Sponsor of the Day:
Jerkmate
https://ieeexplore.ieee.org/document/9519393
SoK: Security and Privacy in the Age of Commercial Drones | IEEE Conference Publication | IEEE...
As the number of drones increases and the era in which they begin to fill the skies approaches, an important question needs to be answered: From a security and
ieee conference publicationsok securitycommercial dronesprivacyage
https://ieeexplore.ieee.org/document/9840776
Analysis of EEG for Parkinson’s Disease Detection | IEEE Conference Publication | IEEE Xplore
Parkinson’s Disease (PD) is a disorder of the central nervous system which affects movement, often including tremors. Nerve cell damage in the brain causes dopa
ieee conference publicationdisease detectionanalysiseegxplore
https://ieeexplore.ieee.org/abstract/document/11462505
Differentiable Pulsetable Synthesis for Wind Instrument Modeling | IEEE Conference Publication |...
Pulsetable synthesis is a concatenative audio synthesis method that generates harmonic tones by repeating short waveform prototypes at regular intervals. While
ieee conference publicationwind instrumentdifferentiablesynthesismodeling
https://ieeexplore.ieee.org/document/10186548/
M-LIO: Multi-lidar, multi-IMU odometry with sensor dropout tolerance | IEEE Conference Publication...
We present a robust system for state estimation that fuses measurements from multiple lidars and inertial sensors with GNSS data. To initiate the method, we use
ieee conference publicationliomultilidarimu
https://ieeexplore.ieee.org/document/10247883/
Layout Decomposition via Boolean Satisfiability | IEEE Conference Publication | IEEE Xplore
Multiple patterning lithography (MPL) has been introduced in the integrated circuits manufacturing industry to enhance feature density as the technology node ad
ieee conference publicationlayoutdecompositionviaboolean
https://ieeexplore.ieee.org/document/4462118/
Effect of Respiration in Heart Rate Variability (HRV) Analysis | IEEE Conference Publication | IEEE...
Beat-to-beat changes in cardiac signals or heart rate variability (HRV) are controlled by the two branches of autonomic nervous system (ANS) in a very complex m
heart rate variabilityieee conference publicationeffectrespirationhrv
https://ieeexplore.ieee.org/abstract/document/11339267
Predicting Moral Values in Lyrics Through Audio | IEEE Conference Publication | IEEE Xplore
This paper introduces the task of music morality recognition-predicting moral values in song lyrics using only audio features, which can be considered a form of
ieee conference publicationpredictingmoralvalueslyrics
https://ieeexplore.ieee.org/document/332913/
Risk management for the B-1B computer upgrade | IEEE Conference Publication | IEEE Xplore
The B-1B has received a great deal of criticism since it was first fielded in 1985. Much of this criticism, deserved or not, was the result of perceived shortco
ieee conference publicationrisk management1bcomputerupgrade
https://ieeexplore.ieee.org/document/10453752
WormGPT: A Large Language Model Chatbot for Criminals | IEEE Conference Publication | IEEE Xplore
In recent years, AI has made many advances in multiple fronts. One such recent advance is the development of Large Language Models(LLMs), a deep learning model
large language modelieee conference publicationchatbotcriminalsxplore
https://ieeexplore.ieee.org/document/7780631/
Face2Face: Real-Time Face Capture and Reenactment of RGB Videos | IEEE Conference Publication |...
We present a novel approach for real-time facial reenactment of a monocular target video sequence (e.g., Youtube video). The source sequence is also a monocular
real time faceieee conference publicationface2facecapturereenactment
https://ieeexplore.ieee.org/abstract/document/9659212
Detection of Denial of Service Attacks Using Echo State Networks | IEEE Conference Publication |...
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are major threats to cybersecurity in communication networks. These cyber attacks are e
ieee conference publicationservice attacksstate networksdetectiondenial
https://ieeexplore.ieee.org/document/5604101/;jsessionid=99967E9BA89240885ED0D0348B98DE90
Brain connectivity analysis by reduction to pair classification | IEEE Conference Publication |...
Brain connectivity studies aim at describing the connections within the brain. Diffusion and functional MRI techniques provide different kinds of information to
ieee conference publicationbrain connectivityanalysisreductionpair
https://ieeexplore.ieee.org/abstract/document/10172578
A Theorem Proving Approach to Programming Language Semantics | IEEE Conference Publication | IEEE...
