Picture for Wei Shi

Wei Shi

On Secrecy Performance of RIS-Assisted MISO Systems over Rician Channels with Spatially Random Eavesdroppers

Add code
Dec 28, 2023
Figure 1 for On Secrecy Performance of RIS-Assisted MISO Systems over Rician Channels with Spatially Random Eavesdroppers
Figure 2 for On Secrecy Performance of RIS-Assisted MISO Systems over Rician Channels with Spatially Random Eavesdroppers
Figure 3 for On Secrecy Performance of RIS-Assisted MISO Systems over Rician Channels with Spatially Random Eavesdroppers
Figure 4 for On Secrecy Performance of RIS-Assisted MISO Systems over Rician Channels with Spatially Random Eavesdroppers
Viaarxiv icon

A Survey of Diffusion Based Image Generation Models: Issues and Their Solutions

Add code
Aug 25, 2023
Viaarxiv icon

Communication-Efficient Orchestrations for URLLC Service via Hierarchical Reinforcement Learning

Add code
Jul 25, 2023
Viaarxiv icon

Domain Adaptation using Silver Standard Labels for Ki-67 Scoring in Digital Pathology: A Step Closer to Widescale Deployment

Add code
Jul 08, 2023
Viaarxiv icon

Say What You Mean! Large Language Models Speak Too Positively about Negative Commonsense Knowledge

Add code
May 13, 2023
Viaarxiv icon

Efficient and Secure Federated Learning for Financial Applications

Add code
Mar 15, 2023
Viaarxiv icon

Near-Field Terahertz Communications: Model-Based and Model-Free Channel Estimation

Add code
Feb 09, 2023
Figure 1 for Near-Field Terahertz Communications: Model-Based and Model-Free Channel Estimation
Figure 2 for Near-Field Terahertz Communications: Model-Based and Model-Free Channel Estimation
Figure 3 for Near-Field Terahertz Communications: Model-Based and Model-Free Channel Estimation
Figure 4 for Near-Field Terahertz Communications: Model-Based and Model-Free Channel Estimation
Viaarxiv icon

PAMI: partition input and aggregate outputs for model interpretation

Add code
Feb 08, 2023
Viaarxiv icon

Secure Outage Analysis of RIS-Assisted Communications with Discrete Phase Control

Add code
Oct 31, 2022
Viaarxiv icon

Identity-Sensitive Knowledge Propagation for Cloth-Changing Person Re-identification

Add code
Aug 25, 2022
Figure 1 for Identity-Sensitive Knowledge Propagation for Cloth-Changing Person Re-identification
Figure 2 for Identity-Sensitive Knowledge Propagation for Cloth-Changing Person Re-identification
Figure 3 for Identity-Sensitive Knowledge Propagation for Cloth-Changing Person Re-identification
Figure 4 for Identity-Sensitive Knowledge Propagation for Cloth-Changing Person Re-identification
Viaarxiv icon