Asymmetric Optical Cryptosystem with Secret-Key Sharing Based on Coherent Superposition and Normalized Decomposition

Asymmetric Optical Cryptosystem Based on Coherent Superposition and Normalized Decomposition Background Introduction With the growing demand for information security, optical image encryption technology has attracted significant attention over the past three decades. This technology leverages various degrees of freedom of light (such as amplitude, ...

Self-Supervised Shutter Unrolling with Events

Event Camera-Based Self-Supervised Shutter Unrolling Method Research Background and Problem Statement In the field of computer vision, recovering undistorted global shutter (GS) videos from rolling shutter (RS) images has been a highly challenging problem. RS cameras, due to their row-by-row exposure mechanism, are prone to spatial distortions (e.g...

Investment Micro-Casting 3D-Printed Multi-Metamaterial for Programmable Multimodal Biomimetic Electronics

Research on Multi-material Biomimetic Electronics Based on Investment Micro-casting 3D Printing Academic Background With the rapid development of biomimetic electronics, electronic skin (E-skin) and flexible sensors that mimic human perceptual functions have shown broad application prospects in robotics, medical devices, and human-computer interact...

Resistive Memory-Based Zero-Shot Liquid State Machine for Multimodal Event Data Learning

Novel Resistive Memory-Driven Zero-Shot Multimodal Event Learning System: A Report on Hardware-Software Co-Design Academic Background The human brain is a complex spiking neural network (SNN) capable of zero-shot learning in multimodal signals with minimal power consumption, allowing generalization of existing knowledge to address new tasks. Howeve...

Efficient Scaling of Large Language Models with Mixture of Experts and 3D Analog In-Memory Computing

Efficient Scaling of Large Language Models with Mixture of Experts and 3D Analog In-Memory Computing Academic Background In recent years, large language models (LLMs) have demonstrated remarkable capabilities in natural language processing, text generation, and other fields. However, as the scale of these models continues to grow, the costs of trai...

An Intrusion Detection Approach for Industrial Internet of Things Traffic Using Deep Recurrent Reinforcement Learning and Federated Learning

Intrusion Detection Approach for Industrial Internet of Things Traffic Using Deep Recurrent Reinforcement Learning and Federated Learning Academic Background The rapid development of the Industrial Internet of Things (IIoT) has profoundly transformed intelligent industrial systems, enabling data exchange, remote control, and smart decision-making b...

Multilevel Ensemble Membership Inference Attack

In-depth Analysis of the Research Paper: MEMIA: Multilevel Ensemble Membership Inference Attack Introduction to the Research Background With the rapid development of digital technologies, artificial intelligence (AI) and machine learning (ML) have deeply permeated multiple domains, including healthcare, finance, retail, education, and social media....

Face Forgery Detection Based on Fine-grained Clues and Noise Inconsistency

In-depth Exploration of Face Forgery Detection Based on Fine-Grained Clues and Noise Inconsistency Background Introduction With the rapid advancement of artificial intelligence (AI) technologies, various generative models have achieved remarkable progress. This has made it increasingly easy to generate highly realistic “deepfake” face images. These...

An Improved and Explainable Electricity Price Forecasting Model via SHAP-Based Error Compensation Approach

Improved Electricity Price Forecasting Model Based on SHAP and Its Explainability Analysis Background and Research Motivation Electricity price forecasting (EPF) models have become a hot research topic in recent years, particularly due to the financial impact of market volatility on stakeholders. Especially in European energy markets, recent years ...

Efficient CORDIC-based Activation Function Implementations for RNN Acceleration on FPGAs

Efficient Implementation of RNN Activation Functions: Breakthroughs in CORDIC Algorithms and FPGA Hardware Acceleration Background and Research Significance In recent years, with the rapid advancement of deep learning technologies, Recurrent Neural Networks (RNNs), particularly Long Short-Term Memory (LSTM) networks, have demonstrated powerful capa...