The semantics of programming languages is one of the core topics in computer science. This topic is formalism-heavy and requires the student to attempt numerous
ieee conference publicationtheorem provingprogramming languageapproachsemantics
https://ieeexplore.ieee.org/document/11163179/
Loop Closure via Maximal Cliques in 3D LiDAR-Based SLAM | IEEE Conference Publication | IEEE Xplore
Reliable loop closure detection remains a critical challenge in 3D LiDAR-based SLAM, especially under sensor noise, environmental ambiguity, and viewpoint varia
ieee conference publication3d lidarloopclosurevia
https://ieeexplore.ieee.org/abstract/document/10125155
Towards Application-Driven IoT Education | IEEE Conference Publication | IEEE Xplore
The increased popularity of Internet of Things (IoT) systems and platforms in various engineering and science fields has made training practitioners in IoT a ne
ieee conference publicationapplication driventowardsioteducation
https://ieeexplore.ieee.org/document/7966807/
An Introduction to QR Code Technology | IEEE Conference Publication | IEEE Xplore
ieee conference publicationqr codeintroductiontechnologyxplore
https://ieeexplore.ieee.org/document/8806834
FIT: Fill Insertion Considering Timing | IEEE Conference Publication | IEEE Xplore
Dummy fill insertion is a mandatory step in modern semiconductor manufacturing process to reduce dielectric thickness variation, and provide nearly uniform patt
ieee conference publicationfitfillinsertionconsidering
https://ieeexplore.ieee.org/document/9105991/
Deepfake Detection: Current Challenges and Next Steps | IEEE Conference Publication | IEEE Xplore
High quality fake videos and audios generated by AI- algorithms (the deep fakes) have started to challenge the status of videos and audios as definitive evidenc
ieee conference publicationdeepfake detectioncurrent challengesnext stepsxplore
https://ieeexplore.ieee.org/abstract/document/9464008
MRT#: a Fast Multi-Threaded MRT Parser | IEEE Conference Publication | IEEE Xplore
BGP is the inter-domain routing protocol of the Internet. BGP routers exchange BGP Updates, and adjust their routing table to reflect changes in the network. A
ieee conference publicationfast multimrtthreadedparser
https://ieeexplore.ieee.org/document/9515004
Estonia’s e-governance and digital public service delivery solutions | IEEE Conference Publication...
With the rising digitization and efficiency in digital service delivery, Estonia is a good example of how technology has revolutionized the traditional approach
public service deliveryieee conference publicationgovernancedigitalsolutions
https://ieeexplore.ieee.org/abstract/document/7726739/
Classifying anomalous events in BGP datasets | IEEE Conference Publication | IEEE Xplore
Border Gateway Protocol (BGP), which enables Internet interconnectivity, is susceptible to various anomalous events that may affect the Internet performance. Un
ieee conference publicationclassifyinganomalouseventsbgp
https://ieeexplore.ieee.org/document/7559577
PDFFigures 2.0: Mining figures from research papers | IEEE Conference Publication | IEEE Xplore
Figures and tables are key sources of information in many scholarly documents. However, current academic search engines do not make use of figures and tables wh
ieee conference publication2 0research papersminingfigures
https://ieeexplore.ieee.org/abstract/document/9049836
Preventing File-Less Attacks with Machine Learning Techniques | IEEE Conference Publication | IEEE...
The cyber-threat detection problem is a complex one due to the large diversity of attacks, increasing number of prevalent samples and to the arms race between a
ieee conference publicationmachine learningpreventingfileless
https://ieeexplore.ieee.org/document/282162/
VHSIC technology insertion into the AP-102 avionics processor family | IEEE Conference Publication...
To meet the need for additional performance and memory, IBM has defined an approach to insert VHSIC (very high speed integrated circuit) technology into the AP-
ieee conference publicationprocessor familytechnologyinsertionap
https://ieeexplore.ieee.org/abstract/document/6967094/
A novel algorithm for AS path inference based on BGP routing tables | IEEE Conference Publication |...
Inferring the Autonomous System (AS) level end-to-end paths is valuable for both network operators and researchers. It has been widely researched by scholars. M
ieee conference publicationbgp routingnovelalgorithmpath