Intelligence & Security

Optimization of Brain Mobile Interface Applications Using IoT

Image Matching with Geometric Feature Comparison

Extremely Lightweight Checkpoint Method for Resilience Against Soft Errors

Binary Neural Network for Improved Accuracy and Defense Against Bit-Flip Attacks

Third Party Risk Assessment Using Darkweb Keyword Searching

Automatic Assignment of Labels to Discussion Topics Seen in Dark Web Forums

Detecting Fake News on Social Media by Message Diffusion Pathways

RIM: Robust Intersection Management for Connected Autonomous Vehicles

Simultaneous Localization and Mapping by Merging Imaging and Wireless Communications

Evaluating Perception Systems for Autonomous Vehicles using Quality Temporal Logic