Zobrazeno 1 - 10
of 2 271
pro vyhledávání: '"P Dutkiewicz"'
This paper introduces a novel lossless compression method for compressing geometric attributes of point cloud data with bits-back coding. Our method specializes in using a deep learning-based probabilistic model to estimate the Shannon's entropy of t
Externí odkaz:
http://arxiv.org/abs/2410.18115
Autor:
Dutkiewicz, Alicja, Polla, Stefano, Scheurer, Maximilian, Gogolin, Christian, Huggins, William J., O'Brien, Thomas E.
As fully fault-tolerant quantum computers capable of solving useful problems remain a future goal, we anticipate an era of "early fault tolerance" allowing for limited error correction. We propose a framework for designing early fault-tolerant algori
Externí odkaz:
http://arxiv.org/abs/2410.05369
In this paper, a compact multi-service antenna (MSA) is presented for sensing and communication using a reconfigurable complementary spiral resonator. A three turns complementary spiral resonator (3-CSR) is inserted in the ground plane of a modified
Externí odkaz:
http://arxiv.org/abs/2408.15486
Autor:
Khoa, Tran Viet, Son, Do Hai, Hoang, Dinh Thai, Trung, Nguyen Linh, Quynh, Tran Thi Thuy, Nguyen, Diep N., Ha, Nguyen Viet, Dutkiewicz, Eryk
With the ever-increasing popularity of blockchain applications, securing blockchain networks plays a critical role in these cyber systems. In this paper, we first study cyberattacks (e.g., flooding of transactions, brute pass) in blockchain networks
Externí odkaz:
http://arxiv.org/abs/2407.04011
The ordinary subdiffusion equation, with fractional time derivatives of at most first order, describes a process in which the propagation velocity of diffusing molecules is unlimited. To avoid this non-physical property the Cattaneo diffusion equatio
Externí odkaz:
http://arxiv.org/abs/2404.17319
Autor:
Dinh, Phai Vu, Nguyen, Diep N., Hoang, Dinh Thai, Nguyen, Quang Uy, Dutkiewicz, Eryk, Bao, Son Pham
While intrusion detection systems (IDSs) benefit from the diversity and generalization of IoT data features, the data diversity (e.g., the heterogeneity and high dimensions of data) also makes it difficult to train effective machine learning models i
Externí odkaz:
http://arxiv.org/abs/2403.15511
Autor:
Dinh, Phai Vu, Nguyen, Quang Uy, Dinh, Thai Hoang, Nguyen, Diep N., Pham, Bao Son, Dutkiewicz, Eryk
Representation Learning (RL) plays a pivotal role in the success of many problems including cyberattack detection. Most of the RL methods for cyberattack detection are based on the latent vector of Auto-Encoder (AE) models. An AE transforms raw data
Externí odkaz:
http://arxiv.org/abs/2403.15509
Autor:
Hassan, Md Arif, Nguyen, Cong T., Nguyen, Chi-Hieu, Hoang, Dinh Thai, Nguyen, Diep N., Dutkiewicz, Eryk
Web 3.0 is the third generation of the World Wide Web (WWW), concentrating on the critical concepts of decentralization, availability, and increasing client usability. Although Web 3.0 is undoubtedly an essential component of the future Internet, it
Externí odkaz:
http://arxiv.org/abs/2401.14420
Autor:
P Dutkiewicz, D B Kazarinova
Publikováno v:
RUDN Journal of Political Science, Vol 19, Iss 1, Pp 7-14 (2017)
The crisis of trust in two pillows of modern society - in state (Keynesian approach) and in market (neoliberal approach) is recognized by many leading scientists as from Russia, so from Europe and America. The world becomes more uncertain and unsusta
Externí odkaz:
https://doaj.org/article/8e04920b58f64d15afdd30f4b7119ca5
Autor:
Hassan, Md Arif, Jamshidi, Mohammad Behdad, Manh, Bui Duc, Chu, Nam H., Nguyen, Chi-Hieu, Hieu, Nguyen Quang, Nguyen, Cong T., Hoang, Dinh Thai, Nguyen, Diep N., Van Huynh, Nguyen, Alsheikh, Mohammad Abu, Dutkiewicz, Eryk
Web 3.0 represents the next stage of Internet evolution, aiming to empower users with increased autonomy, efficiency, quality, security, and privacy. This evolution can potentially democratize content access by utilizing the latest developments in en
Externí odkaz:
http://arxiv.org/abs/2401.10901