Intelligence & Security

Identify Targeted Attacks on Deep RL-Based Autonomous Driving

UAV System with Vital Sign Sensing, Communications, and Positioning Estimation

Cyber Risk Loss Distribution Model of Client-Server Networks

Enhancing Fairness Through Aleatoric Uncertainty

Attributing Image Generative Models Using Latent Fingerprints

Design, Characterization and Control of a Whole-body Grasping and Perching (WHOPPEr) Drone

Third Party Risk Assessment Using Darkweb Keyword Searching

Adaptive Video Subsampling for Energy-Efficient Object Detection