Abstract: Learning-based distribution system state estimation (DSSE) methods typically depend on sufficient fully labeled data to construct mapping functions. However, collecting historical labels ...
Voice-over-Internet-Protocol (VoIP) based speech steganography techniques provide convenience for covert communication while posing significant threats to network security. Accurately detecting hidden ...