open Set Dandelion Network for IoT Intrusion Detection
Figure 3 for Open Set Dandelion Network for IoT Intrusion Detection
Figure 4 for Open Set Dandelion Network for IoT Intrusion Detection
Viaarxiv icon

Adaptive Bi-Recommendation and Self-Improving Network for Heterogeneous Domain Adaptation-Assisted IoT Intrusion Detection

Add code
Mar 25, 2023
Figure 1 for Adaptive Bi-Recommendation and Self-Improving Network for Heterogeneous Domain Adaptation-Assisted IoT Intrusion Detection
Figure 2 for Adaptive Bi-Recommendation and Self-Improving Network for Heterogeneous Domain Adaptation-Assisted IoT Intrusion Detection
Figure 3 for Adaptive Bi-Recommendation and Self-Improving Network for Heterogeneous Domain Adaptation-Assisted IoT Intrusion Detection
Figure 4 for Adaptive Bi-Recommendation and Self-Improving Network for Heterogeneous Domain Adaptation-Assisted IoT Intrusion Detection
Viaarxiv icon

Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach

Add code
Jan 24, 2023
Figure 1 for Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach
Figure 2 for Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach
Figure 3 for Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach
Figure 4 for Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach
Viaarxiv icon

Multi-Scenario Bimetric-Balanced IoT Resource Allocation: An Evolutionary Approach

Add code
Nov 10, 2022
Figure 1 for Multi-Scenario Bimetric-Balanced IoT Resource Allocation: An Evolutionary Approach
Figure 2 for Multi-Scenario Bimetric-Balanced IoT Resource Allocation: An Evolutionary Approach
Figure 3 for Multi-Scenario Bimetric-Balanced IoT Resource Allocation: An Evolutionary Approach
Figure 4 for Multi-Scenario Bimetric-Balanced IoT Resource Allocation: An Evolutionary Approach
Viaarxiv icon

Joint Semantic Transfer Network for IoT Intrusion Detection

Add code
Oct 28, 2022
Figure 1 for Joint Semantic Transfer Network for IoT Intrusion Detection
Figure 2 for Joint Semantic Transfer Network for IoT Intrusion Detection
Figure 3 for Joint Semantic Transfer Network for IoT Intrusion Detection
Figure 4 for Joint Semantic Transfer Network for IoT Intrusion Detection
Viaarxiv icon

PECCO: A Profit and Cost-oriented Computation Offloading Scheme in Edge-Cloud Environment with Improved Moth-flame Optimisation

Add code
Aug 09, 2022
Figure 1 for PECCO: A Profit and Cost-oriented Computation Offloading Scheme in Edge-Cloud Environment with Improved Moth-flame Optimisation
Figure 2 for PECCO: A Profit and Cost-oriented Computation Offloading Scheme in Edge-Cloud Environment with Improved Moth-flame Optimisation
Figure 3 for PECCO: A Profit and Cost-oriented Computation Offloading Scheme in Edge-Cloud Environment with Improved Moth-flame Optimisation
Figure 4 for PECCO: A Profit and Cost-oriented Computation Offloading Scheme in Edge-Cloud Environment with Improved Moth-flame Optimisation
Viaarxiv icon